entry_id
stringlengths
33
33
published
stringlengths
14
14
title
stringlengths
17
179
authors
sequence
primary_category
stringlengths
5
18
categories
sequence
text
stringlengths
15
240k
http://arxiv.org/abs/2303.06980v2
20230313103002
Self-supervised based general laboratory progress pretrained model for cardiovascular event detection
[ "Li-Chin Chen", "Kuo-Hsuan Hung", "Yi-Ju Tseng", "Hsin-Yao Wang", "Tse-Min Lu", "Wei-Chieh Huang", "Yu Tsao" ]
cs.LG
[ "cs.LG" ]
L-C. Chen et al.: Generalized laboratory progress pretrain model for cardiovascular diseases progress forecasting [ \begin@twocolumnfalse Self-supervised based general laboratory progress pretrained model for cardiovascular event detection Li-Chin Chen^1, Kuo-Hsuan Hung^1, Yi-Ju Tseng^2,  Member, IEEE, Hsin-Yao Wang^3, Tse-Min Lu^4,5,6, Wei-Chieh Huang^7,4,6, Yu Tsao^1,  Senior Member, IEEE March 30, 2023 =================================================================================================================================================================================================================== Objective: Regular surveillance is an indispensable aspect of managing cardiovascular disorders. Patient recruitment for rare or specific diseases is often limited due to their small patient size and episodic observations, whereas prevalent cases accumulate longitudinal data easily due to regular follow-ups. These data, however, are notorious for their irregularity, temporality, absenteeism, and sparsity. In this study, we leveraged self-supervised learning (SSL) and transfer learning to overcome the above-mentioned barriers, transferring patient progress trends in cardiovascular laboratory parameters from prevalent cases to rare or specific cardiovascular events detection. Methods and procedures: We pretrained a general laboratory progress (GLP) pretrain model using hypertension patients (who were yet to be diabetic), and transferred their laboratory progress trend to assist in detecting target vessel revascularization (TVR) in percutaneous coronary intervention patients. GLP adopted a two-stage training process that utilized interpolated data, enhancing the performance of SSL. After pretraining GLP, we fine-tuned it for TVR prediction. Results: The proposed two-stage training process outperformed SSL. Upon processing by GLP, the classification demonstrated a marked improvement, increasing from 0.63 to 0.90 in averaged accuracy. All metrics were significantly superior (p < 0.01) to the performance of prior GLP processing. The representation displayed distinct separability independent of algorithmic mechanisms, and diverse data distribution trend. Conclusion: Our approach effectively transferred the progression trends of cardiovascular laboratory parameters from prevalent cases to small-numbered cases, thereby demonstrating its efficacy in aiding the risk assessment of cardiovascular events without limiting to episodic observation. The potential for extending this approach to other laboratory tests and diseases is promising. Clinical impact: This study demonstrated the efficacy of laboratory progress transformation between patient groups, demonstrating that the trend of prevalent cases is informative for small-numbered events detection without limited to episodic observations. Cardiovascular diseases, cardiometabolic disease, laboratory examinations, time-series data, representation learning, self-supervised learning, transfer learning. \end@twocolumnfalse] [1]^1 Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan. [2]^2 Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan. [3]^3 Department of Laboratory Medicine, Chang Gung Memorial Hospital at Linkou, Taoyuan City, Taiwan. [4]^4 Division of Cardiology, Department of Internal Medicine, Taipei Veterans General Hospital, Taipei, Taiwan. [5]^5 Department of Health Care Center, Taipei Veterans General Hospital, Taipei, Taiwan. [6]^6 Department of Internal Medicine, School of Medicine, College of Medicine, National Yang Ming Chiao Tung University, Taipei, Taiwan. [7]^7 Department of Biomedical Engineering, National Taiwan University, Taipei, Taiwan. § INTRODUCTION Regular monitoring is indispensable in the management of cardiovascular diseases <cit.>. Laboratory analysis constitutes a vital component, involving multifarious chemical tests that scrutinize blood, urine, or body tissue specimens. These tests gauge the body's response to food intake, medication, and treatment, thus providing crucial insights into disease progression and signaling the need for medication or dietary modifications. For chronic diseases, laboratory results are more meaningful when observed longitudinally rather than episodically. Extensive longitudinal data have been amassed for prevalent diseases such as hypertension (HTN) and diabetes mellitus (DM). On the contrary, rare or specific cases are often characterized by a diminutive patient population and episodic observations, which curtail the incorporation of machine learning technology in their progress assessment. However, transfer learning, which improves a classifier from one domain (source domain) with more readily obtainable data, and applies this knowledge to another domain (target domain), is a promising approach <cit.>. The transfer of progress from prevalent cases to rare or specific cases were seldom discussed. This study aims to employ self-supervised learning (SSL) to pretrain a generalized laboratory progress (GLP) model that captures the overall progression of common laboratory markers in prevalent cardiovascular cases and transfer this progress to aid in the evaluation of target vessel revascularization (TVR) occurrence in percutaneous coronary intervention (PCI) patients. §.§ Problematic nature of laboratory data For rare or specific diseases, patient recruitment is typically limited due to small patient size and episodic observations. Patient status at a single time point, as observed in cross-sectional studies, provides only a temporary snapshot and preliminary insights into future disease progression. In contrast, longitudinal observations, as seen in cohort studies, offer a more complete understanding of disease development <cit.>. However, the collection of such data over an extended period can be complex, time-consuming, and expensive, often resulting in patient dropout and limiting the availability of data to small patient groups or episodic events <cit.>. For prevalent cardiovascular cases, longitudinal data are more readily available due to regular follow-ups. However, these observations are heavily reliant on patient adherence, insurance regulations, clinical guidelines, and the clinical judgment of physicians. Any disruption to these factors can lead to irregularity and sparsity; that is, the observation may be skipped, or it may be sampled irregularly or over a prolonged period <cit.>. Similarly to electronic health records (EHRs), laboratory test records contain a wealth of abundant and longitudinal patient information but are notorious for their irregularity, temporality, and sparsity, often with noisy outliers and missing values <cit.>. To overcome these challenges, we propose the following solutions: (1) For small patient populations and episodic observations, we designed a laboratory progress-specific pretrain model to capture the temporal latent representation of prevalent cases and transfer disease progress to small-numbered cases. (2) To address irregularity, absenteeism, and sparsity, we adopted SSL to estimate missing or absent data in longitudinal observations. §.§ Related works Machine learning techniques have been extensively studied to enable targeted tasks using EHRs <cit.>. These approaches include vector-based representations, which transform each patient into a vector, sequential-based representations that capture clinical events based on temporal distance <cit.>, graph-based representations that represent the relationship between clinical events using a compact graph, and tensor-based representations that use high-dimensional tensors to model patient-level data, incorporating diagnosis, medication, treatments, and clinical events in each dimension <cit.>. SSL has recently drown attention due to its ability to label training data from the data itself <cit.>. The combination of SSL and semi-supervised methods have been proposed to impute corrupted value and training on unlabeled data in genomics and clinical data <cit.>. Similarly, continuous value embedding, represented as a #time × #feature × #value vector, has been utilized to process irregular, absent, and sparse observations from ICUs, leveraging SSL <cit.>. One of the most renowned language-pretrained models is the Bidirectional Encoder Representations from Transformers (BERT) <cit.>, which analyzes and predicts future words based on prior words. It has been adapted for the medical domain and trained using combinations of general and biomedical-specific corpora, such as BioBERT, BlueBERT, and PubMedBERT <cit.>, to learn temporal latent representations from extensive data and transfer the learned embedding to downstream tasks. Unlike previous studies that aimed to process all EHR components in a single design, BERT-based models primarily focus on clinical notes. §.§ Cardiovascular disease and associated risk factors Cardiovascular disease is among the leading causes of death worldwide. Currently, the known traditional risk factors include HTN, DM, and smoking <cit.>. These risk factors may result in endothelial injury, plaque formation, and coronary thrombus <cit.>, leading to the progression of cardiovascular disease. PCI has been widely used to treat cardiovascular disease <cit.>. Although the clinical application of drug-eluting stents has significantly reduced the incidence of TVR in recent years <cit.>, preventing TVR and reducing re-admission rates remain major clinical issues in cardiovascular medicine after PCI. TVR is associated with complicated pathophysiological mechanisms, including lipid metabolic disorders <cit.> and inflammatory disease <cit.>. Regarding the time interval of cardiac events, patients who undergo PCI are at risk of subsequent cardiac events, including TVR <cit.>. However, a consensus on accurate preprocedural risk stratification and prognosis assessment to identify high-risk patients before PCI has not yet been reached. §.§ Laboratory markers of cardiovascular diseases Earlier studies indicated that preprocedural parameters were associated with cardiovascular disease. Total cholesterol levels (Chol) and low-density lipoprotein cholesterol (LDL-c) are strongly associated with cardiometabolic diseases and accepted in diagnostic practices. The plasma level of high-density lipoprotein cholesterol (HDL-c) and risk for cardiovascular diseases show an inverse relationship <cit.>. The relationship between circulating white blood cells (WBCs) and cardiovascular outcomes were noted in clinical studies, which showed that elevated WBC count increased short- and long-term risk in patients with acute coronary syndromes (ACSs) <cit.>; Hage et al. <cit.> reported that restenosis was predicted by baseline fasting blood glucose (glucose AC), suggesting that focusing on lowering glucose rather than the tool to normalize glucose is more beneficial <cit.>. Serum uric acid (UA) was indicated as a prognostic cardiovascular biomarker, predicting total and cardiovascular mortality in the setting of secondary prevention of coronary artery disease within the framework of the Verona Heart Study <cit.>. The National Cholesterol Education Program III (NCEP III) recommends Chol or LDL-c in combination with HDL-c (Chol/HDL-c, LDL-c/HDL-c) as markers for the screening and treatment of patients with cardiovascular disease, as well as the 10-year risk Framingham scoring assessment <cit.>. Therefore, we accumulated six preprocedural parameters in this study, namely, the ratio of Chol and HDL-c (Chol/HDL-c), LDL-c, the ratio of LDL-c and HDL-c (LDL-c/HDL-c), glucose AC, WBC, and UA. § METHODOLOGY Our objective is to construct a pretraining model that captures the laboratory progress of general cases and transfers this information to assist in predicting cardiac events in specific patient groups. The following section provides a detailed description of (1) patient recruitment and datasets, which include both source and target domain datasets, (2) the experimental and model design, as well as the model training process for GLP and the fine-tuning classifier, and (3) validation of both tasks. §.§ Patient recruitment and datasets Two datasets were obtained from two diverse medical institutes. The source domain dataset was obtained from the Chang Gung Research Database <cit.>, a multi-institutional electronic medical records database comprising original medical records of seven medical institutes in Taiwan. We included patients who were diagnosed with HTN before DM. Patients diagnosed with hypertension with age less than 40 years, with any oncology visits, or with observations of less than a year were excluded. The diagnosis date was indicated by the International Classification of Diseases (ICD) encoding or medication prescription date. The ICD codes and medications used for the indications are listed in Appendix <ref>. When a patient had been coded as having HTN or DM at least twice a year, the disease onset date was defined using the first coded date. If the first medication prescription date was earlier than the coded date, then the earlier date was defined as the date of disease onset. The date of diagnosis between HTN and DM was set to be ≥ three months. We collected the data of patients between their HTN and DM onset; that is, the patient was identified as having HTN onset, but was yet to be determined as having DM. We collected demographic information and laboratory data of the recruited patients, including age, sex, Chol/HDL-c, LDL-c, LDL-c/HDL-c, glucose AC, WBC, and UA. Probable erroneous values such as "NA" or "." were excluded. A total of 9,720 patients were included, and laboratory data were collected between January 2001 and December 2019. The targeted domain dataset was obtained from the Taipei Veterans General Hospital, which is a tertiary hospital located in northern Taiwan. We recruited 891 patients with noninvasive evidence of myocardial ischemia who underwent PCI between January 2005 and January 2022. Patients were excluded if they had ACS, acute decompensated congestive heart failure, acute and chronic infections, autoimmune diseases, malignancy with an expected life span of less than one year, unstable hemodynamic status, or those unable to take dual antiplatelet therapy. Angiographically successful coronary intervention was defined as residual stenosis of less than 30%, and coronary thrombolysis in myocardial infarction grade 3 flow was achieved at the end of the procedure without major complications. All patients were followed up and traced for TVR requirements. The patients required to receive TVR were labeled as occurring, and the dates were recorded. Patients without TVR by the end of January 2022 were labeled as non-occurring, and the date was recorded as January 31, 2022. In this dataset, the information included age, sex, PCI date, TVR date, and the six laboratory values mentioned above, which were collected when PCI was performed. The time differences between PCI and TVR dates were calculated. As the imputation of missing values may diverge the main attempt of this study, patients with incomplete data were excluded; the remaining 483 patients were included in the analysis. The source domain dataset are longitudinal observations that consists of multiple events, whereas the target domain dataset are episodic records that consists of one observation event for each patient. All patient data were de-identified prior to analysis. This study was approved by the Institutional Review Board of the Chang Gung Medical Foundation (No. 202000376B0) and Taipei Veterans General Hospital (No. 2019-12-012CC). §.§ Pretrain model experiment design Our aim is to develope a pretraining model that captures the laboratory progress of patients and predict their observed values for the subsequent month. We have implemented SSL to estimate irregular and absent data in longitudinal observations <cit.>. Moreover, previous studies have shown that hierarchical pretraining leads to improved performance representations <cit.>. Therefore, we propose a two-stage training process that initially learns general laboratory progress information based on interpolated data (Stage 1), followed by refinement into domain-specific progression through SSL (Stage 2). In our experiment, we used SSL as a baseline and compared it with the following training approaches: (1) a two-stage training process, whereby GLP first attains a local minimum loss with interpolated data and then makes domain-specific adjustments using SSL; (2) training with interpolated data (pure Stage 1 training); and (3) training with hybrid data, which mixes interpolated data with irregular and absent data during training. The models were trained simultaneously for supervised and self-supervised learning. §.§ Longitudinal data framing In this study, the sequential results were framed into interpolated and non-interpolated data. Interpolated data were used in Stage 1 training, and non-interpolated data were used in Stage 2. Defining the laboratory observations of each patient during the study period as y_0, y_1, …, y_n at time t_0, t_1, …, t_n, where n symbolized the months in the timeline. Setting y_0 and y_n as real observed values, let y_m on t_m symbolize the second-last real observed values of a patient. Interpolation occurred from t_0 to t_m when y_i was missing. Given a defined range r, we framed the interpolated data as t_i:t_i+r, and the next frame would take a step forward (i+1) as long as i+r ≤ m-1. These frames were the input for Stage 1 training, and the prediction target was set at t_i+r+1, where i+r+1 ≤ m. The frame is omitted if t_i, t_m-1≤ r. Frame t_m-r:t_m and the last observed value y_n on t_n were isolated from Stage 1, which were not interpolated and became the training data for Stage 2. Starting from frame t_m-r:t_m, the model predicted t_m+1, and the next input frame became t_m-r+1:t_m+1 with the prediction target located on t_m+2, until the prediction target reached t_n. The predicted data becomes parts of the training data in the next frame; that is, the model learns from the prediction it generated. In summary, there is no time gap g between the input frame and the prediction target (g = 0) in Stage 1, and traditional supervised learning was performed; whereas in Stage 2, g = n-m-1 and g > 0, therefore, SSL was performed. The framing process is illustrated in Fig. <ref>. Due to coronary stent trials focus on target vessel/lesion-related clinical outcomes in the shorter term with a particular emphasis on outcomes in the first 12-months post-PCI <cit.>, r was set to 12 months. §.§ Interpolation methods In Stage 1 training, three interpolation methods were examined: linear, piecewise cubic Hermite interpolating polynomial (PCHIP), and barycentric interpolation. We used interpolations to estimate the irregularity and absented values between two observations based on monthly visits. In linear interpolation, the values were estimated based on the slope of the known observations, denoted as: ŷ_j = y_i + (t_j - t_i)(y_k-y_i)/(t_k- t_i) , where t indicates the time of the estimation, ŷ_j is the estimated value at t_j, and i < j < k. In the PCHIP interpolation <cit.>, denoting d_j = (y_k-y_j)/(t_k- t_j) as the slopes at x_j, when the signs of d_j and d_i are different, or either of them equals zero, ŷ_j = 0. Otherwise, it is given by the weighted harmonic mean, formulated as ŷ_j = (w_1+w_2)/w_1/d_i+w_2/d_j , where w_1 = 2(t_k - t_j) + (t_j-t_i) and w_2 = (t_k - t_j) + 2(t_j - t_i). Finally, barycentric interpolation <cit.> was performed through a given set of nodes x_0, x_1, …, x_n and masses w_0, w_1, …, w_n, finding function w_0(x), w_1(x), …, w_n(x) such that: x = ∑^n_i=0w_i(x)x_i/∑^n_i=0w_i(x) , and x is the barycenter of the nodes, which can be used to interpolate through ŷ = ∑^n_i=0b_i(x)f_i , where b_i is the linear function. Fig. <ref> visualized the same segmented period of glucose AC based on different interpolation methods. §.§ Self-supervised learning based on autoregressive model In Stage 2, we adopted an autoregressive model to perform SSL, which received inputs from a time series regressed on previous inputs from the same time series. The probability of each input is conditioned on the previous input, and can be formulated as: max_θ p_θ(x) = ∑_t=1^Tlog p_θ(x_t| x_1:t-1) , where x_t denotes the input at time t, p_θ denotes the probability, and max_θ p_θ denotes the maximized likelihood <cit.>. In summary, the model learned the progress trend by paving the self-predicted path toward the prediction target. §.§ GLP model design Fig. <ref> illustrates the model design of GLP, which comprises of two blocks: the longitudinal iterative block (LIB) and the condense block (CB). The LIB is made up of a bidirectional long short-term memory (BiLSTM) layer and a fully connected (FC) condensing layer. ReLU activation function is applied after each layer to enhance the non-linearity of the model. BiLSTM processes the input data in both forward and backward directions <cit.>, which helps to capture more contextual information from the past data. The number of hidden nodes for BiLSTM was set to 5. The FC condensing layer is used to condense the output of BiLSTM layer back into the original input, thus enabling an autoregressive flow. The CB, on the other hand, is composed of an FC layer followed by a ReLU activation function, which is applied twice. The number of hidden nodes for CB were set to 5, 2, 2, and 1. When g = 0, the input passes through LIB once and then enters CB. However, when g > 0, the process iterates until the timeline before the prediction target is reached. §.§ Input vector and normalization The data that was collected was comprised of five input features, including age, gender, certainty mask, discrete value encoding, and normalized laboratory values. Numeric values, such as age and laboratory values, underwent normalization using the natural logarithm of one plus the input (log1p). This projection of values into a vector space above zero prevents potential errors that could have arisen from maldistribution between positive and negative values. Furthermore, log1p is accurate for small values of x, thus ensuring that 1+x=1 in floating-point accuracy without producing a significant shift from the original value <cit.>. The use of log1p also precludes the leakage of data distribution information <cit.>. The scaling of data is unnecessary as maximum and minimum values were not required. One-hot encoding was employed for gender, certainty mask, and discrete value encoding. Gender was encoded as binary by assigning male and female values of 1 and 0, respectively. The certainty mask was binary-encoded to indicate whether the value was real or estimated through interpolation (true observation/estimated value). The discrete value encoding categorized laboratory results into two groups (low and high) or three groups (low, normal, and high) based on different thresholds (summarized in Appendix <ref>). The number of certainty mask (certain) was a parameter set during model training. It specifies the number of real observations in a frame that symbolized the necessity for the models to generate substantial predictions. Patients were required to return every three months for cardiovascular disease examinations, resulting in a maximum of four real observations in a 12-month frame, in line with insurance regulations. Therefore, certain was verified from 0 to 5. The optimal certain was selected as the parameter setting for GLP. §.§ Training and validation settings for GLP Despite employed training approaches, the data were randomly split into training and testing datasets at a ratio of 80:20. All training processes applied the 5-fold cross validation technique, and the reported results reflect the mean of five repetitions of the training process <cit.>. Our main objective was to train the model to forecast future progression during the r/2 month period. The final reported validation was carried out in forecasting y_n without interpolation support, as this approach is impractical in real-world scenarios where future data is unknown. Only true observation values that were segmented as the prediction target were employed as the model validation data. In this study, Mean squared error (MSE) was used as the model convergence loss, while R-squared (R^2) was used as the performance metric for evaluating the model performance. MSE measures the average squared difference between the predicted values and the actual values. The lower the MSE, the better the model's performance. R^2, on the other hand, measures the proportion of the variance in the dependent variable that is predictable from the independent variables in the model. Normally, R^2 ranges from zero to one. A value of one means that the model perfectly fits the data, while a value of zero means that the model does not fit the data. When R^2 < 0 means the model performs worse than the horizontal mean line that went through the mean value of data. The statistical significance of the differences in model performance was assessed using an independent T-test, with a significance level of p < 0.05. §.§ Fine-tune classifier for TVR prediction Laboratory analyses in TVR prediction were obtained concomitantly with percutaneous coronary intervention (PCI). Subsequently, g was computed based on the temporal disparity between PCI and TVR dates using follow-up months. Patient information, comprising gender, age, and six laboratory parameters, was collected and normalized congruously with aforementioned procedures. All episodic observations were assigned with certainty masks as value one. Given the uneven distribution of patients between those with TVR occurrence (42) and those without (441), we performed balanced sampling prior to introducing data into the fine-tune classifier training. Therefore, only 84 patients were included in the training due to random downsampling of patients without TVR. The fine-tune classifier was trained with non-neural network algorithms based on outputs of frozen GLP (shown in Fig. <ref>). Non-neural network algorithms necessitates fewer samples than deep neural networks to achieve consistent performance <cit.>. The algorithms selected was based on their diverse mechanisms, including Light Gradient Boosting Machine (LightGBM), Support Vector Machine (SVM), Logistic Regression (LR), and K-Nearest Neighbors (KNN). Moreover, we compared the latent progress representation produced by GLP by extracting the outputs of LIB (Progress_emb) and CB (Progress_out) as delineated in Fig. <ref>. Subsequently, the predictive results based on the original data (normalized, but not processed with GLP), Progress_emb, and Progress_out were compared. The reported performance was also the mean value obtained after executing the training process five times, with TVR negative cases randomly downsampled and data partitioned into training and testing sets. The fine-tune classifier is a binary classifier distinguishing TVR occurrence (Yes/No). The assessment metrics for TVR incidence included the area under the receiver operating characteristic curve (AUROC), accuracy, sensitivity, specificity, precision, and F1 score <cit.>. The differentiation in evaluation metrics between the original data and the representations was also statistically validated using an independent T-test to determine whether the differentiation achieved statistical significance. Furthermore, we plotted the distribution of the original data, Progress_out when GLP reached g/2, and Progress_out when GLP reached g to graphically represent the variations throughout the process. g/2 signifies that the iteration did not reach the targeted incident, indicating outputs when GLP had not reached the targeted time yet. § RESULTS Table <ref> illustrates the demographic information of the patients enlisted from the two datasets. Notably, patients in the source domain (HTN to DM patients) are comparatively younger than those in the target domain (TVR patients), and it is observed that TVR usually occurs within a period of 2.32 ± 2.64 years. Fig. <ref>a showcases the averaged R^2 of different training approaches (encompassing all interpolation methods with certain ranging from 0 to 5). The results indicate that SSL and two-stage training processes exhibit similar performances, with both achieving mean R^2 = 0.46; in contrast, interpolated and hybrid training techniques achieved lower mean with larger variation. Figs. <ref>b to d, R^2 of GLP training based on different training approaches with certain ranging from 0 to 5 is depicted. Notably, the two-stage training process (as shown in Fig. <ref>b) surpasses SSL (baseline) as the only approach that outperforms with mean values of 0.49 (p = 0.508) and 0.48 (p = 0.603) for linear and PCHIP interpolation, respectively. While not statistically significant, our findings suggest that the two-stage training process outperformed SSL. Moreover, linear interpolation performs better than PCHIP (p = 0.824) and barycentric (p = 0.031), while PCHIP outperforms barycentric (p = 0.046). On the other hand, other approaches (depicted in Fig. <ref>c and d) appear to have a weaker performance than the horizontal mean line (R^2 < 0) and larger variation. Table <ref> presents a summary of the best-performing certain setting for each examination, which was found to be inconsistent among different examinations. The response of individual examinations to GLP was observed to be different. As previously mentioned, the two-stage training process outperformed SSL in most examinations, although the degree of improvement was small. While specifying certain did improve model performance (with an increment from 0.49 to 0.57 for linear interpolation), the correlation between R^2 and certain was found to be weak when verified with a Pearson correlation test (linear: -0.002, PCHIP: 0.026, and barycentric: -0.040). Detailed certain performances of each examination are provided in Appendix <ref>. Based on the best performed linear interpolation, we trained the GLP pretrain model by leveraging optimized certain settings tailored to each laboratory test. Table <ref> demonstrates the fine-tuned results of the target domain task. Upon being processed by GLP, the Progress_out exhibited a marked improvement in classification performance, with the average performance achieving an AUROC of 0.91, accuracy of 0.90, sensitivity of 0.80, specificity of 0.98, and F1 score of 0.86; all metrics were significantly superior to the performance of the original data (p < 0.01) and Progress_emb (p < 0.01). LGBM proved to be the best-performing algorithm in both Progress_emb and Progress_out, while SVM performed best using the original data. Fig. <ref> provides a visual representation of the distribution changes resulting from GLP, using glucose AC and LDL-c as examples. The figure reveals that prior to processing, it was difficult to separate the distributions of TVR and non-TVR cases (as demonstrated in Fig. <ref>a); however, after processing with GLP, non-TVR cases gradually converged to a single point, whereas TVR cases exhibited a more scattered distribution (as shown in Fig. <ref>b to c). § DISCUSSION Laboratory analysis is a critical component of disease progress monitoring and a commonly used element in data-driven research and healthcare applications. Our study employed SSL and transfer learning to successfully transfer the trend of patient progress of cardiovascular laboratory parameters from one patient group to another. To our knowledge, this is the first study to apply laboratory progress of cardiovascular disease between patient groups, demonstrating that disease progress can be transferred with adequate processing, and the trend of general cases can be beneficial for developing data-driven applications for small-numbered patient groups. Pretrained models capture the temporary status of patient progress across time and generate latent representations that enhance the prediction ability for other tasks. With the adoption of EHRs in modern hospitals, a large number of general cases such as HTN and DM patients were collected, whereas specific cases such as patients with TVR after PCI remained small in number. As HTN and DM are risk factors of TVR <cit.>, we successfully transferred the laboratory progress trend of HTN patients (who were yet to be diabetic) to predict the progress of PCI patients. This transformation enhanced our ability to infer patient progress, which was not limited to episodic observation. Despite the diverse nature of the two patient groups, cardiometabolic diseases were intercorrelated. The datasets were from two different medical institutes, indicating diverse patients, staff, workflows, and measuring equipment; therefore, the generality of our work is ensured. Observing disease progression requires long-term monitoring. SSL is feasible in bridging the gap in data irregularity, absenteeism, and sparsity, and achieving adequate prediction, indicating auto-annotated labeling can provide sustainable training. Learning from interpolated data in advance is capable of enhancing prediction performance; however, the effects vary between interpolation methods. Linear and PCHIP are designed to obtain a continuous function, whereas barycentric is designed to interpolate based on the center of mass. The distribution of laboratory progress is more similar to a continuous curve that extends across time and is less likely to be distributed in bundles. Wrong estimation of absent data induces higher noise in the data. Our results show that linear and PCHIP interpolation provide a more informative estimation of the progress trend of laboratory results, leading to better performance than SSL. The learned representation from supervised objectives tends to be more specific to a single domain and may have limited transferability to out-of-distribution domains <cit.>; therefore, adjusting the model based on SSL provides more extensible extrapolation ability. Current practice recommends patients return on a 3-month basis. Our proposed approach interpolates the input frame monthly, implying that the input frame will inevitably consist of estimated values. certain is a method for regulating the proportion of real values within the input frame. Our results did not indicate a strong relationship between R^2 and the number of real observations; nevertheless, for laboratory tests such as LDL-c and LDL-c/HDL-c, linear interpolation enlarges the tolerance of absent periods. This infers that, with adequate estimation, inferences regarding patient outcomes can be based on less frequent visits, thereby mitigating the travel burdens and medical expenses for patients. Due to limited data size, TVR prediction was trained with non-neural network algorithms. Deep neural networks did not perform well in this scenario. The results show that without the support of GLP, original data were not distinguishable enough to make substantial predictions; however, after being processed with GLP, the classifier was able to adequately separate TVR and non-TVR cases. The main difference between Progress_emb and Progress_out is that Progress_out is a condensed version that indicates laboratory values for the subsequent month, whereas Progress_emb still possesses information on age, gender, certainty mask, discrete value range encoding, and laboratory values. The condensed version has a distillation effect and provides a more beneficial indication of future trends. Comprehensive output of GLP is more informative than a single block. The collective performance metrics present a holistic evaluation of the four algorithms that employ varying mechanisms, implying that the output of GLP is notably more distinctive. In the original dataset, SVM exhibited superior performance compared to the other algorithms, while in Progress_out, LGBM surpassed the remaining methods. SVM is recognized for utilizing kernels and identifying a hyperplane that maximizes the margin between the plane and classification clusters. On the other hand, tree-based algorithms emphasize individual variables and are more explicit in interpreting inherited rules. The findings demonstrate that GLP effectively transformed the data into a more targeted representation, which facilitated the creation of variable-specific rules. Upon examining the distribution shifts from the original data to Progress_out, which were iteratively applied to g, we observed that non-TVR cases gradually converged to a singular point, whereas TVR cases appeared more scattered. These findings are in line with clinical observations that indicate stable patients are more predictable, whereas those with scattered observations are at higher risks. The transferred progression enables improved patient risk assessment. Nevertheless, we were unable to obtain genuine patient observations at the target event, which prevented us from verifying the output's accuracy. Furthermore, it is important to note that the output of GLP does not necessarily correspond to real-world laboratory values even after reverse-normalized. The value itself does not correspond to a real-world value. To achieve this, a reverse network or decoder is required to map the latent output to real-world values. This study is subjected to certain limitations. Presently, GLP and certain respond differently to laboratory tests. Models are pretrained for each laboratory test independently. Although combining all laboratory pretrained models into a single model may seem like a feasible solution, aggregating all laboratory data leads to an expansion of the interpolation range for individual examinations, while the number of true observations remains constant. This results in the inability to regulate the optimal number of true observations independently, which lead to suboptimal training. Furthermore, there are various types of laboratory analyses, with some being numerical values and others being categorical variables. This study solely focused on the examination of numeric results and can only be applied to other numeric examinations. § CONCLUSION Our research capitalized on the benefits of SSL and pre-trained models, and effectively transferred the progression trends of cardiovascular laboratory parameters between patient groups, thereby demonstrating its efficacy in aiding the risk assessment of cardiovascular events. This transformation enhanced our ability to infer patient progress without limited to episodic observation. Auto-annotated labeling has the potential to overcome the difficulties associated with time-series data and provide sustainable training. Pre-learning from interpolated data can enhance the predictive outcomes. The fine-tuned results exhibit distinct separability independent of algorithmic mechanisms. The potential for extending this approach to other laboratory tests and diseases is promising, and will be explored in future investigations. § ACKNOWLEDGMENT This work was supported by the Ministry of Science and Technology in Taiwan under Grant MOST 111-2636-E-A49-014, 111-2628-E-A49-026-MY3 and Taipei Veterans General Hospital under Grant V1118-031. § DEFINITION OF PATIENTS WITH HYPERTENSION AND DIABETES MELLITUS. § DISCRETE VALUE RANGE OF LABORATORY TESTS § R^2 OF INDIVIDUAL LABORATORY TESTS BASED ON LINEAR AND PCHIP TWO-STAGE TRAINING ieeetr
http://arxiv.org/abs/2303.06946v1
20230313092752
Context-Aware Selective Label Smoothing for Calibrating Sequence Recognition Model
[ "Shuangping Huang", "Yu Luo", "Zhenzhou Zhuang", "Jin-Gang Yu", "Mengchao He", "Yongpan Wang" ]
cs.AI
[ "cs.AI", "cs.LG" ]
#1 @ACM@anonymous@addto@macroauthornotes footnote#1 Corresponding author. 1South China University of Technology, Guangzhou, China 2Pazhou Laboratory, Guangzhou, China 3DAMO Academy, Alibaba Group, Hangzhou, China 4Alibaba Group, Hangzhou, China eehsp,jingangyu@scut.edu.cn, luoyurl@126.com, zhenzhouzhuang@foxmail.com, mengchao.hmc@alibaba-inc.com, yongpan@taobao.com Shuangping Huang, Yu Luo, Zhenzhou Zhuang, Jin-Gang Yu, Mengchao He, Yongpan Wang Despite the success of deep neural network (DNN) on sequential data (i.e., scene text and speech) recognition, it suffers from the over-confidence problem mainly due to overfitting in training with the cross-entropy loss, which may make the decision-making less reliable. Confidence calibration has been recently proposed as one effective solution to this problem. Nevertheless, the majority of existing confidence calibration methods aims at non-sequential data, which is limited if directly applied to sequential data since the intrinsic contextual dependency in sequences or the class-specific statistical prior is seldom exploited. To the end, we propose a Context-Aware Selective Label Smoothing (CASLS) method for calibrating sequential data. The proposed CASLS fully leverages the contextual dependency in sequences to construct confusion matrices of contextual prediction statistics over different classes. Class-specific error rates are then used to adjust the weights of smoothing strength in order to achieve adaptive calibration. Experimental results on sequence recognition tasks, including scene text recognition and speech recognition, demonstrate that our method can achieve the state-of-the-art performance. <ccs2012> <concept> <concept_id>10010147.10010257.10010321.10010337</concept_id> <concept_desc>Computing methodologies Regularization</concept_desc> <concept_significance>500</concept_significance> </concept> <concept> <concept_id>10003033.10003083.10003095</concept_id> <concept_desc>Networks Network reliability</concept_desc> <concept_significance>500</concept_significance> </concept> </ccs2012> [500]Computing methodologies Regularization [500]Networks Network reliability Context-Aware Selective Label Smoothing for Calibrating Sequence Recognition Model Shuangping Huang^1,2, Yu Luo^1, Zhenzhou Zhuang^1, Jin-Gang Yu^1,2*, Mengchao He^3, Yongpan Wang^4 =========================================================================================================== § INTRODUCTION Benefited from the remarkable fitting capacity of deep learning models, the performance of sequential data recognition has been largely boosted recently, which consequently enables their deployment in plenty of user-facing applications, such as clinical text recognition <cit.>, autonomous driving <cit.> and speech recognition <cit.>. However, these deep models, most typically trained with the cross-entropy loss function, tend to assign a high probability even for a wrong prediction, which is the so-called over-confidence problem of deep sequential models. Confidence calibration has been proposed as one popular solution to the over-confidence problem. Typical methods in machine learning, including Platt scaling<cit.>, isotonic regression<cit.> and histogram binning<cit.>, inspire the confidence calibration of deep models <cit.>. Unfortunately, the majority of the existing methods mainly focus on non-sequential data, which cannot be trivially adapted to the calibration of sequential data. One key reason is that the task of sequence recognition involves a temporal process of predicting each token in order, where the contextual dependency among tokens is of critical importance (see in Fig. <ref>). Therefore, simply conducting uniform calibration on each token independently, unaware of inter-token dependency, is limited for sequential data. There have already been a couple of previous attempts on confidence calibration of sequence recognition. Some authors considered the sequential characteristics and attempted to incorporate them into the sequential framework<cit.>. The varying sequential length is utilized as the setup basis of temperature values based on the temperature scaling technique <cit.>. Attention scores calculated during the sequence modeling are also utilized as the weights of temperature values <cit.>. In natural language processing (NLP), some measurements of sequence such as N-gram and BLEU<cit.> are exploited to guide the confidence allocation of correct and wrong predictions, to avoid the over-confidence typically caused by the cross-entropy loss <cit.>. Although the mentioned sequential properties are taken into account in these works, they still have two main limitations: 1) The influence of contextual dependency is seldom explored, and specialized manners of contextual feature extraction in NLP also make it hard to be generalized to sequential recognition tasks. 2) These methods ignore the uneven class distribution of predictions globally, while only considering the pairwise relationship between the prediction and the ground truth locally. In this paper, we propose a Context-Aware Selective Label Smoothing method to implement a sequence-level calibration for sequential recognition models. To fully exploit the contextual dependency underlying the sequence, we construct confusion matrices for each class to represent the prediction distribution according to the contextual relation. Statistics are derived from a support set, which resembles the data distribution of the training set and thus is served as a reference for prediction distribution. Specifically, the probability distribution of labels belonging to different classes is reallocated based on the corresponding error rate in the confusion matrix, wherein error-prone labels are assigned with stronger smoothing strength. In this way, label smoothing on sequence can be implemented adaptively by considering contextual dependency and unbalanced prediction classes simultaneously. To evaluate the effectiveness of the proposed method, we conduct experiments on two sequence recognition tasks, including scene text recognition and speech recognition. Experimental results demonstrate that our method is superior to the state-of-the-art calibration methods, and also can be well generalized on sequence recognition tasks. The main contributions of this paper are summarized as: * We propose a novel sequence-level confidence calibration method to adaptively calibrate the over-confident model. * The contextual dependency of sequence is fully explored to construct confusion matrices of contextual token prediction for each class, which is utilized as the weight basis for adaptive label smoothing. * We demonstrate that our proposed method can generalize well on sequence recognition tasks to achieve calibrated results with a certain improvement on recognition accuracy. § RELATED WORK §.§ Calibration on Non-sequential Data The well-established calibration methods for non-sequential data related tasks, such as image classification, are borrowed from machine learning techniques<cit.>. With the prosperity of deep learning, the calibration of deep neural networks has recently attracted a lot of research interests in the literature. Post-processing based calibration methods learn a regression function based on a small held-out dataset to adjust the output confidence value without retraining the neural network from scratch and influencing the accuracy. Temperature scaling is the most commonly used method proposed by Guo et al. <cit.>. It is a variant version of Platt scaling through introducing a temperature parameter <cit.> to adaptively calibrate the models. Ji et al. <cit.> further implement temperature scaling in a bin-wise setting to improve the performance via denser prediction interval. However, as the confidences of all the predictions are calibrated with fixed parameters, it may lead to the underestimation of the predictions. Additional methods calibrate the confidence through optimizing the loss function in the training process. Label smoothing <cit.> is proposed as a regularization technique to soften the one-hot encoding distribution to calibrate the model <cit.>. Kumar et al. <cit.> and Mukhoti et al. <cit.> replace the general cross entropy loss with the distance between accuracy and confidence score and focal loss <cit.>, respectively. The decent results are achieved on non-sequential data, however, these methods are hard to be directly applied to the sequence. Simply conducting a uniform calibration across all the tokens of a sequence is too aggressive to produce good calibration performance. §.§ Calibration on Sequential Data Instead of trivially applying non-sequential calibration methods on each token, some methods attempt to exploit the intrinsic characteristics to facilitate sequence-level calibration. Kuleshov and Liang <cit.> firstly consider confidence calibration in the context of structure prediction problem, which demonstrates that utilizing structural features will produce better calibration performance on structured prediction such as sequence. Recent methods for sequential data can be categorized into two directions. Based on temperature scaling <cit.>, Leathart et al. propose a sequential length-related calibration method <cit.>. As calibration error varies with sequential length, different temperature values are set for calibration. Ding et al. obtain the adaptive temperature values for different pixels or voxels for semantic segmentation <cit.>. Other methods are inspired by label smoothing <cit.>. In natural language processing, Elbayad et al. complete token-level smoothing with sequence-level smoothing methods. The nearby target sequence is sampled according to the BLEU score <cit.> to conduct sequence-level loss smoothing <cit.>. Lukasik et al. utilize n-gram overlapping with the target sequence in the label smoothing method to guarantee the semantic similarity of translated sequence <cit.>. Song et al. smooth the loss function according to the occurrence of the n-gram context in candidate word set as the weight <cit.>. Although better calibration performance could be achieved on sequential data, few methods consider the uneven distribution of dataset to flexibly calibrate the prediction of different labels, and additionally, the potential contextual information is not fully explored to calibrate on the recognition of sequential data tasks. § PRELIMINARIES §.§ Sequential Confidence In sequential data recognition tasks, we aim to assign an L-length sequential label vector Y={y_1, y_2, ⋯, y_L} to the input x. For example, in scene text recognition, x is an image containing a text instance and Y is the sequence of character tokens. And in speech recognition, x is a sound waveform and Y is the sequence of phoneme tokens. For sequence prediction, the attention-based model consisting of RNN cells is commonly adopted. The token is predicted based on the information of previous states and the proceeding token. Assuming the set of class labels being {1,...,K}, the predicted token ŷ_t is obtained by maximizing the conditional probability as below: ŷ_t= max_1≤ k ≤ K p_t(y_t = k|x,y_<t) where the y_<t represents the previous tokens before the time step t. The token in the sequence is predicted in a temporal manner. After decoding at each time step, the sequence consisting of a series of tokens Ŷ=(ŷ_1, ŷ_2,⋯, ŷ_L^') of length L^' can then be predicted. For the calibration of sequential data, our objective is to optimize the holistic confidence score of sequence ℙ(Ŷ|x), instead of individual token confidence p_t(y_t=ŷ_t|x). Probabilistically, the sequential confidence ℙ(Ŷ|x) is a conditional joint probability that can be decomposed as follows: ℙ(Ŷ|x)= ℙ(ŷ_1, ŷ_2,⋯, ŷ_L^'|x) c = ℙ(ŷ_1|x) ×ℙ(ŷ_2|x,ŷ_1) ×⋯×ℙ(ŷ_L^'|x,ŷ_1,⋯,ŷ_L^'-1) = ∏_t=1^L^'p_t(y_t=ŷ_t|x,ŷ_<t) where ŷ_<t represents the previous tokens predicted before time step t. As shown in Eq. <ref>, the cumulative multiplication of token confidence p_t(y_t=ŷ_t|x,ŷ_<t) predicted by a the sequence models, can probabilistically represent the confidence of sequence ℙ(Ŷ|x). §.§ Evaluation of Confidence Calibration Calibration requires the confidence score to reflect the true accuracy of prediction. To evaluate whether a sequential model is well calibrated, several common metrics are introduced as follows. Brier Score <cit.> The brier score(BS) is known as the mean square error (MSE). By counting each correctly predicted sequence as one, while each wrong one as zero, the brier score is then defined by: Brier Score =1/N∑_i=1^N(𝕀(Ŷ_i = Y_i) - ℙ(Ŷ_i|x))^2, where N denotes the total number of samples of testing data,𝕀(·) is the indicator function, and ℙ(Ŷ_i|x) denotes the confidence of the i-th sequence. Expected Calibration Error (ECE) <cit.> The ECE evaluates the calibration performance through measuring the absolute distance between the confidence and accuracy in a bin-wise manner. Firstly, the probability space [0,1] is split into M bins, and the test samples are also divided into different bins according to the corresponding confidence scores. The accuracy and the average confidence of the m-th bin are calculated as follows: Acc(B_m) = 1/|B_m|∑_Ŷ_i ∈ B_m𝕀(Ŷ_i = Y_i), Conf(B_m) = 1/| B_m |∑_Ŷ_i∈ B_m ℙ(Ŷ_i|x), where B_m and | B_m | are the test samples and the number of samples in the m-th bin, respectively. And the ECE is formally defined as: ECE = ∑_m=1^M| B_m |/N| Acc(B_m) - Conf(B_m) |, For a well-calibrated model, the ECE value should be close to 0 with the accuracy is equal to the confidence score. Reliability Diagram <cit.> The reliability diagram is the plot of Acc(B_m ) versus Conf(B_m ). As is shown in Fig. <ref> of Sec. <ref>, the solid concave curve in the reliability diagram represents the over-confidence state, while the convex one represents the confidence is less than the expected accuracy. If the model is well calibrated, the solid line should be aligned with the dotted diagonal line. §.§ Standard Label Smoothing As the model training is associated with cross entropy loss using one-hot encoding, the large distance of 0-1 distribution is prone to make the model become over-confident for the prediction, which is undesirable for decision-making. Thus, the standard label smoothing (LS) is proposed as a common regularization technique for deep model <cit.>. It smooths the one-hot distribution with a hyper-parameter α to obtain a soft distribution q̂_t(y_t=k) of every token y_t: q̂_t(y_t=k) = {[ 1-α, if y_t=k; α/K-1, if y_t ≠ k; ]. Although LS is proved to be helpful to alleviate the over-confident problem<cit.> by smoothing confidence 1-α in soft distribution, imposing the same smoothing strength on the label of all the tokens indiscriminately is inapplicable for calibrating sequence. According to the Eq. <ref>, even if all the tokens are correctly predicted, the sequential confidence is calculated as ℙ(Ŷ|x)≈ (1-α)^L^', which conversely leads to an exponential reduction on confidence. § METHOD Considering the uneven prediction distribution of different classes, we first design a selective label smoothing (SLS) method to conduct an adaptive calibration based on the confusion matrix of misprediction statistics (subsection <ref>). Furthermore, we exploit the contextual dependency in the sequence and propose a context-aware selective label smoothing method based on SLS (subsection <ref>). §.§ Selective Label Smoothing The standard label smoothing method smooths the one-hot distribution of all classes evenly, while ignoring the differences between different character categories. It is a common phenomenon that the predicted error distribution varies from class to class. As shown in Fig. <ref>, the predicted error rate of character “j” is large than character “a”. It is reasonable to reduce the prediction confidence of error-prone character "j" by standard label smoothing. However, reducing the prediction confidence of non-error-prone character "a" is unreasonable. In this case, we focus on the frequent error-prone classes to implement an adaptive label smoothing. For the classes with few or even zero errors, it is needless to conduct label smoothing. To obtain the statistical error-prone classes, we employ a support datasets that resembles the data distribution of the training set as the reference prediction distribution. And we construct a confusion matrix C_m=(c_i,j)∈ R^K × K to quantitatively represent the prediction of K classes, where c_i,j denotes the number of the elements of the i-th class but are recognized as the j-th class. Fig. <ref> is an example confusion matrix of the support dataset on scene text recognition task. Outsides the correct prediction distributed on the diagonal line, the misprediction distribution of some classes is higher than that of other classes. Here, we set a threshold to select those classes with a high error rate. And the error-prone set E can be defined: E={ k | 1 - c_k,k/∑_jc_k,j > T , k = 1,2,⋯, K } where T denotes the probability threshold of the error-prone tokens. And the selective smoothed label distribution q̂(y_t=k) can be represented as follows: q̂(y_t=k) = {[ 1 , if y_t=k and y_t ∉ E; 1-α, if y_t=k and y_t ∈ E; 0 , if k ≠ y_t and y_t ∉ E; αc_y_t,k/∑_jc_y_t,j, if y_t ≠ k and y_t ∈ E; ]. If the token y_t falls into the error-prone set E, a corresponding smoothing strategy will be conducted on the token. The error rate c_y_t,k/∑_jc_y_t,j is used as the weight of smoothing strength α, when the prediction k≠ y_t. §.§ Context-aware Selective Label Smoothing Considering the contextual dependency existing in the sequential recognition model, the prediction errors distribution of every token depends on the different previous token. The error-prone set is related to the class of the previous token. Thus, we further propose a context-aware selective label smoothing method. We analyze the prediction error distribution under the condition of previous token of different classes, and similarly represent it in the form of a confusion matrix. Then, We obtain K confusion matrices {C_k | C_k=(c_k,i,j)∈ R^K × K, k = 1, 2, ⋯, K}. The C_k is the confusion matrix of predicted token, when the preceding token belongs to the k-th class. We name it as context confusion matrix. And c_k, i, j represents the number of current token belonging to the i-th class that is recognized as the j-th class for the k-th class of the preceding token. Fig. <ref> is the example context confusion matrices of different classes on scene text recognition. Errors rarely occur on the character tokens, when the preceding token is a digit “3”. There are few prediction errors for most character tokens when the preceding token is an “A”. But errors often occur on the character “C” when the preceding token is an “V”. It can be observed that it is rational to conduct a context related calibration since the misprediction distribution varies from class to class. Similar to the process of SLS, totally K error-prone sets E_k are obtained: E_k ={ i | 1 - c_k,i,i/∑_jc_k,i,j > T , i = 1,2,⋯, K }, where E_k denote the error-prone token set of the k-th class. Therefore, the conditional probability distribution of context-aware selective label smoothing is correlated with the class of the preceding token y_t-1. The soft-target distribution q̂(y_t=k | y_t-1) is computed as: q̂(y_t=k | y_t-1) = {[ 1 , if y_t=k and y_t ∉ E_y_t-1; 1-α, if y_t=k and y_t ∈ E_y_t-1; 0 , if y_t ≠ k and y_t ∉ E_y_t-1; αc_y_t-1,y_t,k/∑_jc_y_t-1,y_t,j, if y_t ≠ k and y_t ∈ E_y_t-1; ]. When the previous token is y_t-1, the distribution q̂(y_t=k | y_t-1) will adaptively select the error-prone set E_y_t-1. If the current token y_t is in the error-prone set E_y_t-1, a corresponding smoothing strategy will be conducted on the token y_t. Loss = -1/L∑_t=1^L∑_k=1^Kq̂(y_t=k | y_t-1)log(P(ŷ_t = k)). The corresponding loss function will be redefined in the training process. §.§ Sequence Alignment Strategy In sequence recognition task, the existence of the omissive or redundant token in the prediction sequence sometimes leads to the misalignment between it and the reference sequence. Such misalignment results in two problems. Firstly, since one token is missing in the sequence prediction, the sequence confidence would be inaccurate without the attendance of the probability of the omissive token. The similar explanation is applied for redundant tokens. And the other problem is that the missing or redundant token makes it confusing to determine the alignment relationship between the ground truth token and the corresponding predicted token, which also influences the construction of confusion matrix. To handle the misalignment problem, we introduce a “blank” class to fill the place of the missing token, and track the alignment between prediction and ground truth sequence along an operator sequence of edit distance. For example, as is shown in Fig. <ref>, the misalignment between predicted and reference sequence is caused by the redundant character “l” and the missing character “t”, which correspond to the deletion and insertion operation in edit distance, respectively. By tracking the flag of edit distance (deletion and insertion), we complement the “blank” space in the corresponding position to realize the alignment. §.§ Adaptive Smoothing Strength As is analyzed in subsection <ref>, the sequential confidence will become quite small due to the cumulative effect of tokens confidence smoothed via the same hyper-parameter α. In order to solve the above-mentioned less confident problem of sequence, a trick is introduced to label smoothing. We adaptively adjust the value of hyper-parameter α according to the length L of sequence. For each sequence, α=1-√(1-α^'), which compensates for the negative impact of less confidence caused by the cumulative calculation. § EXPERIMENT AND ANALYSIS In this section, the experimental results are described and discussed. As our method focuses on sequential data, we conduct it on two sequential recognition tasks: scene text recognition (STR) and speech recognition(SR). For each task, the experimental setup including datasets, base models and implementation details are firstly described. Furthermore, we discuss the calibration results under different conditions: uncalibrated model, the model calibrated via the LS, temperature scaling (TS) and the proposed methods. §.§ Scene text recognition §.§.§ Experiment setup We evaluate the proposed methods on the available benchmark datasets, including four regular datasets: IIIT5K-Words (IIIT5k) <cit.>, Street View Text (SVT) <cit.>, ICDAR 2003 (IC03) <cit.>, ICDAR 2013 (IC13)<cit.>, and three irregular datasets: ICDAR 2015 (IC15) <cit.>, SVT-Perspective (SVTP) <cit.>, CUTE80 (CUTE) <cit.>. And the support dataset is the ensemble of the training datasets of IIIT5k, SVT, IC03, IC13 and IC15. The support dataset contains a total of 8539 text instances and resembles the data distribution of training dataset <cit.>, from which we can get a general prediction distribution. The experiment is conducted on the state-of-the-art models: ASTER model proposed by Shi et al.<cit.>, and modular STR framework proposed by Baek et al. <cit.>. ASTER is an attention-based model that uses a Spatial Transformer Network <cit.> for rectifying oriented or curved text, and a BiLSTM for sequence modeling. For the modular STR framework, we uniformly use the Spatial Transformer Network (T) and attention-based decoder (A). Specifically, the VGG-16 (V) <cit.> and ResNet-34 (R) <cit.> are utilized as backbone networks. And the model with or without a BiLSTM is considered (B/N). We adopt three architectures of different module combinations: TVBA, TRNA and TRBA. During the calibration, the dimension K of the confusion matrix corresponds to the number of prediction classes (26 characters, 10 digits and 1 blank) of STR task. We obtain confusion matrix and context confusion matrix from the predictions of the uncalibrated model on the support set, and then use SLS and CASLS to fine-tune the uncalibrated model. Here, we set up the threshold of the error-prone T=0.5, the smoothing parameter α^'=0.05, and the interval width of each bin B_m=15. §.§.§ Results and Discussion As is shown in Fig. <ref>, the blue curves below the diagonal line represent that all the uncalibrated STR models tend to be over-confident. As we analyzed before, the models trained with the LS(orange curves in Fig. <ref>) will become less confident instead, the curves is obviously convex in the high-confidence intervals. For all the calibration methods, SLS (green curves), TS (purple curves) and CASLS (red curves) approach are superior to the LS approach, among which the curves of TS and CASLS almost coincide with the diagonal line and can achieve the best calibration performance. Table <ref> shows the quantitative calibration results of LS, TS and the proposed SLS and CASLS methods. The accuracy, ECE and brier score(BS) are adopted as the measurements. In terms of ECE and BS, comparing with LS that widens the distance between accuracy and confidence, SLS and CASLS can achieve a good calibration performance on sequence through considering the uneven prediction distribution of different classes. And it is noted that, due to the utilization of contextual dependency, CASLS further outperforms SLS. And TS outperforms both of the proposed methods on TVBA, TRNA and TRBA. However, TS will not influence the accuracy, while the proposed methods can improve the accuracy based on the base model, and about 1.3% improvement is achieved on TVBA. §.§ Speech Recognition §.§.§ Experiment setup We conduct the experiment on AISHELL-1 corpus <cit.>. It is a large-scale Mandarin benchmark that contains about 170 hours speech data recorded from 400 speakers. And there are a total of 141,600 sentences in the recording. In the corpus, the training dataset contains 120,098 sentences from 340 speakers, the test dataset contains 7,176 sentences from 20 speakers. The remaining data valid dataset is utilized as the support dataset to obtain the general prediction distribution. And we adopted the recent state-of-the-art toolkits as baseline: the WeNet proposed by Gulati et al. <cit.> and the ESPNet proposed by Watanabe et al.<cit.>. The WeNet utilizes a shared encoder that consists of multiple Transformer<cit.> or Conformer <cit.> encoder layers to extract the phonetic feature. And a joint CTC and attention decoder is used for sequence prediction. And ESPNet utilizes recurrent neural network as encoder, and adopts the same decoder as WeNet does. It is noted that both models are trained with LS (α^'=0.1) already. For a fair comparison, we retrain the models with cross-entropy loss to serve as uncalibrated models. And the CASLS is conducted based on the uncalibrated ones. During the calibration, we reduce the dimensions of confusion matrix as the number of phenom tokens is too large (4,000 classes) to calculate in the limited computer memory. Specifically, only the classes that belong to the error-prone set are reserved in the confusion matrix. Moreover, not only the prediction of many classes is sparse, but also the correct rate of the corresponding classes is extremely low. Therefore, the threshold of the error-prone T should be low. Here, we set up the threshold of the error-prone T=0, the smoothing parameter α=0.2, and the interval width of each bin B_m=15. §.§.§ Results and Discussion Fig. <ref> shows the reliability diagram of WeNet and ESPNet. Similarly, all the uncalibrated models (blue curves) and the models calibrated by the LS (orange curves) suffer from the over-confident and less-confident problems, respectively. The highest sequential confidence is even lower than 0.6 after conducting LS on each token on both models. And the TS (red curves) and CASLS (green curves) approaches can achieve a relatively better calibration performance. In table <ref>, the calibration performance of LS and CASLS are listed. And an additional metric, word error rate (WER), is added based on the metrics used in STR task. Both models trained with CASLS achieve the improvement in accuracy and the reduction in WER. In terms of ECE and BS, the CASLS reduce the ECE by 53% on WeNet. On ESPNet, the effect of CASLS is slighter, but still achieves a 55% reduction in ECE. Although TS performs best in terms of ECE and BS, our proposed method can effectively improve the recognition metrics with the second best performance on calibration metrics. § CONCLUSION In this paper, we have investigated the problem of confidence calibration for sequence recognition. A so-called Context-Aware Selective Label Smoothing (CASLS) method has been proposed, which boosts label smoothing by leveraging the intrinsic contextual dependency underlying sequences and the statistical priors of class-specific prediction errors. Intensive experiments for two sequence recognition tasks, i.e., scene text recognition and speech recognition, both on publicly available benchmarking datasets, have been carried out to demonstrate our CASLS can achieve state-of-the-art performance. Ablation studies have also been conducted to further verify the effectiveness of the proposed method. In our future work, we will further verify our method on more sequential recognition tasks. We will also explore more effective strategies for making use of the contextual information. § ACKNOWLEDGEMENTS The research is supported in part by Guangdong Basic and Applied Basic Research Foundation (No. 2021A1515012282), National Nature Science Foundation of China (Granted No. 61936003, 62076099) and the Alibaba Innovative Research (AIR) Program. ACM-Reference-Format
http://arxiv.org/abs/2303.06769v1
20230312222730
Exploring $2d$ localization with a step dependent coin
[ "Kallol Sen" ]
quant-ph
[ "quant-ph", "cond-mat.stat-mech", "hep-th", "math-ph", "math.MP" ]
decorations.markings decorations.pathmorphing equationsection αβ̱χ̧δ̣ϵεϕγηıικ̨łλμνπψρ̊στþθωξζΔΦΓΩΘ∂q̃f̃z̅⟨⟩f_∞↑↓𝒜ℬ𝒞𝒟ℰℱ𝒢ℋℐ𝒥𝒦ℒℳ𝒩𝒪𝒫ℛ𝒮𝒯𝒲𝒵PnxyDKPMLh̅𝕀ℝℓ̃ tr #1 #1empty Exploring 2d localization with a step dependent coin Kallol Senemail: kallolmax@gmail.com ICTP South American Institute for Fundamental Research, IFT-UNESP (1^∘ andar), Rua Dr. Bento Teobaldo Ferraz 271, Bloco 2 - Barra Funda, 01140-070 São Paulo, SP Brazil Abstract We generalize the coin operator of <cit.>, to include a step dependent feature which induces localization in 2d. This is evident from the probability distributions which can be further used to categorize the localized walks. Localization is also evident from the entropic measures. We compute and compare three distinct measures (a) Shannon Entropy in the position and coin space, (b) Entanglement entropy between position and spin space, and (c) Quantum Relative Entropy which is a POVM of density operators of the step dependent and step independent coins. Shannon Entropy and Entanglement Entropy are periodic and bounded functions of the time steps. The zeros of Shannon and Entanglement entropies signify a complete localization of the wave-function. The Quantum Relative Entropy and Quantum Information Variance exhibit a similar periodic feature with a zero minima where the step dependent and step independent walks coincide. Finally, we compute the numerical localization length (inverse of the Lyapunov Exponent) for the step dependent coin as a function of energy and compare with an approximate perturbative computation, where we put the step dependent coin as a perturbation in the background of a step independent coin. In both the instances, we find that the localization length peaks at approximately the same positions in the momentum space. § INTRODUCTION Localization in physics <cit.>, describes a phenomenon where a disorder or decoherence in the system can give rise to a localized wave function within the system. Localization has been in study for its interesting and important implications regarding quantum transport <cit.>, critical exponents <cit.> and even in supersymmetric theories <cit.>. The transition from weak to strong localization, also called Anderson transition, a field of active study in disordered spin chains <cit.>. In this work, we study the decoherence effects of a step dependent coin on random walks following the 1d approach of <cit.>. Several aspects of localization in random walk has been considered in <cit.> for random environments, for entropy guided walks <cit.> and in the effects of recurrence <cit.> and so on. In this work we consider the simple generalization of the approach in <cit.> and extend the analysis of <cit.>, to show that a step dependent coin is capable of inducing entanglement in the random walk in 2d. The step dependent coin is given by, 𝐂_t(θ_1,θ_2,ϕ)=([ e^-itϕcos tθ_1 0 0 -ie^-itϕsin tθ_1; 0 e^itϕcos tθ_2 -ie^itϕsin tθ_2 0; 0 -ie^itϕsin tθ_2 e^itϕcos tθ_2 0; -ie^-itϕsin tθ_1 0 0 e^-itϕcos tθ_1 ]) . that is capable of inducing localization in the walk. The corresponding step independent coin is given by 𝐂_SIC=𝐂_t=1. At each step, we also compare the walks between the step dependent coin (SDC) and its corresponding step independent coin (SIC) counterpart. We summarize our main findings below. * Since a non-zero probability distribution for our specific form of coin exists only along the diagonals, we compare SDC and SIC walks with θ_1=θ_2=θ for a symmetric localization. For illustration, we consider θ=π/(4j), π/(4j-1) for j=1,2,3,… and ϕ=0 and an initial wave-function at the origin. For θ=π/(4j), as j increases, the SDC distribution localizes at the origin while the SIC walk spreads out. For θ=π/(4j-1), the SDC and SIC walks are diffused (and along the diagonals) for j=1. However, as j increases, the distribution for the SDC walk becomes more pronounced around the origin. Consequently, for θ=π/(4j), the number of points with non-zero probability for SDC walk follows a periodic profile with an upper bound, while the SIC walk grows linearly with time steps. For θ=π/(4j-1), the number of points with non-zero probability starts off as an increasing function of time steps for j=1. However as j increases, the number of points with non-zero probability decrease in agreement with the probability distribution. We also demonstrate that starting with a quantum walk for θ=π/3(1+j/10), we can transition to various regimes ranging from compact quantum walk to a semi-classical compact walk to a fully localized domain with various 1≤ j≤ 10. * Localization is also evident from dynamical observables point of view. The relation between localization and entanglement has been studied extensively either in random walk perspective of entanglement induced localization <cit.> or their interconnections in non-relativistic QFTs <cit.>. For our purposes, we explore the implications of entropic measures as an evidence for localization. We will use three different entropic variables (a) Shannon Entropy <cit.>, (b) Entanglement Entropy <cit.> and (c) Quantum Relative Entropy <cit.>. The measures (a) and (b) are state dependent while (c) is a POVM measurement. We observe that in comparison to the SIC where the Shannon entropy grows with time steps and the entanglement is an oscillatory function around a non-zero mean value, the SDC Shannon entropy and entanglement are oscillates with a lower bound at zero. In particular the zeros of the Shannon and entanglement entropy denote a separable state hinting at a completely localized state. For (c) we directly compare the density operators for the SDC and SIC walks using Quantum Relative Entropy (QRE) and Quantum Information Variance (QIV). These measures follow a periodic pattern between maxima and minima. The maxima signifies that the walks are most distinct from each other and vice-versa interpretation for the minima. At certain time steps, the variance is zero and coincides with the zeroes of QRE as well. The maxima denotes maximal localization for SDC, while the minima signifies maximum diffusion. * We characterize the SDC walk by its Localization Length (L_loc), which implies the extent of the region within which the walk is bounded. The localization length is inverse of the Lyapunov Exponent (ł_t) which characterizes the strength of disorder (chaos) in the system. We follow the transfer matrix approach of <cit.>. For large disorder, the L_loc is sufficiently small indicating strong localization. For θ=π/(4j), the walk is completely localized indicating L_loc=0. This is also evident from the computation of ł_t=∞ from the analytical computation using transfer matrix. For θ=π/(4j-1), the localization length decreases as j increases, consistent with probability and entropic distribution observations. The remainder of the paper is organized as follows. In section <ref>, we discuss the probability distributions for the SDC and SIC walk. Along with this we also demonstrate the relative restrictions on the number of points with a non-zero distribution and explore the categories of restricted walk by tuning the coin. In section <ref>, we explore localization from the entropy measures point of view. In particular we discuss the evidence of localization from Shannon Entropy (section <ref>), Entanglement (section <ref>) and finally compare the SDC and SIC walks through the POVM based measurements using Quantum Relative Entropy (section <ref>). In section <ref>, we explore the localization phenomenon analytically using the transfer matrix approach. We demonstrate that the L_loc as a function of the energy peaks at only certain values, demonstrating that the system is maximally localized. Further, we incorporate the SDC walk in the background of an SIC walk, as a perturbation to demonstrate that the walk approximately localizes at around the same points as dictated by the numerical simulation meaning that even in presence of a small disorder, the walk exhibits significant localization. We end the work with conclusions and future questions to be addressed in section <ref>. § PROBABILITY DENSITY The Step Dependent Coin is given by, 𝐂_t(θ_1,θ_2,ϕ)=([ e^-itϕcos tθ_1 0 0 -ie^-itϕsin tθ_1; 0 e^itϕcos tθ_2 -ie^itϕsin tθ_2 0; 0 -ie^itϕsin tθ_2 e^itϕcos tθ_2 0; -ie^-itϕsin tθ_1 0 0 e^-itϕcos tθ_1 ]) . The Step Independent Coin operator is given by 𝐂_SIC=𝐂_t=1. Teh shift operator is the same, given by, 𝐒=∑_x⃗(|0,x⃗+_00,x⃗|+|1,x⃗+_11,x⃗|+|2,x⃗-_12,x⃗|+|3,x⃗-_03,x⃗|) , where _0=(1,1) and _1=(1,-1) and the state |i,x⃗=|i⊗|x⃗ where |i∈ℋ_𝐂 and |x⃗=(m,n)∈ℋ_𝐏. The evolution operator 𝐔=𝐒·(𝐂_t⊗𝐈_𝐏) acts on the initial state |Ψ_w(0) to evolve a wave function |Ψ_w(t) after t steps of evolution, given by, |Ψ_w(t)=U^t|Ψ_w(0) . The final state has a general form, |Ψ_w(t)=∑_i,x⃗A^(i)_x⃗(t)|i,x⃗ . where |i,x⃗=|i⊗ |x⃗∈ℋ_𝐂⊗ℋ_𝐏. The probability distribution, as a function of the 2d grid is given by, P(t,x⃗)=∑_i=0^3 |A^(i)_x⃗(t)|^2 . We demonstrate the probability distributions for the SDC and SIC walks for θ_1=θ_2=θ and ϕ=0. In figure <ref>, we demonstrate the SDC and SIC walks for θπ/3 ,π/4 , π/7 ,π/8 , π/11 and π/12. For even values of the denominator, we find that the SDC walk is localized at and around the origin while the SIC walk spreads out. For odd values of the denominator, the SDC and SIC walks start out with significant spreads. However as θ decreases, the SDC walk migrates to the origin. The same feature is exhibited in figure <ref>, where we compute the number of positions with non-zero probability distribution and compare for the SDC and SIC walks. We again find that for even values of the denominator, the SDC walk is an oscillatory and bounded function of the time steps while the SIC walk linearly grows with time. For odd values of the denominator in θ, the SDC and SIC walks start off with a linear growth with time. As θ decreases, the plot for the SDC walk comes down indicating that the number of positions with non-zero probability distribution decreases signifying that the wave-function becomes localized. In figure <ref>, we consider tuning the coin parameters to categorize the quantum walks. To begin with, we start with θ_1=θ_2=π/3 and ϕ=0, where the walk is quantum in nature and start tuning θ=π/3(1+j/10) for 1≤ j≤ 10. For j=1,3,5,7,9, the transition is to a fully localized walk. For j=2,8, it is a compact semi-classical/quantum walk. For j=4,6, the walk is a compact classical walk. This illustrates that the quantum regime can be tuned to a classical and semi-classical compact or a fully localized walk with the step dependent coin. Finally we explore the return probability for the wave function to the origin in figure <ref>, given by P_0,0(t) as a function of the time step t. For SIC walk, the wave function spreads out and after t steps, the probability of the wave function at the origin decreases exponentially. For the SDC walk however, we see that for θ=π/(4j-1) the return probability follows the SIC distribution with certain peaks. However as j increases, the peaks become significant implying that the walk accumulates at the origin. For θ=π/(4j), we see periodic peaks P_0,0(t)=1 in the return probability meaning that the walk is completely localized at the origin. At the steps, where the P_0,0(t)=0, implies that the walk is localized at some other point as exhibited in figure <ref>. § ENTROPIC MEASURES In addition to the kinematical features exhibited by the step dependent coin in the random walk, we would examine the dynamical features of the walk as well from entropic measurements. For our purpose, we would choose to demonstrate the localization of the walk through the measures of (a) Shannon Entropy, (b) Entanglement and (c) Quantum Relative Entropy between the density matrix operators. Please note that the measurements will also depend on the initial state. For our purpose, we choose a tensor product initial state so that the walk becomes entangled solely due to the coin operator. Our initial state is, |Ψ_w(0)=1/√(2)([ 1; i; 0; 0 ])⊗|0,0 . Note that this choice of initial state is by no means unique and any tensor product state can be chosen. However, the basic aspects of localization will remain unaltered and we choose to demonstrate those features through a simple choice. §.§ Shannon Entropy We will compute and compare the Shannon Entropy for the position space and coin space for SDC and SIC walks <cit.>. These measures are defined as, S_P=-∑_m,n=-t^t P_m,n(t)log P_m,n(t) , S_C=-∑_i=0^3 P_i(t)log P_i(t) . where, P_m,n(t)=∑_i=0^3 |A^(i)_m,n(t)|^2 , P_i(t)=∑_m,n=-t^t |A^(i)_m,n(t)|^2 . Also note that as the wave function localizes in a particular point (m,n), P_m,n(t)=1 and zero elsewhere. Consequently, S_P=0. For the S_C, the Shannon entropy however oscillates between and maxima and minima (even for a completely localized state). We compare the Shannon entropy for a range of θ values of the coin parameters in figure <ref>. Completely localized states are obtained for θ_1=θ_2=θ=π/(4j) in sharp contrast to its SIC counterpart with same θ. This is exhibited by a vanishing Shannon Entropy due to a separable state. For θ_1=θ_2=θ=π/(4j-1) however, the walk is not completely localized. For j=1, the SDC and SIC walk has maximal overlap. However as j increases, the walk becomes more localized and S_P decreases in contrast to its SIC counterpart. In these cases, however the S_C increases over the SIC counterpart hinting at the growing localization of the walk. §.§ Entanglement The second entropic measure is the entanglement entropy between the position and coin (spin) degrees of freedom. The reduced density matrix after tracing over the position coordinates is given by, (t)=_pos(̊t)=∑_m,n=-t^t([ |A^(0)_m,n|^2 A^(0)_m,nA^(1)⋆_m,n A^(0)_m,nA^(2)⋆_m,n A^(0)_m,nA^(3)⋆_m,n; |A^(1)_m,nA^(0)⋆_m,n |A^(1)_m,n|^2 A^(1)_m,nA^(2)⋆_m,n A^(1)_m,nA^(3)⋆_m,n; A^(2)_m,nA^(0)⋆_m,n A^(2)_m,nA^(1)⋆_m,n |A^(2)_m,n|^2 A^(2)_m,nA^(3)⋆_m,n; A^(3)_m,nA^(0)⋆_m,n A^(3)_m,nA^(1)⋆_m,n A^(3)_m,nA^(2)⋆_m,n |A^(3)_m,n|^2 ]) . The entanglement is given by, E(t)=-(t)log(t) . If the final state is a completely localized state as happens for θ_1=θ_2=θ=π/(4j), then, |Ψ_w(T)=ψ_c⊗ |p,q , is a separable state. The corresponding reduced density matrix is a pure state and the entanglement is zero. This is demonstrated in figure <ref>, where the entanglement drops to zero for certain time steps for θ_1=θ_2=π/(4j). Figure <ref>, demonstrates the same for θ=π/(4j-1). The walks are not completely localized but the walks become more localized with increasing j which is exhibited in the certain dips in the entanglement. §.§ Relative Entropy Finally the third entropic measure is a POVM between the density matrix operators for the SDC and SIC walks. We consider Quantum Relative Entropy (QRE) and Quantum Information Variance (QIV) between the density matrices for SDC and SIC walks. The QRE is defined by <cit.>, D(|̊|)=(̊log-̊log) , and the QIV is given by, V(|̊|)=(̊log-̊log)^2-D(|̊|)^2 . The operators $̊ andare two positive valued reduced density matrices$̊ and for the step dependent and step independent coin operator. For the walks, we have chosen, θ_1=θ_2=θ and ϕ=0 as previously. We further group the plots in terms of θ=π/(4j-1) and θ=π/(4j) for j=1,2,3 as demonstrated in figure <ref>. Note that both D(|̊|) and V(|̊|) increase as j increases (both for odd and even values of the denominator). For odd values of the denominator V(|̊|)≥ D(|̊|) while for even values, D(|̊|)≥ V(|̊|). This observation is also consistent with the probability distributions for the chosen values of θ. For odd values of the denominator, both the SDC and SIC walks have significant overlaps and the difference between the SDC and SIC becomes more pronounced as j increases. The exact opposite happens for even values of the denominator (as j increases). High values of relative entropy and low values of QIV signifies a pronounced difference between the SDC and SIC walks. For V(|̊|)=0, (̊log-̊log)^2=((̊log-̊log))^2 . We start by writing, (̊t)=ł_i|Φ_iΦ_i| , (t)=ł'_i|Φ'_iΦ'_i| , in terms of the eigen basis. Thus, using c_ik=Φ_i|Φ'_k, (̊log-̊log)^2=ł_i(logł_i)^2|Φ_iΦ_i|+ł_i(logł'_j)^2 |Φ'_jΦ'_j|-2ł_ilogł_ilogł'_kc_ik|Φ_iΦ'_k| . Then, (̊log-̊log)^2=ł_i(logł_i)^2+ł_i(logł'_j)^2|c_ij|^2-2ł_i logł_ilogł'_j|c_ij|^2 . while, D(|̊|)=ł_ilogł_i-ł_ilogł'_j|c_ij|^2 . The zeroes of D(|̊|) imply that =̊ or precisely that the SDC and SIC walks coincide. V(|̊|)=0 with D(|̊|)≠0, implies that the final states for both SDC and SIC walks come arbitrarily close to a maximally entangled state. § TRANSFER MATRIX In this section we formulate the transfer matrix for the localization problem. We will go the reverse way of constructing the Hamiltonian from the transfer matrix. Given a wave function, Ψ_x⃗=(A^(0)_x⃗,A^(1)_x⃗-,A^(2)_x⃗,A^(3)_x⃗-), for x⃗=(m,n), =(1,1) and =̱(1,-1), we can write, ([ A^(0)_x⃗+2; A^(1)_x⃗+; A^(2)_x⃗+2; A^(3)_x⃗+ ])=𝐓([ A^(0)_x⃗; A^(1)_x⃗; A^(2)_x⃗; A^(3)_x⃗ ]) . The form of the transfer matrix for our 2d walk is given by, 𝐓=([ e^-itϕ+i_1 tθ_1 0 0 -i tan tθ_1; 0 e^i tϕ+i_2 tθ_2 -itan tθ_2 0; 0 itan tθ_2 e^-itϕ-i_2 tθ_2 0; itan tθ_1 0 0 e^itϕ-i_1 tθ_1 ]) . _1 , _2 are the eigenvalues of the spectrum satisfying the dispersion relation, cos_1=cosθ_1cos(k_1+k_2) , cos_2=cosθ_2cos(k_1-k_2) . We define the Lyapunov exponent by, ł_t=1/t∑_x⃗=1^t log|Ψ_x⃗| , with an initial condition Ψ_x⃗^(0)=(1,0,0,0). The localization length is defined by the inverse of the Lyapunov exponent, L_loc=1/ł_t . Note that for θ=π/(4j), we note that the localization length is zero which is consistent with the probability distribution demonstrating that the wave function is completely localized at the position of the initial wave function. For θ=π/(4j-1), j=1,2,3, we plot the localization length (L_loc) as a function of the frequency (), Having determined the localization properties of the step dependent coin, we will now use this step dependent coin as a perturbation to an otherwise SIC 2d random walk. The eigenvalues are, ł=e^± i_1 , e^± i_2 , where, cos_1=cos(_1)(θ_1) and cos_2=cos(_2)(θ_2). We can combine with a similarity transformation to bring the transfer matrix to a diagonal form. This similarity transform is, S=([ tanθ_1 0 0 -ξ_1; 0 tanθ_2 -ξ_2 0; 0 ξ_2 -tanθ_2; ξ_1 0 0 -tanθ_1 ]) . where ξ_1=sin(_1)θ_1-sin_1, ξ_2=sin(_2)θ_2-sin_2. The diagonalized matrix is given by, S^-1T_SICS=([ e^i_1 0 0 0; 0 e^i_2 0 0; 0 0 e^-i_2 0; 0 0 0 e^-i_1 ]) . In the same basis, the SDC which will be imposed as a disorder perturbation, will yield, S^-1T_SDCS=([ (t) 0 0 (̱t); 0 (t) (̣t) 0; 0 (̣t)^⋆ (t)^⋆ 0; (̱t)^⋆ 0 0 (t)^⋆ ]) . where, (t) =ξ _1^2 e^-i ω _1(θ _1 t)+2i ξ _1 tan(θ _1) tan(θ _1 t)-e^i ω _1tan ^2(θ _1) (θ _1 t)/ξ _1^2-tan^2θ_1 , (̱t) =i (θ _1 t) (2 ξ _1 tan(θ _1) sin(ω _1)-ξ _1^2 sin(θ _1 t)-tan ^2(θ _1) sin(θ _1 t))/ξ _1^2-tan ^2(θ _1) (t) =ξ _2^2 e^-i ω _2(θ _2 t)+2i ξ _2 tan(θ _2) tan(θ _2 t)-e^i ω _2tan ^2(θ _2) (θ _2 t)/ξ _2^2-tan^2θ_2 , (̣t) =i (θ _2 t) (2 ξ _2 tan(θ _2) sin(ω _2)-ξ _2^2 sin(θ _2 t)-tan ^2(θ _2) sin(θ _2 t))/ξ _2^2-tan ^2(θ _2) . The stochastic equation for the wave function is then, Ψ_0,x⃗ =(e^i_1+(t))Ψ_0,x⃗-+(̱t) Ψ^⋆_0,x⃗- . Ψ_1,x⃗ =(e^i_2+(t))Ψ_1,x⃗-+(̣t) Ψ^⋆_1,x⃗- . For our specific case, Ψ_x⃗^⋆=-Ψ_x⃗. We will use, Ψ_0,x⃗=r_0(x⃗)exp[iχ_0(x⃗)] , Ψ_1,x⃗=r_1(x⃗)exp[iχ_1(x⃗)] . The equations become, r_0(x⃗)/r_0(x⃗-)exp[i(χ_0(x⃗)-χ_0(x⃗-))] =e^i_1+(t)-(̱t) . r_1(x⃗)/r_1(x⃗-)exp[i(χ_1(x⃗)-χ_1(x⃗-))] =e^i_2+(t)-(̣t) To the leading order in perturbation theory, r(x⃗)/r(x⃗-)=1+·ln r/x⃗ . χ(x⃗)-χ(x⃗-)=1-·χ/x⃗ . ·ln r_0/x⃗ =cos_1-1+ℜ𝔢(t) , ·ln r_1/x⃗ =cos_2-1+ℜ𝔢(t) , since ℜ𝔢(,̱)̣=0. The Lyapunov coefficient is given by, 1/N∑_n=1^N log |Ψ_n|=log|√(r_0^2+r_1^2)| . For ℜ𝔢(t)=cos_1(θ_1 t) and ℜ𝔢(t)=cos_2(θ_2 t), the solution to (<ref>) is given by, r_0^2=exp[2X(cos(k⃗·)-1+ℜ𝔢(t))], r_1^2=exp[2Y(cos(k⃗·)-1+ℜ𝔢(t))] . Hence, r_0^2+r_1^2= exp[2X(cos(k·)-1)](1+ℜ𝔢(t)+1/2ℜ𝔢(t)^2+…) +exp[2Y(cos(k·)̱-1)](1+ℜ𝔢(t)+1/2ℜ𝔢(t)^2+…) . Roughly, by order of estimates, we can assume without generality that, X(cos(k·)-1)≈ Y(cos(k·)̱-1)≈ u . The oscillating terms ℜ𝔢(t), ℜ𝔢(t), average to zero. Hence, log|√(r_0^2+r_1^2)|=u/2 (ℜ𝔢(t)^2+ℜ𝔢(t)^2) . which gives an approximate analytical formula for the localization length, L_loc=2/(ℜ𝔢(t)^2+ℜ𝔢(t)^2) . upto an overall constant. More precisely, the analytical form of the denominator is given by, (ℜ𝔢(t)^2+ℜ𝔢(t)^2)=lim_N→∞(cos^2_1/N∑_n=1^N ^2(n θ_1)+cos^2_2/N∑_n=1^N ^2(n θ_2)) . § CONCLUSIONS In this note, we examine the localization properties of a step dependent coin (SDC) on a random walk. We explore the consequences of SDC walk point wise below: * We consider a step dependent coin (SDC) to demonstrate the localization of the wave function in two dimensions. The SDC is based on the same model of coin in <cit.>. The localization is evident in the probability distribution as well as the boundedness of the number of points with non-zero probability. We also show that by tuning the coin parameter, one can transition through various categories of compact walks ranging from quantum to classical. As a further check, the return probability to the origin (location of initial wave function) is maximized by certain coins, exhibiting a completely localized walk. * In addition to the kinematical evidence, we can also demonstrate the boundedness of the walk from the entropic point of view. The Shannon entropy and entanglement oscillates between zero and an upper bound. The lower bound of zero indicates a separable state which in turn implies a complete localization in the two dimensional grid. The Quantum Relative Entropy (D) and Quantum Information Variance (V) measures demonstrate the difference between SDC and SIC walks based on the respective density matrices $̊ and. Forθ=π/(4j),D(|̊|)>V(|̊|)and increases monotonically with decreasingθ, while the reverse is true forθ=π/(4j-1). At certain steps,D(|̊|)=0implying that at those steps, the SDC walk coincides with the SIC walk. WhileV(|̊|)=0withD(|̊|)≠0, implies that the operators for SDC and SIC come arbitrarily close to a maximally entangled state. * In order to characterize the localization phenomenon, we compute the Lyapunov exponent from the transfer matrix method in <cit.>. The transfer matrix suggests an Anderson Hamiltonian with a non-trivial hopping term. Forθ=π/(4j), the localization length is zero which is consistent with a completely localized wave-function. Forθ=π/(4j-1), the localization length peaks at∼±π/2. We compare this with an approximate analytic computation of the localization length (where we put in the SDC as a perturbative on a SIC background) and observe the peaks at the same positions. This is similar to the localization dependency on frequency in <cit.>. However, there are open questions still to be addressed: * So far we have restricted ourselves to a step dependent coin in 2d. A more illustrative generalization would be a site dependent coin as discussed in <cit.>. A site dependent coin introduces exotic features in the localization features of the Hamiltonian. * A more general computation will be to use a SU(4) coin. However that would introduce 15 parameters which might be difficult to tackle. One way to generalize the computation will be to use a perturbation in place of the zero elements. At this point, the two component wave functions couple with each other perturbatively. * An immediate question would be to address the structure of the Anderson Hamiltonian. The form of the transfer matrix suggests a linear combination of two 1d Hamiltonians. However, the forms of the Hamiltonians are different. This Hamiltonian formalism can be used to to analyze phase transitions in various systems including non-Hermitian models of <cit.>. In addition, we would like to compare how and under what circumstances, our step compares with the disordered spin chain systems of <cit.> or entangled photons in <cit.>. * It would be nice to get a quantitative handle on various generalized entanglement measures that characterize the coin operator through entangling power <cit.> or its n-qubit generalizations considered in <cit.>. § ACKNOWLEDGEMENTS The author thanks Ahmadullah Zahed, Aranya Bhattacharya and Siddhartha E.M. Guzmán for their insightful comments on the work. The author is supported by the São Paulo Funding Agency FAPESP Grants 2021/02304-3 and 2019/24277-8. utphys
http://arxiv.org/abs/2303.07196v1
20230313153419
A Comprehensive Empirical Evaluation of Existing Word Embedding Approaches
[ "Obaidullah Zaland", "Muhammad Abulaish", "Mohd. Fazil" ]
cs.CL
[ "cs.CL", "cs.NE" ]
Vector-based word representations help countless Natural Language Processing (NLP) tasks capture both semantic and syntactic regularities of the language. In this paper, we present the characteristics of existing word embedding approaches and analyze them with regards to many classification tasks. We categorize the methods into two main groups - Traditional approaches mostly use matrix factorization to produce word representations, and they are not able to capture the semantic and syntactic regularities of the language very well. Neural-Network based approaches, on the other hand, can capture sophisticated regularities of the language and preserve the word relationships in the generated word representations. We report experimental results on multiple classification tasks and highlight the scenarios where one approach performs better than the rest. Social network analysis of Japanese manga: similarities to real-world social networks and trends over decades Naoki Masuda March 30, 2023 ============================================================================================================= § INTRODUCTION Dense real-valued word vector representations have been essential to NLP tasks, such as question answering <cit.>, semantic role labeling <cit.>, textual entailment <cit.> and machine translation <cit.>. These word representations, also called word embeddings, encode semantic and syntactic characteristics of the words, so these embeddings can act as input features to downstream tasks like sentiment analysis <cit.>, rumor detection <cit.>, and fake news detection <cit.>. Since the early days of natural language understanding, an exhaustive amount of research has been put into obtaining these word representations from a corpus of unlabeled text. Researchers have used statistical models <cit.>, neural network language models <cit.>, log-bilinear models <cit.>, and context-based neural models <cit.>, among others, to construct these word representations. Nevertheless, the question of which approach to use in a specific scenario remains unanswered. To compare word embedding methods, we can use intrinsic or extrinsic evaluators<cit.>. Intrinsic evaluators measure the quality of word embeddings directly using semantic and syntactic relationships among them<cit.>, while extrinsic evaluators measure the quality of these word embeddings on downstream tasks using them as input features. Words with closer meaning to each other are called semantically related terms, and the embeddings produced for such words shall lie closer in the produced embedding space. For example, words like bicycle, cycle, and bike are similar and semantically related to each other. Syntactically related words are those words which are bind by the syntax of a natural language such as English. For example, brief and briefly are syntactically related to each other, where briefly is the adverb for the adjective brief. Also, big and bigger are syntactically related, where the latter is the comparative form of the former. Most studies investigate word embedding models concerning their intrinsic characteristics. Although intrinsic evaluation of these models shed light on the semantic and syntactic similarities among these words, they do not explicitly depict the scenarios where one model is superior or inferior to other models. Moreover, intrinsic evaluators require additional resources in the form of pre-defined queries for subjective tests<cit.>. These queries can be word couplets such as adjectives and their comparative forms, or countries and their capitals, and are also called query inventories<cit.>. Extrinsic evaluation of these methods, on the other hand, maybe computationally expensive and time taking, but it provides much more insight into the quality of the word representations that these methods extract. To evaluate the actual quality of these methods, we should compare these approaches with regards to their real word use cases. Small factors like the window size, data pre-processing, skewness of dataset, and dimension of the word embeddings, sometimes have an impact on the result of downstream tasks (e.g., classification) <cit.>. However, researchers have investigated the relationship between intrinsic and extrinsic evaluators; they have not been comprehensive<cit.>. Besides, these comparative studies have not evaluated all the existing models, as most studies only focused on examining LSA, word2vec and GloVe <cit.>. Furthermore, as per our knowledge, there has been no extensive extrinsic evaluation which involves all the state of the art models (GloVe, Word2vec, ELMo, BERT and fasttext). An excellent word representation method should be able to take care of some essential points. * The most frequent words such as the or and should not affect the quality of the word vectors. * Rare words should have quality word representations. * Multiple word embeddings for multiple word senses. Apart from the above qualities, intrinsic to the word embeddings, the features extracted by these models should work well in different scenarios; for example, if we are dealing with sentiment analysis, the features should work fine with both balanced and unbalanced data. In this paper, we use pre-trained vectors, trained using the dominant word representation algorithms for different scenarios of classification tasks. We also train word embeddings on these algorithms from scratch to measure the effect of pre-training with respect to each algorithm in various tasks. Besides, we study the impact of model parameters (window size and embedding dimensions) on the output of the downstream tasks. The effect of external parameters on the output of these models is also studied. These external parameters are the degree of formality of corpora used for pre-training, amount of text in the corpus used for pre-training, and pre-processing. We organize the rest of the paper in the following sections. In section 2, we introduce existing word representation models, including traditional and neural models. We present the properties of word embedding models and compare the existing models according to these properties in section 3. The results have been reported in section 4. We have carried out exhaustive comparisons on both pre-trained and trained word embeddings. In the end, we conclude our findings in section 5. § STATE OF THE ART WORD EMBEDDING APPROACHES Word embeddings act as a backbone for the downstream natural language processing tasks. Hence numerous approaches have been proposed to train these embeddings over the years. For clarity, we classify these models into two categories - traditional models and neural network models. §.§ Traditional models Traditional models construct the word representations from the statistical information present in the corpus on the basis of the idea of distributional semantics. They use term frequencies, term-term co-occurrence frequencies <cit.>, and term-document frequencies <cit.> as the basis for these vector representations. One Hot Encoding, the simplest model, uses a vector of size |V|, where |V| is the size of the vocabulary, to represent each word. The word vectors produced, have a value 1, at a specific position for that word and 0 everywhere else. For example, if V = {have, a, great, day}, then the word have can be represented as {1,0,0,0}, the word a can be represented as {0,1,0,0}, and so on. Latent Semantic Analysis (LSA) <cit.> is the most influential models in this category. LSA utilizes the statistical information present in the corpus to build a term-document frequency matrix X. LSA then uses Singular Value Decomposition (SVD) for finding a low-rank approximation to the matrix to construct the word vector representations. SVD decomposes the co-occurrence matrix X into three matrices, V, V^T and Σ. X = VΣ V^T While Σ is a diagonal matrix comprising the singular values of the matrix, V and V^T are orthogonal matrices, comprising of left and right singular vectors. For obtaining a lower-rank approximation of rank j, for the matrix X, we select the j largest singular values alongside the right and left singular vectors from V and V^T corresponding to those singular values. X_j = V_j Σ_j V_j^T Hyperspace Analogue to Language (HAL)<cit.>, on the other hand, uses term-term frequencies to construct the co-occurrence matrix X. HAL passes a "window" over the text, and words within the window are termed to co-occur with a strength inversely proportionate to the number of terms between them in the window. Words occurring to the right and left of a word are recorded separately. As a result, a matrix with n rows and 2n columns, n being the size of the vocabulary, is formed. As the vocabulary grows, the co-occurrence becomes enormous, and so does the word embedding size. Hence, to reduce the dimensionality of word embeddings, columns with higher variance are selected out of 2n columns. Columns related to the most frequent words such as the have higher frequencies while providing little information about the text. These high-frequency or high variance columns contribute disproportionately to the distance between produced word representation vectors. Correlated Occurrence Analogue to Lexical Semantic (COALS)<cit.> uses a normalization procedure to minimize the influence of most common words on the quality of produced word embeddings. COALS removes different columns for left and right contexts and adds a single column for each word, making the co-occurrence matrix symmetric. Moreover, COALS uses conditional rate, that is, whether word a co-occurs more or less with word b than in general, as matrix entries instead of raw term-term co-occurrence count. Pearson's correlation coefficient can be used to calculate the conditional rate between word pairs. After formulating the co-occurrence matrix in this manner, negative entries are removed from the matrix, and the positive values get replaced by their square roots. The authors explain that the negatively correlated terms may not relate to each other semantically and haven't been used in the text corresponding to the same topic. They argue that removing the negatively correlated word columns results in less information loss than removing low-variance word frequency columns. A variety of traditional models use the corpus statistics in different manners to form the co-occurrence matrix. Moreover, apart from SVD, other transformation methods such as Hellinger Principal Composition Analysis (HPCA) <cit.> have been used to learn these word representations. Although traditional models are easy to understand, they are computationally expensive and become infeasible, to work with on large datasets<cit.>, because the co-occurrence matrix becomes huge and impractical to operate on. §.§ Neural Models Unlike traditional models, neural models have evolved extensively with time. The first generation of these models was Neural Network Language Models (NNLM). Although initial Neural Network Language Models <cit.> solved the curse of dimensionality problem present in statistical models, noticeable gains came after the introduction of Recurrent Neural Network Language Models (RNN-LM) <cit.>. Language modeling predicts the word sequence w_1w_2...w_T probability in a natural language text. P(w_1^T) = ∏_t=1^T P(w_t|w_1^t-1) The Feed-Forward Neural Network Language Models (FNNLM) accomplishes the same task, but instead of considering all the history words, it adopts the n-gram based idea and considers only n-1 words before the current word. In FNNLM, ∏_t=1^T P(w_t|w_1^t-1) ≈∏_t=1^T P(w_t|w_t-n+1^t-1) Recurrent Neural Network Language Models (RNNLM) are a little different, as they have an internal state space. This internal state space can work as a memory, which stores information related to all the sequences in history and gets passed to the next sequence enabling the model to deal with the uncertain length of sequences. The main concern with these language models was that they used 1-of-V encoding, also called one-hot encoding (OHE). In OHE, every word has a vector representation of size V (vocabulary size). The vocabulary size grows very fast and can reach millions of words. Representing every word with a dimension so large makes the model slow and inefficient. Furthermore, the words not seen in the training set can not be represented. These deficiencies led to the introduction of dense word representation and models like <cit.> and <cit.>. A distributed representation, also termed word embedding is a real-valued representation of a word, with a lower dimension than size V. Each dimension in this embedding embodies a latent characteristic of the word <cit.>. In subsequent sub-sections, we will introduce the most widespread models used to obtain these word embeddings. §.§.§ Word2vec NNLM got complicated over time, and later it was found that simple shallow neural network models like word2vec can work better than these overly-complicated language models. Mikolov introduced two variations of window-based neural models in 2013 - Continuous Bag Of Words (CBOW) and skipgram<cit.>. CBOW predicts the center word using its context, so with every iteration, it tries to maximize the following probability for every word in the corpus. ∑_-c≤j≤c,j0logp(w_i|w_i+j) Here, w_i is the center word, while w_i+j is the context word present at a distance j from the center word. On the other hand, the skipgram model predicts the context words using a center word. It maximizes the following probability with each iteration. ∑_-c≤j≤c,j0logp(w_i+j|w_i) To calculate the probability function between words, both these models use softmax function. p(w_c|w_o) = exp(v_w_c^'T v_w_o)/∑_w=1^W exp(v_w^'T v_w_o) Here v_w and v_w^' are input and output vector representations of the word w. In both these models, we have two distinct representations for each word. For example, if we are using the skip-gram model, the input representation will be used when the word is a center word, and we will use the output representation when the word is a context word. In the end, we can either concatenate both input and output representations or take their average to construct the final word embedding. To make the model better, Mikolov introduced a few tricks in his second paper. First of all, the softmax function is inefficient, as it takes sum over all the words in the vocabulary. To do this, for each token in our corpus, the model becomes extensively slow. Negative sampling solves the above issue. Instead of going the whole vocabulary, we try to maximize the center word's similarity with the words in the context window (positive examples) and randomly select k other words from the vocabulary and minimize the similarity between the center word and these k negative examples. p(w_c|w_o) = logσ(v_w_c^'T v_w_o) + ∑_i=1^k[logσ(-v_w_i^'T v_w_o)] The negative samples are drawn from power distribution, and the word2vec paper suggests that the value of k can be 5-20 and 2-5 for small and large training datasets. The second improvement was in the form of subsampling of frequent words. The authors of word2vec also note that some words (e.g., "in", "the" and "or") occur more frequently than other words while providing less or no information. To tackle the issue, the authors used a subsampling technique where each word w_i was discarded with some probability P(w_i). P(w_i) = 1 - √(t/f(w_i)) Here f(w_i) is the frequency of word w_i in the corpus and t is a chosen threshold. While CBOW did not work very well with semantic tasks, skipgram handled both semantic and syntactic tasks quite well. In addition to these tasks, word2vec introduced a new task of word analogies. This task examined if the produced word embeddings are able to retain the relationship between words. For example, prince is to princess as king is to queen should be retained in word embeddings as vec(prince) - vec(princess) = vec(king) - vec(queen). Regardless, both these models produced state-of-the-art performance in numerous tasks with a single projection layer and a simple architecture. The problem with this model was that, as it was a window-based model, it failed to use the global statistics of the corpora to a great extent. Furthermore, the word representations were not context-dependent (there was only one vector for different word senses). Global Vectors (GloVe), introduced in 2014, solves the first problem. §.§.§ Global Vectors (GloVe) GloVe<cit.>, in many ways, resembles the traditional models. Like LSA, it creates the co-occurrence matrix from the text corpus but with two main differences. First, it creates a term-term co-occurrence matrix, as opposed to the term-document co-occurrence matrix in LSA, and second, instead of considering the co-occurrence count in the document, it considers the co-occurrence within a specific range or a window. Thus, it benefits from both the global statistics of the corpus and the local information of the window. This property of GloVe makes it a suitable model for both word similarity and word analogy tasks. GloVe also introduces a new least square loss function. J = ∑_p,q=1^Vf(X_pq)(w_p^Tw_q + b_p + b_q - logX_pq)^2 Here V is the vocabulary size, w_p is the vector for center or center word, w_q is the vector for context word, b_p is the target word bias, b_q is the context word bias, X_pq is the number of times w_p occurs with w_q and f(x) is a weighting function. The definition for the weighting function is: f(x) = {[ (x/x_max)^α x < x_max; 1 ]. α and x_max are hyperparameters, fixed to 0.75 and 100 respectively in the paper. This specific choice of weighting function has specific desiring properties such as: * f(0) = 0, as the co-occurrence becomes large, it becomes sparse and most of its entities become zero. Hence, f should be continuous and f(0) should be defined, f(0) = 0. * It should not overweight large co-occurrences and hence it should be relatively small for large numbers. The choice of a proper loss function and utilization of both global and local information made GloVe a more suitable algorithm to model both rare and frequent words. Nevertheless, the algorithm was unable to produce embeddings unseen words, and the context of the word was still not considered. The word book had a single word representation as opposed to having different word representations for the noun book and the verb book. Fasttext<cit.>, introduced in 2017, was able to solve the first issue. §.§.§ Fasttext To model rare and previously unseen words effectively can be challenging. Besides, having a separate vector representation for each verb form can be inefficient, especially for morphologically rich languages. Fasttext solved these issues by improving the basic skipgram model and incorporating sub-word information into it. In fasttext, each word is represented as a sum of its character n-grams, taking into account the words' morphology. While other models such as <cit.> also learned morphological regularities of the language, they did not use the subword information to a large extent. An extension of the fasttext model <cit.> also solves the problem of misspelled words, as it replaces the misspelled word with the nearest correct word, although for our comparisons in this paper, we will take into consideration the base fasttext model. As fasttext improves on the skipgram model, their objective functions are very similar. Fasttext starts with the skipgram objective function and improves upon it by including the subword information. The skipgram with negative sampling objective function is, ∑_t=1^T[ ∑_c ∈ C_tℓ(v_w_t^T v^'_w_c) + ∑_i=1^kℓ(-v_w_t^T v_w_i^')] v_w and v_w^' are the same input and output word vectors while ℓ(x) is the logistic loss function. Fasttext introduces the subword information into the function, and instead of using the target word vector in the equation, it uses its n-grams' representations. Consider the word "jargon" and n=3, where n is the n-gram length; we will have the following n-grams: <ja, jar, arg, rgo, gon, on> and the special sequence <jargon> The word representation is derived by summing the representations of all of its character n-grams. For example, if ℳ⊂{1,....,M} is a word's character n-grams set and z_m is the vector representation for n-gram m then, v_w = ∑_m ∈ℳ_wz_m Similarly, now the objective function of fasttext becomes, ∑_t=1^T[ ∑_c ∈ C_tℓ( ∑_m ∈ℳ_w(z_m^T v^'_w_c)) + ∑_i=1^kℓ(- ∑_m ∈ℳ_w(z_m^T v_w_i^'))] In simple words, this function maximizes the similarity between the n-gram representations of the center word with the context word representations, while minimizing the similarity between the n-gram representations of the center word with k negative samples, for each word t in the corpus T. Fasttext improved significantly on syntactic tasks, especially for morphologically rich languages like Italian, while the performance for semantic tasks remained the same. Neverthless, representing words using their n-grams, helped in better representing rare words and words that were not seen during training, but these representations were still context-independent. §.§.§ Embeddings from Language Models(ELMo) In natural languages, the linguistic context of a word defines the word's meaning. The same word may have different meanings when used in different contexts, called polysemy. Methods, such as <cit.>, have previously proposed models to overcome the problem of polysemy in learning word representations, by learning multiple embeddings for each word. Nevertheless, these models had shallow architectures and required predefined word sense classes. ELMo is a deep contextualized model for learning word embeddings from the unlabeled text. ELMo representations are deep and contextualized, the reason being that they are a function of a bidirectional model's internal layers, and they are depend on the context of the word. ELMo word embeddings are a function of the entire sentence. A forward language model takes the tokens (t_1,...,t_i-1) and models the probability of t_i to predict the likelihood of the token sequence, p(t_1,t_2,...,t_N) = ∏_i=1^N p(t_i | t_1,...,t_i-1) The model takes a context-independent token embedding and run in through L layers of forward Long Short Term Memory networks (LSTMs). Every layer j outputs a context dependent representation of the token t_i, h_i,j^LM<cit.>. The LSTM output for the last layer can be used for predicting the next token t_i+1. A backward language model, on the other hand, uses the future tokens (t_i+1, t_i+2,...,t_N) to model the likelihood of the current token (t_i) p(t_1,t_2,...,t_N) = ∏_i=1^N p(t_i | t_i+1, t_i+2,...,t_N) The same way as above, L layers of backward LSTMs is implemented, and each layer j computes a context dependent hidden representation of the token t_i, h_i,j^LM. A biLM couples a forward language model and a backward language model, and ELMo simultaneously maximizes the log-likelihood of the biLM: ∑_i=1^N(logp(t_i |t_1,...,t_i-1; Θ_x, Θ_LSTM,Θ_s) + logp(t_i | t_1,...,t_i-1;Θ_x,Θ_LSTM,Θ_s)) Θ_x and Θ_s are parameters for token representation and the softmax layer. Θ_LSTM and Θ_LSTM are the parameters for forward and backward LSTMs. The model computes 2L+1 parameters, a token representation x_i, and a hidden representation h_i,j^LM for each layer of the forward and backward LSTMs, for each token t_i. If x_i^LM = h_i,0^LM and h_i,j^LM = [h_i,j^LM; h_i,j^LM], for each biLSTM layer, then R_i = { h_i,j^LM | j = 0,...,L } In the simplest case, ELMo will select the top layer, E(R_i) = h_i,L^LM, as in <cit.>, and more generally, it will estimate a weighting of all biLM layers for the job in hand. ELMo addressed many issues present in the natural language understanding, including polysemy. It had a deep architecture as opposed to the previous word representation models like word2vec and GloVe, and the produced representations were context-aware. After ELMo, many similar deep pre-trained models, for example: Open AI GPT<cit.>, Open AI GPT2<cit.>, and BERT<cit.>, were introduced. §.§.§ Bidirectional Encoder Representations from Transformers (BERT) BERT is a multi-layer bidirectional Transformer encoder <cit.> based language representation model. It uses a Masked Language Model (MLM), for encoding both left and right contexts into token representation. MLM masks some of the input tokens randomly and then predict the vocabulary ID for masked tokens. Implementing BERT involves two steps: pre-training and fine-tuning. In pretraining phase, the model is trained on a large corpus of unlabeled text. During the fine-tuning phase, the parameters that were learned in the pretraining phase are initialized and subsequently fine-tuned for a particular downstream task. BERT handles various downstream tasks due to its flexible architecture. It can represent a single sentence or two sentences paired together (Sentence A, Sentence B). To represent two sentences, BERT adds a unique token, [SEP]. Additionally, every sequence starts with a particular classification token [CLS]. We use the final state of [CLS] token as a sequence representation for classification tasks. A token's input representation is obtained by summing the corresponding token embedding, segmentation embedding, and positional embedding. For token embeddings, BERT uses WordPiece embedding <cit.>, segmentation embedding of the token denotes whether a token belongs to sentence A or sentence B, and positional embedding contains the token's position in the input sequence. BERT proved very useful in language modeling and outperformed other models in almost every language modeling task. § PROPERTIES OF EXISTING WORD EMBEDDING APPROACHES We start evaluating the existing word representation approaches by comparing their intrinsic properties before external evaluations. These properties affect the performance of these approaches on extrinsic tasks directly or indirectly. We start from the basic word representation approach (e.g., One-hot encoding) and take into consideration the existing state of the art word embedding models. We study these models concerning properties such as the density of the word representations, polysemy, context-awareness, fine-tuning, resource intensity, and representing out of vocabulary (OOV) words. The density of the word representations, generated by a word embedding model, makes the model memory efficient. It also enables the model to encode latent features corresponding to the words, instead of encoding plain statistical information. While initial models (e.g., one-hot encoding) generates sparse representations, other models (e.g., LSA) generates sparse representations and then projects them to lower dimensions. Modern approaches, on the other hand, starts with learning dense low dimensional word vectors. Generating low-dimensional word vectors enable the word embedding models to encode hidden properties of the words, hence preserving the semantic and syntactic regularities present in the corpus. For example, word2vec maximizes log probability between words that lie closer to each other. hence, words with the same context tend to have similar or closer word representations. Polysemy enables the word embedding models to learn different word vectors for different word senses or even the same sense. A word may provide different meanings when used in different contexts. A word embedding model should be able to keep track word context to be able to generate word vectors for polysemous words. Traditional models (e.g., LSA and one-hot encoding) provides a single static word representation for each word, irrespective of its sense. GloVe, word2vec, and fasttext also provide a similar static word representation not taking the polysemy into the account. ELMo and BERT, on the other hand, provide distinct word representations for each word sense. This is possible, as these models keep track of the context of the word. Context-dependent word representations further improve the performance of ELMo and BERT on downstream tasks, as the meaning of the word affects its representations. Consider a word book. It may be used as a noun or a verb. In the former case, the representation of the word should be closer to words like notebook and pen, while in the latter case the representation of the word should be closer to other words such as ticket. Hence, multiple context-dependent representations enable models like BERT and ELMo to encode and leverage the meaning of certain words effectively. Fine-tuning allows the model to tune its parameters for the task they are used. Word embedding models generate word representations, which can be used as features for underlying classification tasks. While some models (e.g., GloVe and word2vec) generates fixed word vectors, other models (e.g., BERT and ELMo) allow fine-tuning to generate more appropriate word representations for the task at hand. OOV words are those words that haven't been seen by the model during training. The model can be able to produce a word representation for an unseen word if it understands the morphology of the words in some manner. While traditional models, word2vec and GloVe do not utilize the sub-word information and acts on each word as a single indivisible entity, modern approaches such as fasttext, ELMo and BERT can benefit from the sub-word information. Fasttext perceives every word as a combination of n-grams, which enables fasttext to represent OOV words. The n-grams required to build the word may previously exist, and the representation of the word is the sum of all its n-grams. ELMo can handle OOV word representation as it uses character embeddings to computer word-level embeddings. BERT uses WordPiece algorithm to divide a word into pieces and represent each piece with an embedding. While most of the focus goes on how different word embedding approaches perform in various tasks, it is necessary to know the resource intensity of these approaches. Sometimes, a model consumes much more time and resources compared to a different model, while their performance on a task may not differ significantly. The comparison of different word representation models concerning their intrinsic properties is presented in Table <ref>. § EXPERIMENTAL RESULTS §.§ Datasets We evaluate the models mentioned above concerning 4 different classification tasks, spam detection, radical language detection, abusive language detection, and distinguishing abusive and hateful language. The spam detection and radical language detection datasets both contain 200K (100K negative tweets and 100K positive tweets) each, the abusive language detection dataset contains 25K tweets (12.5K negative tweets and 12.5K positive tweets), and the abusive language vs. hateful language dataset contains 5K tweets (2.5K abusive language tweets and 2.5K hateful language tweets). The datasets details have been given in table <ref>. We have conducted different experiments in multiple settings for the spam detection and radical language detection datasets. For example, we have evaluated the models with different subsets of these datasets (25K, 50K, 100K, 150K, and 200K tweets). We have also compared the models using different ratios of the positive and negative classes to examine the impact of data skewness on each model. §.§ Experimental model setup Our experimental model consists of an input embedding layer, two bi-LSTM layers consisting of 32 and 64 units, respectively, a 128-unit dense layer, and a sigmoid output layer. We used the tensorflow framework <cit.> to train our models. We used the gensim library <cit.> to train word2vec and fasttext vectors on our corpora. We also used a Tensorflow implementation of GloVe to train our vectors, instead of using the original code written in C. For ELMO and BERT, we used tensorflow-hub to retrieve the context dependent pre-trained vectors. We used BERT-base (L=12, H=768) implementation of the BERT model in our experiments. §.§ Evaluating Trained Word Embeddings While training word vectors on our corpora, there are many hyper-parameters such as window size and vector dimension. Choosing the correct value for a hyper-parameter can affect the computed word vectors drastically. We have trained word vectors for word2vec (skipgram and CBOW), GloVe, and fasttext on our corpora. Afterward, we have used these computed word vectors for our classification tasks and report the results. We have not trained vectors for BERT and ELMo from scratch, as training these vectors from scratch is inefficient compared to pre-trained vectors considering the smaller size of corpus size. Additionally, they are resource and time exhaustive, and as we will see in the next section, it is better to use their pre-trained vectors. §.§.§ Window Size: Window size refers to the number of words to both sides of the center word that we consider when we train our word embeddings. In skipgram, CBOW and fasttext, the window size is used to maximize the log probability between the center and the context words (words present in the window), while in GloVe, we use the window size for constructing the word co-occurrence matrix. We have selected three different window sizes and reported the result for each dataset in table <ref>. While GloVe performs better with large window sizes consistently, other models tend to have an up and down. Although the difference between the performance on different window sizes for all the models is not significant, we can safely say that the models can capture more information with large window sizes. We should keep in mind that large window sizes require more computational and memory resources. Also, with much larger window sizes, the model may capture irrelevant information. For example, a word may not depend or be relevant to another word that occurred 20 words later. §.§.§ Embedding Dimension We have also trained word vectors of various dimensions, to examine its effect on intrinsic classification tasks. While for most of these tasks, the performance is similar for high dimension and low dimension vectors, we witness that for tasks with more data (e.g., Spam-200K), the higher dimension vectors perform better. As high dimension vectors can encode more data and represent words more sparsely, this results in a better performance for most of the extrinsic tasks. On the contrary, if the data is less, using smaller dimension vectors can encode the information in a better in some scenarios (e.g., Abusive vs. hateful). Ultimately, higher dimension vectors may perform similar, if not better, for almost all tasks, but they also require more memory and time to train. The F1 scores for multiple datasets have been presented in table <ref>. §.§ Evaluating Pre-trained Word Embeddings We have also used the pre-trained vectors for extrinsic classification tasks and reported the results. In addition to word2vec, GloVe, and fasttext, we have also included BERT and ELMo in the evaluation in this section. Pre-trained word vectors for word2vec, GloVe, and fasttext are static, as they are context-independent, while BERT and ELMo provide context-dependent word vectors and shall be extracted for each sentence as we train our classification model. We will first compare these models' performance on certain classification tasks and subsequently examine the effect of some factors on these models. For our experiment purpose, we have used BERT-base, which 768 dimension vectors, ELMo has 1024 dimension vectors, and all other models have 300 dimensions word representations. Table 5 shows the F1 score on various classification tasks for all the models. We can see that all models perform very well on relatively easy datasets (e.g., radical language and abusive language), while many models struggle on others. Differentiating abusive tweets from hate tweets is an arduous task, as both contain similar language structure, even then BERT improves the F! score for the dataset by almost 5% compared to any other model. §.§.§ Dataset Size In this segment, we evaluate the effect of the data size on pre-trained word embeddings' performance. We select multiple subsets of the datasets and evaluate the models, examining their classification F1 score. While it may be evident that more data will result in better performance, there are situations where a massive amount of data may not be available. It is also essential to know the magnitude of the effect of classification data increment on the model performance. All models have been pre-trained with billions of words. While BERT and ELMo possess the task-specific fine-tuning ability, other models do not. The effect of these two features, fine-tuning and context-dependency, is noticeable, as these two models perform extra-ordinary well on the extrinsic classification tasks. Furthermore, while BERT barely suffers from smaller classification datasets, the loss for other models is relatively high. Word2vec suffers the most, as its F1 score decreases by more than 6 percent for spam classification when the dataset contains 25K tweets instead of 200K tweets. Both datasets have a very different text structure, which is further proved by the classification results. While Radical tweets are well structured and more formally written, all models perform extraordinarily well while classifying it. Furthermore, radical tweets contain specific words that can rarely be found in regular tweets, which further differentiates them from regular tweets' structure. On the other hand, spam tweets are more similar to normal tweets, and most of these spam tweets contain slang language and abbreviations for which there are no representations in many models. Another point which further helps BERT is the mechanism in which BERT divides a word into multiple pieces using the WordPiece algorithm at its heart. This partition helps BERT to provide context-dependent vectors for those words, which otherwise may by OOV words. Table <ref> depicts the results. §.§.§ Unbalanced Data Deep learning models usually tend to overfit towards the more general class. In this section, we compare all word embedding models based on their performance on unbalanced data. We see that, although all models perform worse on skewed data, BERT and ELMo keep their performance above par on the most complex tasks. Once again, we observe that with the easier dataset, the influence of data skewness is negligible, while with the complex task (e.g., spam classification), the impact is more prominent. The classification F1 score for various datasets are presented in table <ref>. §.§.§ Classification Data Pre-processing While pre-processing is an integral part of training deep learning classification models, we would like to examine the effect of fully and partially cleaning the classification data on classification results. In the first case, we clean the data completely. We remove URLs, hashtags, symbols, mentions, and stopwords from the tweets. We also lemmatize the words. While in the latter case, we only remove URLs and hashtags from the data and do not lemmatize the words. The partially cleaned data yields better results in all cases. This indicates the stopwords and actual verb form on the classification result. We also observe that the boost in performance for fasttext, ELMo, and BERT while partially cleaning the data, is higher. The reason behind this boost of performance is the use of sub-word information in these models, which allows them to represent OOV words and use the morphology of the words. The results are shown in table <ref> §.§ Multi-class Classification Until now, we classified tweets into two classes; positive and negative. In some scenarios, we need to classify our data into multiple categories or classes. Here, we evaluate the pre-trained word embeddings' performance in multi-class classification. We build a new dataset, consisting of five classes, and 2500 tweets for every class. We also make changes to our classification model, changing the sigmoid output layer to a softmax output layer with five units, to accommodate multi-class classification. The complete comparison is presented in Table <ref>. We present the results for both fully cleaned and partially cleaned data. While with fully cleaned data, there is a slight difference between BERT and GloVe, the difference is much more noticeable with partially cleaned data. This further emphasizes our previous point that fully cleaning the data results in information loss. §.§ Pretrained Word Embeddings vs. Trained Word Embeddings We evaluated context-independent trained word embedding models. We also compared all major pre-trained word embedding models on multiple extrinsic classification tasks. Now, we will compare pre-trained word embeddings generated by these context-independent models with the word embeddings that we have trained on our corpora. We have used similar possible hyper-parameter values. We use 300 dimension vectors, with a context size of 5, and for word2vec, we use the skipgram model with a negative sampling value of 15. For most of the tasks, the word representation that we have trained from scratch outperforms the pre-trained word embeddings. This may be because the corpus used for training these word embeddings may not be relevant to the task in hand. Another reason can be that the corpus contain some words, for which the embedding is not availabe in the pre-trained embeddings. Although if we have a small classification dataset (e.g., abusive vs. hateful), it would be better to use pre-trained vectors, as small text corpus will not generate quality word representations. The data factor becomes more evident once we examine different subsets of the spam dataset. While the performance difference between the pre-trained and trained vectors is more for the smaller subset (30K tweets), it becomes decreases considerably for the bigger subsets (100K and 200K tweets). See table 10 for details. § CONCLUSION In this paper, we evaluated the existing word embedding algorithms on extrinsic classification tasks. We also described the working of each of these models and provided an insight into how these models encode the relations between words. We explained the desired properties of a good word embedding approach and discussed the presence and absence of these properties in certain models. We also illustrated how these properties affect the word embeddings produced by word embedding models. The impact of certain parameters such as., window size, embedding dimension, was also illustrated on the word embeddings' quality. We also compared pre-trained word embeddings, trained word embeddings, and their impact on classification tasks. Moreover, we also obtained an insight into which algorithm performs better when used for multi-class classification. Although it is difficult to study all the word embedding algorithms and their properties in a single paper, we covered the most important approaches, selected from different categories. To make our comparisons simpler, we divided the models into two groups, traditional models and neural models, and observed that neural word embedding models provide numerous advantages over traditional approaches. We observed that while in almost every task, BERT overperformed the other word embedding approaches, in certain classification tasks (e.g., Abusive vs. Hateful), the difference was negligible. Hence, taking into consideration its resource extensiveness of BERT, simpler models (e.g., word2vec and GloVe) provided better results. ELMo, on the other hand, performed similarly to BERT, in most of the tasks, as it uses task-specific parameter tuning. We also observed that the structure of underlying classification data plays a vital role. While some datasets (e.g., Radical dataset), may be very easy to classify, as their text combinations are very different, in other datasets (e.g., Abusive vs. hateful), both the classes follow almost the same text pattern, which makes it hard to differentiate. Before selecting a word embedding model, we shall analyze the underlying classification data and examine the text structure of different text classes. When the classes follow different text patterns, the simple models (e.g., word2vec and GloVe) perform similar to complex models (e.g., BERT). Data pre-processing, although being an integral part of a classification task, can impact the result negatively, if done extensively. We observed that the original morphology of the text provides crucial information, and can be lost if the pre-processing is done carelessly. The above point further emphasizes the importance of using sub-word information. Approaches that consider words as indivisible entities can face OOV words and hence an increasing number of unknown word vectors. All these unknown word vectors result in loss of information. Approaches that use sub-word or character-level information, on the other hand, can handle OOV words, and represent the actual morphology of the words effectively. Hence models like BERT, ELMo and fasttext, perform better than their predecessors.
http://arxiv.org/abs/2303.06779v1
20230312233922
Study of Multiuser Scheduling with Enhanced Greedy Techniques for Multicell and Cell-Free Massive MIMO Networks
[ "S. Mashdour", "R. C. de Lamare", "J. P. Sales" ]
cs.IT
[ "cs.IT", "math.IT" ]
0.94 Study of Multiuser Scheduling with Enhanced Greedy Techniques for Multicell and Cell-Free Massive MIMO Networks Saeed Mashdour^⋆, Rodrigo C. de Lamare ^⋆,† and João P. S. H. Lima ^ ^⋆ Centre for Telecommunications Studies, Pontifical Catholic University of Rio de Janeiro, Brazil ^† Department of Electronic Engineering, University of York, United Kingdom ^ CPqD, Campinas, Brazil smashdour@gmail.com, delamare@cetuc.puc-rio.br, jsales@cpqd.com.br This work was supported by CNPq and CPqD. ========================================================================================================================================================================================================================================================================================================================================================================================================== In this work, we investigate the sum-rate performance of multicell and cell-free massive MIMO systems using linear precoding and multiuser scheduling algorithms. We consider the use of a network-centric clustering approach to reduce the computational complexity of the techniques applied to the cell-free system. We then develop a greedy algorithm that considers multiple candidates for the subset of users to be scheduled and that approaches the performance of the optimal exhaustive search. We assess the proposed and existing scheduling algorithms in both multicell and cell-free networks with the same coverage area. Numerical results illustrate the sum-rate performance of the proposed scheduling algorithm against existing approaches. Massive MIMO, multiuser scheduling, multicell systems, cell-free systems, clustering. § INTRODUCTION Multicell multiuser MIMO (MU-MIMO) systems have been widely used in wireless networks to improve the transmission rate, spectral and energy efficiencies using antenna arrays at each base station (BS), which can serve several user terminals simultaneously in each cell <cit.>. In these systems, different beamforming or precoding techniques such as zero forcing (ZF) or minimum mean squared error (MMSE) <cit.> are used to improve the system performance by maximizing the received signal power or by resorting interference cancellation at the receiver side <cit.>. When there are many users in a massive MU-MIMO network user scheduling is an important tool to achieve a desirable sum capacity and spectral efficiency<cit.>. This is key especially if each user requires a high data rate. In addition, user scheduling is required when pilot contamination reduces the transmit power for each user in Massive MIMO <cit.>. Furthermore, when the number of users is larger than the number of transmit antennas, user scheduling is fundamental to achieve a desirable sum capacity <cit.>. Accordingly, a great deal of research has been done in the context of user scheduling in massive MIMO networks. In <cit.>, three methods for user scheduling has been presented to optimize the ergodic sum-rate. A joint user scheduling and transceiver design scheme for cross-link interference suppression that works on per-frame basis in interfering massive MIMO multi-cell scenarios has been reported in <cit.>. In <cit.>, a user-selection method based on simple zero-forcing beamforming with selection (ZFS) has been proposed which attains a significant fraction of sum capacity and throughput of optimal method. Unlike multicell massive MIMO systems where users in each cell are served by a BS, a network with the same area of cells including randomly located single-antenna access points (APs) serving all users in the same time-frequency resource was introduced in <cit.> and called cell-free massive MIMO which presents higher throughput compared with small cells. Cell-free massive MIMO is compared with cellular massive MIMO systems in <cit.>, and it is shown that cell-free systems can provide significantly higher spectral efficiency for all users. Since the information of all APs and users are required in cell-free massive MIMO, it is suggested in literature to serve each user by a subset of APs to limit data sharing and computational complexity via two network-centric and user-centric approaches <cit.>. The first approach divides the APs into several clusters, where each includes different APs from other clusters. The latter, considers the AP subset providing the best channel conditions for each user which could be dynamic. In this paper, we investigate the sum-rate performance of the multicell and cell-free massive MIMO systems using greedy user scheduling based on ZFS algorithm in the downlink [This work was supported by CNPq and CPqD.]. We consider the use of a network-centric clustering approach to reduce the computational complexity of the techniques applied to the cell-free systems <cit.>. We then develop a greedy algorithm that considers multiple candidates for the subset of users to be scheduled and that approaches the performance of the optimal exhaustive search. We assess the proposed and existing scheduling algorithms in both multicell and cell-free networks with the same coverage area. Numerical results illustrate the sum-rate performance of the proposed scheduling algorithm against existing approaches. Notation: Throughout the paper, [ x ]_+={ 0,x }, 𝐈_n denotes the n× n identity matrix, the complex normal distribution is represented by 𝒞𝒩 ( .,. ), superscripts ^T ,^∗ , and ^H denote transpose, complex conjugate and hermitian operations respectively, A∪ B is union of sets A and B, and A∖ B shows exclusion of set B from set A. § SYSTEM MODEL We consider an area for both the multicell and cell-free networks so that we can have a fair comparison between these networks. There are K single antenna users distributed in the whole area. The multicell network consists of L cells each including K_c=K/L users and a BS equipped with N_t antennas. We also consider the cell-free system with M=L× N_t randomly located single antenna APs. §.§ Multicell Channel and Signal Model We consider ℒ={ 1,2,⋯ ,L } as ths set of all existing cells in the area. We also model h_s_mk as the Rayleigh fading coefficient between the mth transmit antenna and kth receive antenna in the cell s and denote the row vector 𝐡_s_m= [ h_s_m1 h_s_m2 ⋯ h_s_mK_c ]. Then, 𝐇_l∈ℂ^K_c× N_t channel matrix including channel coefficient from the BS s to all users located in the related cell is 𝐇_l= [ 𝐡_l_1^T 𝐡_l_2^T ⋯ 𝐡_l_N_t^T ] Considering 𝐱_s= [ x_s_1 ⋯ x_s_K_c ]^T as the vector of information symbols from BS s intended for all its related users with 𝐱_s∼𝒞𝒩 ( 0,𝐈_K_c ), and 𝐏_s∈ℂ^N_T× K_c as precoding matrix, the total downlink signal received by all users in cell s is given by 𝐲_s=𝐇_s𝐏_s𝐱_s+∑_l=1,l≠ s^Lq_sk𝐇_l𝐏_l𝐱_l+𝐰_s where 𝐰_s= [ w_s_1 ⋯ w_s_K_c ]^T is the additive white Gaussian noise vector of the users located in cell s with w_s_k∼𝒞𝒩 ( 0,σ_w^2 ) and covariance matrix 𝐂_𝐰_s=σ _w^2𝐈_K_c, q_sk= [ 𝐐 ]_s,k and 𝐐 is the coupling matrix which describes the configuration of an interference model of a multiuser multicell system<cit.>. The term ∑_l=1,l≠ s^Lq_sk𝐇_l𝐏_l𝐱_l is considered as the interference caused by other cells called inter-cell interference (ICI). Since all noise vectors in each cell is independent of other cells, sum-rate of the received signals in the total network is achieved by summation of sum-rate of all the cells expressed by R_t=∑_s=1^LR_s=∑_s=1^Llog_2 ( [𝐑_s+𝐈_K_c ]), where the covariance matrix of the received signal is given by 𝐑_s=𝐇_s𝐏_s𝐏_s^H𝐇_s^H (∑_l=1,l≠ s ^L | q_sk |^2𝐇_l𝐏_l𝐏_l^H𝐇_l^H+σ _w^2𝐈_K_c )^-1. §.§ Cell-Free Channel and Signal Model According to <cit.>, we use g_mk=√(β _mk)h_mk to denote the cell-free channel coefficient between mth AP and kth user where β _mk is the large-scale fading coefficient (path loss and shadowing effects) and h_mk∼𝒞𝒩 ( 0,1 ) is the small-scale fading coefficient, defined as independent and identically distributed (i.i.d) random variables (RVs) that remain constant during a coherence interval and are independent over different coherence intervals. Large scale coefficients are modeled as β _mk=_mk.10^σ _shz_mk/10 where _mk is the path loss and 10^σ _shz_mk/10 refers to the shadow fading with σ _sh=8 and z_mk∼𝒩 ( 0,1 ). According to <cit.>, the path loss is modeled as _mk={ --35log_10 ( d_mk ), d_mk>d_1 --10log_10 ( d_1^1.5 d_mk^2 ), d_0<d_mk≤ d_1 --10log_10 ( d_1^1.5 d_0^2 ), d_mk≤ d_0 ., where d_mk denotes the distance between the mth AP and the kth user, =46.3+33.9log_10 ( f )-13.82log_10 ( h_AP ) - [ 1.11log_10 ( f )-0.7 ]h_u+1.56log_10 ( f )-0.8 where f=1900MHz is the carrier frequency, h_AP=15m and h_r=1.5m are the AP and user antenna heights, respectively, d_0=10m and d_0=50m. When d_mk≤ d_1 there is no shadowing. In downlink transmission, the signal received by the kth user is described by y_k=√(ρ _f)𝐠_k𝐏𝐱+w_k where ρ _f is is maximum transmitted power of each antenna, 𝐠_k= [ g_1k,⋯ g_Mk ] are the channel coefficients for user k, 𝐏∈ℂ^M× K is the precoder matrix such as MMSE or ZF, 𝐱= [ x_1,⋯ ,x_K ]^T is the zero mean symbol vector with x_k the data symbol for user k and 𝐱∼𝒞𝒩 ( 0,𝐈_K ), and w_k∼𝒞𝒩 ( 0,σ_w^2 ) is the additive noise for user k. We consider elements of 𝐬 mutually independent, and independent of all noise and channel coefficients. Combining all the users, we have 𝐲=√(ρ _f)𝐆^T𝐏𝐱+𝐰 where 𝐆∈ℂ^M× K is the channel matrix with elements [ 𝐆 ]_m,k=g_mk and 𝐰= [ w_1,⋯,w_K ]^T is the noise vector. Considering noise covariane matrix as 𝐂_𝐰=σ _w^2𝐈_K, the sum-rate of the cell-free system can be computed by R_CF=log_2 ( [σ _w^-2ρ _f𝐆^T𝐏𝐏^H𝐆^∗+𝐈_K ] ) § ZFS USER SCHEDULING AND THE PROPOSED ENHANCED SCHEDULING ALGORITHM Using an exhaustive search, we can schedule the user set with best performance among all possible user sets. However, it implies a high computational complexity which makes it impractical. Thus, alternative methods such as greedy algorithms are suggested in literature to reduce the selection complexity <cit.>. They usually consider a selection criterion and based on that a user with best match at each iteration is selected. In this section, we extend the greedy ZFS scheduling algorithm developed in <cit.> and to the scenarios of interest. Then, exploiting ZFS and introducing a strategy based on multiple candidates for choosing the subset of users, we develop an enhanced greedy algorithm which leads to a user subset closer to the optimal subset obtained by exhaustive search. §.§ ZFS Algorithm ZF precoder creates orthogonal channels between transmitter and receivers by inverting the channel matrix at the transmitter using precoding matrix 𝐏=𝐇^H ( 𝐇𝐇^H )^-1 where 𝐇∈ℂ^K× M is the channel matrix. However, if K> M, 𝐇𝐇^H becomes singular and it is not possible to use ZF precoder. Therefore, it is required to schedule n≤ M out of K users as a set of users S_n resulting in a row-reduced channel matrix 𝐇 ( S_n ) which gives the highest achievable sum-rate 1≤ n≤ Mmax S_nmaxR_zf ( S_n ) subject to ∑_i ∈ S_n [ μ -1/c_i ( S_n ) ]_+=P. where P is the upper limit of the signal covariance matrix [ 𝐂_𝐱 ]≤ P, R_zf ( S_n ) is throughput of ZF algorithm given by R_zf ( S_n )=∑_i ∈ S_n [ log_2 ( μ c_i ( S_n ) ) ]_+ where c_i ( S_n )={ [ ( 𝐇 ( S_n )𝐇 ( S_n )^H )^-1 ]_ii}^-1. Then, the reduced-complexity sub-optimal ZFS algorithm is outlined in the following pseudo code considering 𝒦={ 1,2,⋯ ,K } as the set of indices of all K users, K_s as number of users to be scheduled, and 𝐡_k as the channel vector of user k. Note that we have used equal power loading to obtain μ. 1) Initialization * set n=1 * find a user s_1 such that s_1=k∈𝒦𝐡_k𝐡_k^* * set S_1={ s_1} and denote the achieved rate R_ZF ( S_1 )_max 2) while n<K_s * increase n by 1 * find a user s_n such that s_n=k∈ ( 𝒦∖ S_n-1 )R_ZF ( S_n-1∪{ k } ) * set S_n=S_n-1∪{ s_n} and denote the achieved rate R_ZF ( S_n )_max * If R_ZF ( S_n )_max≤ R_ZF ( S_n-1 )_max, breake and decrease n by 1 3) Precoding 𝐏=𝐇 ( S_n )^* ( 𝐇 ( S_n )𝐇 ( S_n )^* )^-1 §.§ Enhanced Greedy Algorithm Here, we devise a scheduling strategy that assesses more sets of users so that we can achieve a system performance closer to the performance achieved by an exhaustive search while saving significant computational complexity. In this regard, we consider the set achieved by ZFS as the first user set S_n ( 1 ). Then, we choose k_ex as the least channel power user among the users of the first set which is called the first excluded user and is obtained by k_ex (1 )=k∈ S_n ( 1 )𝐡_k𝐡_k^* We also select the user with the highest channel power from the remaining users other than the first selected set called first new user k_new defined as k_new (1 )=k∈𝒦_r ( 1 )𝐡_k𝐡_k^* where 𝒦_r ( 1 )=𝒦∖ S_n ( 1 ) is set of the remaining or unselected users. Substituting the excluded user by the new user in the first set, we achieve a new user set as the second set. Then, excluding the new user from the remaining users we achieve the second remaining user set. Repeating the described procedure for the second set and so on, we achieve K-K_s/2 sets together with the first set. Therefore, the user set S_n ( j ) and remaining user set 𝒦_r ( j ), j ∈{ 2,⋯ ,K-K_s/2+1 }, are respectively derived as S_n ( j )= (S_n ( j-1 )∖ k_ex (j-1 ) )∪ k_new (j-1 ) 𝒦_r ( j )=𝒦_r ( j-1 )∖ k_new (j-1 ) Thereafter, we assess all the considered sets to determine the best set S_n_f using two different criteria each of which implying a different complexity to the system. The first criterion would be the sum-rates according to equations (<ref>) and (<ref>) for multicell and cell-free networks, respectively. The second one, would be C_s ( S_n ( i ) ) the sum channel correlation among the users of ith set, i ∈{ 1,2,⋯ ,K-K_s/2+1 } defined as C_s ( S_n ( i ) )=∑_u ∈ S_n ( i )∑_v ∈ S_n ( i ),v≠ uC_u,v where C_u,v is channel correlation of the users u and v in the set S_n ( i ). Thus, depending on sum-rate or sum correlation criteria, the desired set is respectively derived as S_n_f=S_n∈ S_n ( i ){ R_CF ( S_n ) } or alternatively as S_n_f=S_n∈ S_n ( i ){ C_s ( S_n ) } Accordingly, the enhanced greedy algorithm for cell-free network is outlined as follows. Note that for the multicell network, the number of users to be selected will change to K_c and K_c_s respectively, R_CF is changed to R_t, and overall sum channel correlation is obtained by summation over all cells. * =1 * Finding initial user set S_n ( ) using ZFS * : R_CF ( S_n ( ) ) or C_s ( S_n ( ) )% depending on the used criterion * 𝒦_r ( )=𝒦∖ S_n ( ) % set of K-K_s unselected users * k_ex ( )=k∈ S_n ( )𝐡_k𝐡_k^* * k_new ( )=k∈𝒦_r ( )𝐡_k𝐡_k^* * for =2 to K-K_s/2+1 % we are considering half of the remaining users * S_n ( )= (S_n ( -1 )∖ k_ex (-1 ) )∪ k_new (-1 ) * 𝒦_r ( )=𝒦_r ( -1 )∖ k_new (-1 ) * k_ex ( )=k∈ S_n ( )𝐡_k𝐡_k^* * k_new ( )=k∈𝒦_r ( )𝐡_k𝐡_k^* * : R_CF ( S_n ( ) ) or C_s ( S_n ( ) ) * end for * S_n_f=S_n∈ S_n ( i ){ R_CF ( S_n ) } or S_n∈ S_n ( i ){ C_s ( S_n ) } * Precoding § SIMULATION RESULTS In this section, we assess in terms of sum-rates the proposed and existing scheduling algorithm in multicell and cell-free scenarios using Matlab. Note that CF and CoMP in the results represent cell-free and multicell systems, respectively. In particular, we consider a squared area of size 400m as the whole area of the cell-free system with M=64 single-antenna randomly located APs and K=16 uniformly distributed single antenna users. For the multicell system, we consider the same area divided in L=4 non-overlapping cells each including K_c=K/L=4 users with the same location as the cell-free system and a BS located at the center of the cell with N_t=M/L=16 antennas. We adopt the cell-free channel model in <cit.> and the cellular channel model in <ref>, and consider a static channel over each transmission packet in both networks. In Table <ref>, we provide more details on the parameters used for simulation. We have used ZF and MMSE precoders for performance comparison of multicell and cell-free networks and the corresponding sum-rates are shown in Fig. <ref> against the signal-to-noise ratio (SNR) when user scheduling is not considered. For all plots, the sum-rates increase with the SNR, however, the MMSE precoder has resulted in higher sum-rates as compared with the ZF precoder in both networks. The performance of the cell-free system has shown a significant superiority over the multicell system, which is mainly because cell-free network is not so much affected by the ICI near the cell borders which impairs the multicell system. Figs. <ref> and <ref> show how different scheduling methods work in cell-free and multicell networks, respectively, when the sum-rate criterion is used. We have compared the performance of the systems implementing an exhaustive search, the proposed enhanced greedy and ZFS user scheduling algorithms to schedule half of the users when ZF and MMSE precoders are used. According to these figures, the proposed enhanced greedy method achieves an impressive improvement compared with ZFS and its performance is very close to the optimal exhaustive search method in cell-free networks. For multicell networks we also have a significant improvement. The performance of cell-free and multicell networks using the proposed enhanced greedy algorithm is also shown in Fig. <ref>, where the cell-free system has outperformed the multicell system, as expected. In Fig. <ref>, the performance of the enhanced greedy algorithm in a cell-free network is shown when the sum-rate and channel-correlation criteria are used. We can see that using the sum-rate criterion provide an improvement in system performance while the results for the channel-correlation criterion are slighltly worse. The choice of the sum-rate and the channel-correlation criteria depends on the available computational power and application. In Table <ref>, the computational complexity of the ZFS and the proposed enhanced greedy methods for the sum-rate and channel-correlation criteria are shown in cellular and cell-free networks with network-centring clustering. The results show that the improvement in the method using the sum-rate criterion comes at the cost of more required flops. § CONCLUSION We have proposed an enhanced greedy algorithm that extends the search procedure to find the user set with the best performance in cell-free and multicell MIMO systems. Numerical results show that there is a significant performance improvement in both cell-free and multicell systems using the proposed algorithm while linear MMSE and ZF precoders were used. The sum-rate criterion in the proposed enhanced greedy algorithm has outperformed the channel-correlation criterion at the cost of a slight increase in computational complexity. IEEEbib
http://arxiv.org/abs/2303.07013v1
20230313112047
Initial Result of Heliocentric Distance Dependence of Zodiacal Light Observed by Hayabusa2#
[ "Kohji Tsumura", "Shuji Matsuura", "Kei Sano", "Takahiro Iwata", "Kohji Takimoto", "Manabu Yamada", "Tomokatsu Morota", "Toru Kouyama", "Masahiko Hayakawa", "Yasuhiro Yokota", "Eri Tatsumi", "Moe Matsuoka", "Naoya Sakatani", "Rie Honda", "Shingo Kameda", "Hidehiko Suzuki", "Yuichiro Cho", "Kazuo Yoshioka", "Kazunori Ogawa", "Kei Shirai", "Hirotaka Sawada", "Seiji Sugita" ]
astro-ph.EP
[ "astro-ph.EP" ]
Full Paper addressref=aff1, corref=aff1, email=ktsumura@tcu.ac.jp ]K.Ts.Kohji Tsumura addressref=aff2, email=matsuura.shuji@kwansei.ac.jp ]S.M.Shuji Matsuura addressref=aff3, email=sano.kei288@mail.kyutech.jp ]K.Sa.Kei Sano addressref=aff4, email=iwata.takahiro@jaxa.jp ]T.I.Takahiro Iwata addressref=aff3, email=takimoto.koji670@mail.kyutech.jp ]K.Ta.Kohji Takimoto addressref=aff5, email=manabu@perc.it-chiba.ac.jp ]M.Y.Manabu Yamada addressref=aff6, email=morota@eps.s.u-tokyo.ac.jp ]T.M.Tomokatsu Morota addressref=aff7, email=t.kouyama@aist.go.jp ]T.K.Toru Kouyama addressref=aff4, email=hayakawa@planeta.sci.isas.jaxa.jp ]M.H.Masahiko Hayakawa addressref=aff4, email=yokota@planeta.sci.isas.jaxa.jp ]Y.Y.Yasuhiro Yokota addressref=aff8, email=etatsumi-ext@iac.es ]E.T.Eri Tatsumi addressref=aff9, email=moe.matsuoka@aist.go.jp ]M.M.Moe Matsuoka addressref=aff4, email=sakatani.naoya@jaxa.jp ]N.S.Naoya Sakatani addressref=aff10, email=honda.rie.ha@ehime-u.ac.jp ]R.H.Rie Honda addressref=aff11, email=kameda@rikkyo.ac.jp ]S.K.Shingo Kameda addressref=aff12, email=suzuhide@meiji.ac.jp ]H.Su.Hidehiko Suzuki addressref=aff6, email=cho@eps.s.u-tokyo.ac.jp ]Y.C.Yuichiro Cho addressref=aff13, email=kazuo.yoshioka@edu.k.u-tokyo.ac.jp ]K.Y.Kazuo Yoshioka addressref=aff14, email=ogawa.kazunori@jaxa.jp ]K.O.Kazunori Ogawa addressref=aff15, email=kei.shirai@penguin.kobe-u.ac.jp ]K.Sh.Kei Shirai addressref=aff4, email=sawada.hirotaka@jaxa.jp ]H.Sa.Hirotaka Sawada addressref=aff6, email=sugita@eps.s.u-tokyo.ac.jp ]S.S.Seiji Sugita [id=aff1] Department of Natural Sciences, Faculty of Science and Engineering, Tokyo City University, 158-8557 Tokyo, Japan [id=aff2] Department of Physics, School of Science and Technology, Kwansei Gakuin University, 669-1337 Hyogo, Japan [id=aff3] Department of Space Systems Engineering, School of Engineering, Kyushu Institute of Technology, 804-8550 Fukuoka, Japan [id=aff4] Institute of Space and Astronautical Science, Japan Aerospace Exploration Agency, 252-5210 Kanagawa, Japan [id=aff5] Planetary Exploration Research Center, Chiba Institute of Technology, 275-0016 Chiba, Japan [id=aff6] Department of Earth and Planetary Science, University of Tokyo, 113-0033 Tokyo, Japan [id=aff7] Digital Architecture Research Center, National Institute of Advanced Industrial Science and Technology, 135-0064 Tokyo, Japan [id=aff8] nstituto de Astrofisica de Canarias, University of La Laguna, Tenerife, Spain [id=aff9] Geological Survey of Japan, National Institute of Advanced Industrial Science and Technology, 305-8567 Ibaraki, Japan [id=aff10] Center for Data Science, Ehime University, 790-8577 Ehime, Japan [id=aff11] Rikkyo University, 171-8501 Tokyo, Japan [id=aff12] Meiji University, 214-8571 Kanagawa, Japan [id=aff13] Department of Complexity Science and Engineering, University of Tokyo, 277-8561 Chiba, Japan [id=aff14] JAXA Space Exploration Center, Japan Aerospace Exploration Agency, 252-5210 Kanagawa, Japan [id=aff15] Kobe University, 657-8501 Hyogo, Japan The zodiacal light (ZL) is sunlight scattered by interplanetary dust (IPD) in the optical wavelengths. The spatial distribution of IPD in the Solar system may hold an important key to understanding the evolution of the Solar system and material transportation within it. The IPD number density can be expressed as n(r) ∼ r^-α, and the result of α∼ 1.3 was obtained by the previous observations from the interplanetary space by Helios 1/2 and Pioneer 10/11 in the 1970s and 1980s. However, no direct measurements of α based on the ZL observation from the interplanetary space outside the Earth's orbit have been conducted since then. Here we introduce the initial result of the ZL radial profile at optical wavelengths observed at 0.76-1.06 au by ONC-T with Hayabusa2# mission in 2021-2022. The obtained ZL brightness is well reproduced by the model brightness, but there is a small excess of the observed ZL brightness over the model brightness at around 0.9 au. The obtained radial power-law index is α = 1.30 ± 0.08, which is consistent with the previous results based on the ZL observations. The dominant uncertainty source in α arises from the uncertainty in the Diffuse Galactic Light estimation. zodiacal light interplanetary dust Hayabusa2# Graphical Abstract < g r a p h i c s > § INTRODUCTION The zodiacal light (ZL) is sunlight scattered by interplanetary dust (IPD) at optical wavelengths and is a major constituent of celestial diffuse brightness. Continuous supply of IPD is necessary for sustaining the diffuse brightness because IPD is removed from the Solar System due to the Poynting-Robertson (PR) effect and the radiation pressure from the Sun <cit.>. Possible sources for this supply are asteroid collisions <cit.>, cometary ejections <cit.>, and Mars <cit.>, but the relative ratios of the contributions from these sources are still unknown. Thus, observational constraints that can tell the difference among these sources are important for better understanding the origin and characteristics of IPD and how planetary and exoplanetary systems evolve with time <cit.>. Historically, extensive ZL observations were conducted from ground-based telescopes at high-altitude sites in the 1960s and 1970s <cit.>, but the accuracy of these ZL observations is limited due to atmospheric emission. Space-based platforms eliminate atmospheric contaminations and provide precise ZL measurements <cit.>. ZL is the only sky brightness component that is not fixed on the celestial sphere. In general, ZL is smoothly distributed and its small-scale spatial structures are only at the level of a few percent owing to the smooth spatial distribution of IPD as a smooth cloud <cit.>. The symmetry plane of the smooth cloud is slightly inclined to the ecliptic plane because of the Jovian orbit. Seasonal variations of ZL occur for an Earth-based observer due to the orbital motion of the Earth, which changes the heliocentric distance and the position of the observer with respect to the symmetry plane. A detailed IPD distribution model was established based on the seasonal variation of ZL <cit.>. The number density (n) of IPD is presumed to be of a form separable into radial and vertical terms; n(r, β) = n_0(r/r_0)^-α f(β) where n_0 is the reference of IPD number density in the symmetric plane at the heliocentric distance r_0, and f(β) denotes the vertical distribution as a function of an elevation angle β from the symmetry plane <cit.>. The assumption that the vertical distribution of IPD depending only on β is induced by the fact that the PR effect does not affect the orbital inclination of particles as they spiral into the Sun. The radial power-law is induced by the radial distribution expected for particles under the influence of the PR effect, which results in α =1 for dust bound in a circular orbit <cit.>. When dust size is reduced by the sublimation near the Sun, such smaller dust particles are expelled from the Solar system by radiation pressures as β-meteoroids <cit.>. The radial profile of β-meteoroids is expected as α =2 <cit.>. The relative ratio of these two components remains an open issue and may hold an important key for understanding the evolution of the IPD distribution <cit.>. The ZL brightness I_ZL is modeled as the integral of scattered sunlight along the line of sight; I_ZL = ∫ F_⊙(r) n(r) A Φ(θ) dl where F_⊙(r) ∼ r^-2 is the Solar flux at the distance r from the Sun, A is the albedo of the IPD, Φ(θ) is the phase function at scattering angle θ, and dl indicates the direction of the line of sight. If the scattering properties (size and albedo) of IPD do not change significantly with heliocentric distance, the heliocentric dependence of ZL on the symmetry plane can be described as I_ZL∼ r^-(α +1). Direct observations of the radial power-law index α based on ZL observations were conducted by spacecraft outside Earth's orbit in the 1970s and 1980s. Pioneer 10/11 observations of ZL at 1-3.3 au gave α =1-1.5. More specifically, a single power-law model with α∼ 1 with a cutoff near 3.3 au gives the best fit to the observation data, and a 2-component model with α∼ 1.5 and increased IPD in the asteroid belt can satisfactorily fit the data equally well <cit.>. Helios 1/2 observations of ZL at 0.3-1 au gave α =1.3 ± 0.05 at 0.3-1 au; α = 1.35 gives a better fit for small Solar elongations (<50 ^∘), and α = 1.25 is more appropriate for large Solar elongations (>100 ^∘) <cit.>. After these missions, ZL observations outside Earth's orbit by spacecraft have not been conducted, although the Japanese Venus orbiter Akatsuki tried to observe ZL, but it could not detect ZL due to insufficient cooling of the sensor <cit.>. Some IPD distribution models were developed based on the observations of the all-sky ZL brightness and its seasonal variation from the geocentric orbit. In particular, α = 1.34 ± 0.022 <cit.> and α = 1.22 <cit.> were obtained based on the observations by Cosmic Background Explorer (COBE), and α = 1.59 ± 0.02 was obtained based on the observations by AKARI <cit.>. These observations of ZL are conducted from 1 au, so the accuracy of determining α is worse than direct observations from interplanetary space. The value of α has also been determined based on the observations of inner ZL or F-corona. Based on the observations of inner ZL by Clementine from the lunar orbit while the Sun was in eclipse behind the Moon, α = 1.45 ± 0.05 was obtained <cit.>. A value of α from 1.31 to 1.35 was obtained based on F-corona at elongations ranging from 0.07 to 0.45 au from the Sun observed by Solar TErrestrial RElations Observatory-A (STEREO-A) orbiting the Sun at approximately 1 au <cit.>. In addition, α = 1.31 was obtained by F-corona ranging from 0.1 to 0.4 au observed by Parker Solar Probe (PSP) when it passes perihelion at 0.16-0.25 au <cit.>. These results are limited to dust distributions close to the Sun. This paper introduces the IPD distribution based on the ZL observation at 0.76-1.06 au by Hayabusa2# mission performed in 2021-2022. This is the first successful observation of ZL from outside the Earth's orbit in the last 40 years. § DATA ACQUISITION AND REDUCTION §.§ Hayabusa2# overview Hayabusa2 is the second Japanese asteroid sample-return mission. The Hayabusa2 spacecraft was launched in December 2014 and successfully arrived at asteroid (162173) Ryugu in June 2018. After extensive scientific observations for ∼1.5 years, it departed from Ryugu in November 2019 and successfully brought the capsule containing Ryugu samples back to the Earth in December 2020 <cit.>. With the successful main mission of the sample return, an extended mission named as Hayabusa2# (SHARP; Small Hazardous Asteroid Reconnaissance Probe) started to explore new asteroids; a fly-by of (98943) 2001 CC21 in July 2026 and a rendezvous with 1998 KY26 in July 2031 <cit.>. Some scientific observations including ZL observation are conducted during this long cruising phase <cit.>. The Optical Navigation Camera (ONC) onboard Hayabusa2 consists of one telescopic camera (ONC-T) and two wide-angle view cameras (ONC-W1/W2) <cit.>, and it was used for both global and local high-resolution optical observations of Ryugu <cit.>. ONC has been carefully calibrated before and after the launch, and it is in a good condition after the contact with the Ryugu surface during the two touchdowns for sampling. ONC-T is used for ZL observations in this study. The field-of-view of ONC-T is 6.27 × 6.27 deg^2 covered with a 1024 × 1024 pixels region of a CCD detecter <cit.>. The longest exposure time of ONC-T is 178 sec which is used for the ZL observation in this study. ONC-T has a wheel system that rotates seven color bandpass filters and one wide clear filter (a panchromatic glass window). We used the wide-band filter (λ = 612 nm and Δλ = 448 nm, see Figure <ref>) for ZL observation with v-band filter (λ = 550 nm and Δλ = 28 nm) for stray light subtraction (see Section <ref>). §.§ Observation Fields Hayabusa2 spacecraft flies in an elliptical orbit over a range of 0.76-1.06 au before the Earth swing-by on December 2027 as shown in Figure <ref> and <ref> <cit.>. The spacecraft holds an attitude in which the Solar array paddle (+Z direction) points toward the Sun during this period, and ZL observations are conducted during periods when the ion engines are not in operation. Since ONC-T points toward -Z direction, ZL is observed toward the antisolar direction. This is an advantage of our ZL observations over past observations because previous ZL observations in the interplanetary space were made at various Solar elongation angles, making it difficult to distinguish whether ZL changes were due to the changes of heliocentric distance or Solar elongation. In our ZL observations, the change in ZL brightness due to Solar elongation is minimized by observing ZL with nearly constant Solar elongation (see Table <ref>). Stray light occurs when sunlight hits the radiator to cool the detector of ONC-T from a certain range of directions <cit.>. Thus, ZL observation needs to be conducted in a “stray light avoidance attitude”, in which -X side and +Y side of the spacecraft are illuminated by the Sun. For this reason, the actual directions of ZL observations are shifted from the antisolar direction by ∼10 degrees. Table <ref> summarize the observed fields and the position of the spacecraft when the observations were conducted. When observable direction (antisolar direction) is pointed toward the Galactic plane or Galactic center, this period is not suitable for ZL observations because the Galactic brightness is too strong for ZL observation (see Section <ref> and <ref>). Thus, unsuitable ZL observation periods were set when the antisolar direction is pointing toward (1) Galactic latitude < 20^∘ (blue in Figures <ref> and <ref>) or (2) Galactic longitude < 20^∘ (green in Figures <ref> and <ref>). ZL observations were made approximately once a month during the time suitable for ZL observations (red in Figures <ref> and <ref>). §.§ Acquired Images The ONC-T detector has a 1024 × 1024 pixels imaging region, and two 16 × 1024 pixels masked regions called “optical black” on both sides as dark references <cit.>. The two optical black images are combined and treated as one 32 × 1024 pixels optical black image. Raw images acquired by ONC-T are processed in a sequence of steps to calibrate the image data. In this work, we used L2a level images, which are raw FITS images with header information containing the spacecraft system housekeeping data and ONC status data (the temperatures of the detector, lens system, and electronics, as well as the voltages of the electronics, etc.) <cit.>. The signal of each pixel is shown in the unit of 16-bit digital numbers (DN). One data set of the ZL observation includes one bias image (B), three wide-band images (W_i, i=1-3), two v-band images (V_j, j=1-2), and their respective optical black images (Bb, Wb_i, and Vb_j) as shown in Figure <ref>. For the ZL observations on 2021-11-29, 2021-12-06, 2021-12-28, 2022-01-24, and 2022-02-14, two data sets were acquired for monitoring stability of ONC-T sensitivity after ONC-T turned-on as a part of calibration operations. §.§ Dark Current Subtraction Dark current subtraction is essential for the measurements of diffuse radiations, such as ZL. In our data set, the dark current for each image is estimated from the dark image, which is made by the optical black image minus a bias image (Wb_i-Bb and Vb_j-Bb). Then, a histogram of the dark image is created, and its peak position is taken as the dark current value of that image. The histogram of the dark image is fitted by a Gaussian function. By finding the peak position of the histogram, we found the mode of the dark image. By this Gaussian fitting procedure, bad pixels, such as leakage of light from the imaging region into the masked region or hot pixels caused by cosmic-ray hitting, are eliminated. The obtained dark current values of wide-band and v-band images are expressed as Dark(Wb_i-Bb) and Dark(Vb_j-Bb), respectively. As an example of the first bias-subtracted optical black image Wb_1-Bb taken on 2022-08-29, the dark current of this image was derived as Dark(Wb_1-Bb) = 5.92 DN from the peak position of the histogram of the optical black image Wb_1-Bb, as shown in Figure <ref>. Next, the obtained dark current and the bias image are subtracted from the sky image, yielding three wide-band subtracted images and two v-band subtracted images in one data set. For the wide-band images, a single redacted image (W) was generated from three subtracted images by taking the median of each pixel: W = median[W_i - (B + Dark(Wb_i -Bb))]. This median procedure removes many hot pixels caused by cosmic-ray hitting. Since there are only two v-band images, the median procedure cannot be taken. A single redacted image (V) was generated by taking the minimum of each pixel to reduce hot pixels by cosmic-ray hitting: V = min[V_i - (B + Dark(Vb_i -Bb))]. §.§ Stray Light subtraction Since stray light occurs in ONC-T images when the spacecraft is in a certain attitude <cit.>, all ZL observations were conducted in a stray light avoidance attitude. However, weak stray light still remains even when a stray light avoidance attitude is taken. Figures <ref>a and <ref>b are the redacted images of wide-band (W) and v-band (V) on 2021-08-23, respectively, showing that the stray light patterns can be seen clearly in these images. It is known that the intensity and pattern of the stray light are irrespective of filter selection <cit.>. Thus, the v-band image (V) is subtracted as a reference frame of the stray light from the wide-band image (W) to remove the remaining stray light as shown in Figures <ref>c and <ref>d. Since the signal of ZL in v-band image is estimated to be less than 1 DN, there is little impact on the scientific analysis of ZL due to this stray light removal procedure. An additional stray light pattern was found in the data obtained on 2022-01-24 and 2022-02-14 as shown in Figure <ref>. Because this stray light appears only in the wide-band image, it cannot be removed by the v-band subtraction procedure. The source of this additional stray light is considered to be light scattered at the inner wall of the entrance hole of the ONC-T's hood, which is indicated by the shape of the stray light (circular pattern). For this reason, data from these two days were excluded from subsequent analyses. §.§ Flat Field Correction The stray light subtracted image (W-V) clearly shows the limb-darkening pattern (Figures <ref>c and <ref>d), which is the same pattern as the flat-field image (Figure <ref>e) <cit.>. This fact means that the detector is uniformly illuminated from the front of the optics, showing that the sky brightness is certainly detected by ONC-T. This limb-darkening pattern is corrected by dividing the image with the normalized flat-field image as shown in Figure <ref>f. Since the flat-field image of wide-band has not been created, we used the flat-field image of v-band instead. The wavelength dependence of the flat-field image is negligible because the detector is identical for both bands. The obtained image after the flat-field correction (SKY) is the final reducted image of the sky used for scientific analysis: SKY = (W - V) / flat. §.§ Sensitivity Calibration Using Stars After the two touchdown operations to the asteroid Ryugu, degradation of ONC-T sensitivity has been reported <cit.>. Thus, the sensitivity of ONC-T in our data is monitored and calibrated using field stars in our images. In this sensitivity calibration, we used not the SKY image but the W/flat image because bright stars used in this calibration process are detected in both wide-band and v-band. Thus v-band flux for the bright stars was subtracted in the SKY image. Although the W/flat image includes the stray light described in Section <ref>, it can be removed by the aperture photometry procedure described below. The sensitivity calibration procedure for the wide-band is as follows. First, the astrometry of the images is solved by the distribution of the stars with the astrometry calculation code Astrometry.net <cit.>. Next, bright stars in the image are matched to the Gaia Data Release 3 (DR3) catalog <cit.>. This catalog is suitable for our data set because the wavelength coverage of Gaia's G-band, which is the unfiltered, white-light photometric band, is similar to our wide-band on ONC-T (Figure <ref>). The Gaia DR3 catalog contains around 1.806 × 10^9 sources with a limiting magnitude of about G ∼ 21 mag with uncertainties of ∼0.3 mmag for G<13 mag, 1 mmag at G=17 mag, and 6 mmag at G=20 mag. We selected stars that meet the following criteria; * The selected stars are in the region of stray light intensity in the V image less than 20 DN, * The selected stars are in the region of normalized flat-field value greater than 0.8, * The selected stars have flux between 6th and 9th AB magnitude in G-band in the Gaia DR3 catalog. Criteria (<ref>) and (<ref>) are to reduce the uncertainty caused by the reduction process of stray light subtraction and flat-field correction. The fraction of the area satisfying both criteria (<ref>) and (<ref>) is approximately 44% of the total detector area at the center region of the detector. Criteria (<ref>) is to reduce the uncertainty of the photometry by selecting stars that have sufficient signal but are not saturated. The detector of ONC-T is known to be linear up to ∼3000 DN with <1% deviation <cit.>, and a signal value of even the brightest pixel in the image of 6th magnitude star is approximately within this range. For aperture photometry, a box region of 41×41 pixels centered on the selected star is cut out, and this box region is divided into the central star region and a surrounding background region as shown in Figure <ref>. The radius of the circle to cut out the star at the center is adjusted according to the G-band brightness of this star in the catalog. Next, all pixels greater than 20 DN are masked considering them to be other astronomical objects (stars and galaxies) or hot pixels owing to cosmic-ray hitting, and additional masks were applied by a σ-clipping procedure to remove the remaining bright pixels. Then, all the masked images were examined by eye, and the remaining bad pixels were additionally masked. Subsequently, the background brightness and its noise are calculated by taking an average and standard deviation of the masked background region, and the background brightness is subtracted from the star region. The flux of the central star is then calculated by taking a sum of the masked and background-subtracted star region, and its uncertainty is estimated based on the background noise. Figure <ref> shows the relation between the G-band flux of the selected stars in the catalog and their detected signal on the 2022-12-12 data. A good linear relation between them is found in all the observed data, and the sensitivity in [(DN/sec)/(W/m^2/μm/sr))] unit is obtained by taking the ratio of them. Figure <ref> (left) shows the obtained sensitivity calculated from our observed data as a function of time. The sensitivity obtained after the return to the Earth <cit.> is also shown. This figure shows that the degradation of the sensitivity has been stopped and has remained almost constant since the return to the Earth. The average and standard deviation of the sensitivities after the σ-clipping procedure is 16095 ± 490 [(DN/sec)/(W/m^2/μm/sr))] (red solid and dashed lines in Figure <ref> left), which is applied to all data to obtain the sky brightness of the wide-band. The standard deviation of the sensitivities is treated as a systematic uncertainty (see Section <ref>). The same sensitivity calibration procedure was applied to the v-band data (V/flat images) to check the consistency of the result because the wide-band data and v-band data share the same detector. Gaia does not have the V-band filter but it has the blue band (BP) and the red band (RP), and the V-band magnitude can be estimated by the BP and RP magnitudes <cit.>. In the selection of stars for the v-band calibration, conditions (<ref>) and (<ref>) are the same as for the wide-band calibration, and in condition (<ref>), stars brighter than 8th mag in the converted V-band are selected. Figure <ref> (right) shows the sensitivity profile of v-band, and we confirmed that the sensitivity remained constant in our dataset. The obtained sensitivity and its 1σ uncertainty of the v-band is 906 ± 37 [(DN/sec)/(W/m^2/μm/sr))]. §.§ Point Spread Function The template of the point spread function (PSF) of the ONC-T wide-band image was made by adding the images of several bright stars. First, as suitable images for making the PSF template, we selected 56 objects with G-band magnitude between 6th mag and 8th mag that have clean stellar images with few bad pixels or without other objects around them. Then, these images were aligned with 0.1 pixel resolution and added together to obtain the PSF template. Figure <ref> shows the obtained PSF template and its radial profile with 0.1 pixel resolution. The full-width half maximum (FWHM) of the PSF is 2.00 pixels, which is consistent with the previous measurements <cit.>. §.§ Sky Brightness The sky brightness is obtained as the signal value of blank pixels in the SKY image. The same histogram method used to determine the dark current described in Section <ref> is applied to determine the sky brightness from the SKY image because the number of pixels observing the blank sky is much larger than those observing stars and galaxies. Figure <ref> shows the histogram of the SKY image and its best-fit Gaussian curve on the 2022-10-17 data. The sky brightness is obtained as the peak position of the Gaussian curve, and its 1σ error estimates of the peak position is treated as statistic uncertainty of the sky brightness. The obtained sky brightness in DN unit was converted to λ I_λ in nW/m^2/sr unit by applying the calibration factor obtained in Section <ref>. By this procedure, the systematic uncertainty of the calibration factor is transferred to the systematic uncertainty of the sky brightness. Table <ref> summarizes the obtained sky brightness and its statistic and systematic uncertainties. §.§ Limiting Magnitude It is important to know the limiting magnitude in our observed images because we need to mask the detected stars to derive the diffuse brightness of the sky. As shown in Figure <ref>, the histogram of the SKY image has a side lobe caused by the detected stars in the images, which exceeds the best-fit Gaussian curve. The width (σ) of the Gaussian means the standard deviation of the fluctuation of the sky brightness, and the limiting magnitude is defined as the brightness of stars when three pixels in the center of the PSF (Figure <ref>) of this star exceed the +2σ of the sky deviation. The uncertainty of determining the limiting magnitude is set to be 1 DN, which is equivalent to approximately 0.2 mag uncertainty of the limiting magnitude. The limiting magnitude of each image and its uncertainty are summarized in Table <ref>. Stars brighter than the limiting magnitude were extracted from the Gaia DR3 catalog (see Section <ref>), convolved with the PSF (see Section <ref>), and distributed in the image to create a Gaia bright star image as shown in Figure <ref> (b). The distribution of stars in this Gaia bright star image reproduces well the distribution of the detected stars in the observed image by ONC-T (Figure <ref> (a)), indicating the validity of the detection limits determined by the method described above. The Gaia bright star image is used as a stellar mask to conceal stars when ZL is obtained (see Section <ref>). § BACKGROUND SUBTRACTION §.§ Integrated Star Light Stars fainter than the limiting magnitude are not detected as point sources in the observed image, but the sum of the light from those undetected stars, called the Integrated Star Light (ISL), contributes to the sky brightness. Therefore, ISL should be estimated and subtracted from the sky brightness to obtain ZL. The ISL image for each field was made by stars darker than the limiting magnitude extracted from the Gaia DR3 catalog as shown in Figure <ref> (c). The average brightness of each ISL image and its 1σ statistic uncertainty are summarized in Table <ref>. Since the ISL in the optical wavelength is saturated by adding stars up to 20 mag <cit.>, the depth of the Gaia DR3 catalog is sufficient. The photometric uncertainty in the catalog is negligible compared with the uncertainty of the limiting magnitude of ONC-T. §.§ Diffuse Galactic Light The Diffuse Galactic Light (DGL) comprises scattered starlight by interstellar dust in our Galaxy <cit.>, which should be also subtracted from the sky brightness to obtain ZL. A commonly used method to estimate DGL is to use the correlation with the thermal emission from the interstellar dust at far-infrared. The intensity map at λ =100 μm, which is a reprocessed composite of the COBE and IRAS maps (SFD map <cit.>), is commonly used as the template for interstellar dust distribution. DGL = νβ_λ· d(Glat) · I_ SFD where DGL is the DGL brightness expressed as λ I_λ in nW/m^2/sr, I_ SFD is the far-infrared intensity at 100 μm from SFD map in MJy/sr, d(Glat) is a geometric function at a Galactic latitude (Glat), and νβ_λ is the DGL correlation factor shown in [(nW/m^2/sr)/(MJy/sr)]. As described in <cit.>, the geometric function is computed as d(Glat) = d_0 (1-1.1g√(sin |Glat|)) where d_0 is a normalizing parameter at Glat = 25 deg <cit.> and g is the asymmetry factor of the scattering phase function <cit.>. This DGL correlation factor at optical and near-infrared wavelengths is derived from many previous works <cit.>, but the results are split into two. Recently, the values of νβ_λ = 3.54 ± 0.91 [(nW/m^2/sr)/(MJy/sr)], d_0 = 1.76, and g = 0.61 are reported from the result by the Long-Range Reconnaissance Imager (LORRI) on New Horizons obtained at 10-50 au from the Sun where ZL is negligible <cit.>. The bandpass of LORRI is also similar to that of wide-band of ONC-T (Figure <ref>). However, this DGL estimate is about 5-10 times smaller than many previous results. For example, the values of νβ_λ = 21.0 ± 0.9 [(nW/m^2/sr)/(MJy/sr)] and d(Glat)=1 (the geometric function is not considered) at 0.65 μm were obtained based on the observations with the Hubble Space Telescope (HST) <cit.>. In this work, the average of these two DGL estimates is adopted as the representative DGL estimate, and the difference between them is treated as a systematic uncertainty. In addition, the spatial resolution of the SFD map (6.1 arcmin) is insufficient relative to our data of ONC-T (22 arcsec). Therefore, we used the far-infrared all-sky diffuse map based on AKARI all-sky survey <cit.> in this study. Because these AKARI all-sky diffuse maps cover wider wavelength ranges with finer spatial resolution and better signal-to-noise ratio than the SFD map, AKARI all-sky diffuse maps can be a new template for the DGL estimations, replacing the SFD map as the de facto standard. In this study, we used the AKARI Wide-S (λ =90 μm) map, whose spatial resolution is ∼ 1.3 arcmin. One difference between these maps is that the point sources are not removed from the AKARI Wide-S map, whereas the point sources are removed from the SFD map. Therefore, we masked all point sources included in the AKARI Far-Infrared Bright Source Catalogue Version 2 <cit.>. Figure <ref> compares the SFD map (left) and AKARI Wide-S map (center) on 2022-08-23 field, showing that AKARI Wide-S map has better spatial resolution than the SFD map. The publicly available AKARI Wide-S map has a remainder of ZL subtraction because only the smooth cloud component of ZL is subtracted from the raw data and other ZL components, such as the asteroidal dust bands, are not subtracted <cit.>. The contribution from the unsubtracted ZL components is recognizable in the Wide-S map at the low ecliptic latitude region, where we study in this work. A good linear correlation between the SFD map and the AKARI Wide-S map is known <cit.>, but AKARI Wide-S map at low ecliptic latitudes shows deviations from the linear correlation owing to the residual of the ZL subtraction. Therefore, we used the data that the other ZL components are additionally subtracted from the public AKARI Wide-S map based on the ZL asteroidal dust band model <cit.>. We confirmed the good correlation between the SFD map and the additionally ZL-subtracted AKARI Wide-S map as shown in Figure <ref> (right), I_ SFD= a × I_ Wide-S +c where I_ Wide-S is the far-infrared intensity from AKARI Wide-S map in MJy/sr, and a and c are the fitting parameters. We obtained a = 1.54 ± 0.05 and c = -1.20 ± 0.14 MJy/sr in our observation fields, which are consistent with the result based on the all-sky data <cit.>. We converted the AKARI Wide-S maps in our observations fields to the DGL images using the equations (<ref>) and (<ref>). Another issue in the AKARI Wide-S map is the sky coverage. AKARI all-sky map has >99 % coverage of the whole sky, but our observation fields contain the data missing regions. Therefore, SFD data is applied to the missing regions in the AKARI Wide-S map. The averaged DGL brightness and its statistic and systematic uncertainties are summarized in Table <ref>. The average brightness of the converted AKARI Wide-S map matches well with the brightness of the SFD map. §.§ Extragalactic Background Light The Extragalactic Background Light (EBL) arises from integrated emissions from the first-star production era to the present day. Recent observations show that the measured EBL at optical and near-infrared has an excess over the cumulative light from galaxies <cit.>, meaning that there are unknown light sources in the universe. The light sources for this excess is still under discussion, but some candidates are proposed such as intra-halo light <cit.>, primordial black holes on the collapse of the first halos <cit.>, decaying hypothetical particles <cit.>, nearby black holes observed as faint compact objects <cit.>, and warm-hot intergalactic medium <cit.>. We adopted EBL(λ I_λ) = 21.98 ± 1.83 nW/m^2/sr at λ = 0.44-0.87 μm observed by LORRI/New Horizons <cit.>, and this value of EBL is subtracted to obtain the ZL brightness. §.§ Zodiacal Light ZL is obtained by subtracting background emissions from observed sky brightness: ZL = SKY - ISL - DGL - EBL First, we subtracted the ISL image (Section <ref>), DGL image (Section <ref>), and EBL (Section <ref>) from the SKY image (Section <ref>) to obtain the ZL image, and the detected stars in the ZL image are concealed by the mask image (Section <ref>). As shown in Figure <ref> (d), this masking procedure works well for almost all stars although the periphery of some brightest stars are not masked perfectly and are smeared out. Then, a histogram of the area where flat > 0.5 and stray light < 20 DN (see Section <ref>) was created for each masked ZL image, and its peak position and its 1σ error estimate were regarded as the brightness and its statistic uncertainties of ZL (Figure <ref>). The systematic uncertainty of ZL comes from the systematic uncertainties of calibration and DGL. Comparing the histograms of the masked ZL image (Figure <ref>) with the SKY image (Figure <ref>), the excess of the side lobe over the Gaussian is reduced thanks to the stellar masking. There is still a small excess owing to the smeared periphery of brightest stars and some hot pixels by cosmic-ray hitting, but this small excess has little effect to obtain the peak position of the Gaussian because the Gaussian fitting was performed on data within +2σ range from the peak (red dashed line in Figure <ref>). The obtained ZL and its uncertainties are summarized in Table <ref> and shown in Figure <ref> (black). § DISCUSSION §.§ Absolute ZL brightness The obtained ZL brightness is compared with the model brightness. The precise ZL model (Kelsall model) was developed based on the observations of the all-sky ZL brightness by COBE at infrared wavelengths <cit.>. The shortest wavelength of ZL brightness that can be calculated with this model is 1.25 μm, which is out of the wide-band of ONC-T used in this study. However, ZL at both 1.25 μm and optical wavelength (ONC-T wide-band) is the scattered sunlight component, and the spectral shape is the same irrespective of ecliptic latitude <cit.>. Therefore, the model ZL brightness at 1.25 μm observed from the Hayabusa2 position was calculated using the ZodiPy code <cit.>, and then ZL brightness at the optical wavelength (ONC-T wide-band) was estimated by extrapolating from 1.25 μm using the Solar spectrum <cit.> as shown in Figure <ref> (red). The Gegenschein appears in the antisolar direction, and the Kelsall model does not include the Gegenschein. However, our observed fields are shifted from the antisolar direction by ∼10 deg (see Table <ref>), where the Gegenschein is negligible <cit.>. Our obtained ZL brightness is well reproduced by the extrapolated model brightness, which shows the assumption that the Solar spectrum used for extrapolation is reasonable. There are small excesses of the observed ZL brightness over the model brightness at around 0.9 au. This structure may be real, but cannot be concluded at this point due to the paucity of data points. Verification through the accumulation of data from future observations is necessary. §.§ Field Variance Correction Since each ZL brightness was obtained at different ecliptic latitudes and Solar elongations, a correction of the field variance is necessary to obtain the radial profile of ZL by comparing them under the same conditions. This field variance correction was conducted based on the Kelsall model. We calculated the seasonal average of ZL model brightness toward the antisolar direction on the ecliptic plane at various heliocentric distances as shown in Figure <ref> (left, red). The radial power-law index of this calculated ZL model brightness is α = 1.34 because this value is used in the Kelsall model. This ZL brightness toward the antisolar direction was compared with the ZL model brightness toward the observation fields by ONC-T (Figure <ref> left, black). The ratios of these two ZL model brightness at each position were multiplied by the observed ZL brightness as correction factors to obtain the ZL brightness toward the antisolar direction on the ecliptic plane (Figure <ref> right). The correction factors are summarized in Table <ref>. §.§ Dependence on Heliocentric Distance Based on the corrected ZL brightness, the radial power-law index α is calculated by the following method. The ZL brightness has two types of uncertainties; statistic uncertainty and systematic uncertainty. Statistical uncertainties appear randomly for each data, while systematic uncertainties appear with a certain tendency for each data. Our data contain two types of systematic uncertainties, one due to calibration (see section <ref>) and the other due to DGL (see section <ref>). Therefore, we calculated the radial power-law index α for a total of 3 × 3 cases (three cases for calibration uncertainty and three cases for DGL uncertainty). Table <ref> shows the obtained values of α for each systematic uncertainty case. As seen in Table <ref>, calibration uncertainty does not have a significant impact on the values of α since the data points only go up and down overall. On the other hand, DGL uncertainty has a significant impact on the values of α. From these values, we obtain α = 1.30 ± 0.08 as the final result. Figure <ref> shows the radial profile of ZL and the best-fit power-law function. Again, the excess structure at ∼0.9 μm can be seen in Figure <ref>. Table <ref> compares our obtained value of α with previous results, and our result is consistent with previous results. Since it is difficult to determine the radial profile of the IPD density by the ZL observations from the geocentric orbit or F-corona observations, direct observations of the ZL radial profile in the interplanetary space outside the Earth's orbit are more reliable. Our observation is the first successful observation of ZL in the interplanetary space in 40 years since Helios 1/2 and Pioneer 10/11. In addition, ZL intensity varies with both the heliocentric distance and Solar elongation, and both of them have varied in the previous observations by Helios 1/2 and Pioneer 10/11. On the other hand, we made our observations in the anti-solar direction (Solar elongation ∼180 deg), so we can impose changes in ZL brightness on changes in heliocentric distance. The values of α greater than 1 are obtained by all the ZL observations, although α =1 is expected if the orbital evolution of the IPD is dominated by the PR effect <cit.>. This is caused by the dust production by the collision of dust particles <cit.>, dust supply by comets around 1 au <cit.>, the finiteness of the dust cloud <cit.>, or heliocentric dependence of local albedo of IPD <cit.>. In fact, the heliocentric distance dependence of local albedo of IPD of r^-0.3 ± 0.1 was reported <cit.>, which explains α being greater than 1 partially. The IPD falling on the sun due to the PR effect decrease in size owing to evaporation, and then such small IPD is blown away by radiation pressures as β-meteoroids. The radial profile of the β-meteoroids is expected α =2, and recent in-situ direct counting of impact flux of IPD experienced by PSP shows α = 2 at 0.17-0.7 au <cit.>. On the other hand, reddening <cit.> and polarization <cit.> of the ZL spectrum indicate that the majority of IPD seen as ZL is large (>1 μm), and smaller-sized IPD does not contribute much to ZL but they exist <cit.>. Therefore, the value of α = 2 is obtained by the IPD impact counting method sensitive to small IPD, but α between 1 and 2 was obtained by ZL observations sensitive to larger IPD. The small dust particles become hotter than the larger particles <cit.>, and the hot component in the thermal emission from IPD was found by the mid-infrared spectroscopy at λ = 3-6 μm <cit.>. Therefore, the value of α∼ 2 would be obtained when we conduct ZL observation at λ = 3-6 μm outside the Earth's orbit because small dust particles with high temperatures are mainly observed in this wavelength range. §.§ Future Observations Since the ZL observation at 0.7-1 au by Hayabusa2# will continue until the Earth swing-by at the end of 2027, the accuracy of the result will be improved through observation data accumulation. In particular, the excess structure at ∼0.9 μm needs to be verified by accumulating data through continued observations in this phase. After the second Earth swing-by in 2028, the Hayabusa2 spacecraft will fly an orbit in the 1-1.5 au range <cit.>, so we can obtain the radial profile in the outer region. Before this orbital change of Hayabusa2#, we have a chance to observe the radial profile of ZL by the Martian Moons eXploration (MMX), which is the Japanese sample-return mission of the Martin satellite, Phobos <cit.>. MMX is scheduled for launch in 2024 and arrival on Mars in 2025, and we are proposing to conduct the simultaneous multi-wavelength (350-1000 nm) ZL observation during this cruising phase by the Optical RadiOmeter composed of CHromatic Imagers (OROCHI) on MMX <cit.>. In addition, we are developing the EXo-Zodiacal Infrared Telescope (EXZIT) with the aim of installing it on a spacecraft to Jupiter or farther <cit.>. If we could realize it, we can observe the radial profile of ZL at 1-5 au and the EBL without the ZL foreground at above 3 au. We are also considering adding mid-infrared capabilities to EXZIT, which would allow us to examine our prediction of α∼ 2 index of the ZL radial profile owing to the small particles. § SUMMARY The ZL brightness at optical wavelengths at 0.76-1.06 au was observed with ONC-T on Hayabusa2# mission. A small excess of the observed ZL brightness over the model brightness at around 0.9 au was detected, but whether this structure is realistic or not cannot be determined at this stage due to the paucity of data points. The obtained radial power-law index is α = 1.30 ± 0.08, and the uncertainty in this estimate is dominated by the uncertainty due to the DGL estimation. This result is consistent with the other previous result based on ZL observations. § ACKNOWLEDGEMENTS The Hayabusa2 spacecraft was developed and built under the leadership of the Japan Aerospace Exploration Agency (JAXA), with contributions from the German Aerospace Center (DLR) and the Centre National d'études Spatiales (CNES), and in collaboration with NASA, Nagoya Univ., The Univ. of Tokyo, National Astronomical Observatory of Japan (NAOJ), Univ. of Aizu, Kobe Univ., and other universities, institutes, and companies in Japan. This work has made use of data obtained with AKARI, a JAXA project with the participation of the European Space Agency (ESA). This work also has made use of data from the ESA mission Gaia (<https://www.cosmos.esa.int/gaia>), processed by the Gaia Data Processing and Analysis Consortium (DPAC, <https://www.cosmos.esa.int/web/gaia/dpac/consortium>). Funding for the DPAC has been provided by national institutions, in particular, the institutions participating in the Gaia Multilateral Agreement. This research has made use of the VizieR catalogue access tool, CDS, Strasbourg, France (DOI : 10.26093/cds/vizier). The original description of the VizieR service was published in <cit.>. The authors thank Takafumi Ootsubo (NAOJ) for providing the ZL-subtracted AKARI Wide-S data, and Teresa Symons (University of California, Irvine) and Michael Zemcov (Rochester Institute of Technology) for discussion on DGL estimate based on New Horizons. § FUNDING K. Tsumura is supported by JSPS KAKENHI Grant Number 20H04744 and Tokyo City University Prioritized Studies. § ABBREVIATIONS CNES: Centre National d'études Spatiales; COBE: Cosmic Background Explorer; DARTS: Data Archives and Transmission System; DGL: Diffuse Galactic light; DN: digital number; DPAC: Data Processing and Analysis Consortium; DR: Data release; EBL: Extragalactic Background Light; ESA: European Space Agency; EXZIT: Exo-Zodiacal Infrared Telescope; FWHM: Full-width half maximum; HST: Hubble Space Telescope; IPD: Interplanetary dust; ISL: Integrated star light; JAXA: Japan Aerospace Exploration Agency; LORRI: Long-Range Reconnaissance Imager; MMX: Martian Moons eXploration; NAOJ: National Astronomical Observatory of Japan; ONC: Optical Navigation Camera; OROCHI: Optical RadiOmeter composed of CHromatic Imagers; PR effect: Poynting-Robertson effect; PSF: Point spread function; PSP: Parker Solar Probe; STEREO: Solar TErrestrial RElations Observatory; ZL: Zodiacal light. § AVAILABILITY OF DATA AND MATERIALS The raw datasets of this study will be made available in the Hayabusa2 Science Data Archives on the Data Archives and Transmission System (DARTS) repository, at <https://www.darts.isas.jaxa.jp/planet/project/hayabusa2/>. The analyzed datasets of this study are available from the corresponding author upon reasonable request. § COMPETING INTERESTS No competing interest is declared. § AUTHORS' CONTRIBUTIONS K.Ts. analyzed the data and wrote the manuscript. S.M., K.Sa., T.I., and K.Ta. contributed to the data analysis. M.Y., T.M., T.K., M.H., Y.Y., E.T., M.M., N.S., R.H., S.K., H.Su., K.Y., Y.C., K.O., K.Sh., H.Sa., and S.S. contributed to ONC data acquisitions and reduction. M.Y. contributed to preparing the operation sequence for the ZL observations. All authors discussed the results and approved the final manuscript. vancouver label
http://arxiv.org/abs/2303.07332v1
20230313175221
3D hydrodynamics simulations of internal gravity waves in red giant branch stars
[ "Simon Blouin", "Huaqing Mao", "Falk Herwig", "Pavel Denissenkov", "Paul R. Woodward", "William R. Thompson" ]
astro-ph.SR
[ "astro-ph.SR" ]
firstpage–lastpage Lifted particles from the fast spinning primary of the Near-Earth Asteroid (65803) Didymos Paula G. Benavidez^1,4 March 30, 2023 ========================================================================================== We present the first 3D hydrodynamics simulations of the excitation and propagation of internal gravity waves (IGWs) in the radiative interiors of low-mass stars on the red giant branch (RGB). We use the PPMstar explicit gas dynamics code to simulate a portion of the convective envelope and all the radiative zone down to the hydrogen-burning shell of a 1.2 M_⊙ upper RGB star. We perform simulations for different grid resolutions (768^3, 1536^3 and 2880^3), a range of driving luminosities, and two different stratifications (corresponding to the bump luminosity and the tip of the RGB). Our RGB tip simulations can be directly performed at the nominal luminosity, circumventing the need for extrapolations to lower luminosities. A rich, continuous spectrum of IGWs is observed, with a significant amount of total power contained at high wavenumbers. By following the time evolution of a passive dye in the stable layers, we find that IGW mixing in our simulations is weaker than predicted by a simple analytical prescription based on shear mixing and not efficient enough to explain the missing RGB extra mixing. However, we may be underestimating the efficiency of IGW mixing given that our simulations include a limited portion of the convective envelope. Quadrupling its radial extent compared to our fiducial setup increases convective velocities by up to a factor 2 and IGW velocities by up to a factor 4. We also report the formation of a ∼ 0.2 H_P penetration zone and evidence that IGWs are excited by plumes that overshoot into the stable layers. hydrodynamics, methods: numerical, stars: evolution, stars: interiors, turbulence, waves § INTRODUCTION When exiting the main sequence and entering the red giant branch (RGB), the outer layers of low-mass stars expand, cool down, and as a result become more opaque to radiation. This triggers convection in their envelopes, which brings up to the surface the products of H fusion. After this “first dredge-up”, no further changes to the atmospheric abundances of RGB stars are predicted by canonical stellar evolution theory, since the outer convective envelope remains isolated from the H-burning shell by a radiative zone that blocks the transport of species from the H-burning region to the surface. But spectroscopic observations tell a different story. After the H-burning shell has crossed the composition discontinuity left at the maximal extent of the convective envelope during the first dredge-up (the so-called bump luminosity), the surface composition of nearly all low-mass RGB stars starts changing again. The ^13C and ^14N abundances increase, while the ^12C and ^7Li abundances decrease <cit.>. Those abundance changes are the signpost of H fusion and imply that species can be transported across the radiative zone that separates the H-burning shell from the convective envelope <cit.>. The search for the extra mixing process responsible for this transport has been the subject of intense theoretical efforts for decades <cit.>. The most commonly invoked mechanism is thermohaline mixing (or fingering convection). This instability is triggered in RGB stars due to ^3He burning in the outskirts of the H-burning shell, which produces a depression in the mean molecular weight profile μ <cit.>. The efficiency of this mixing mechanism crucially depends on the aspect ratio of the “fingers” formed as a result of the μ profile inversion. The aspect ratios needed to produce enough mixing far exceed those predicted by numerical simulations, where more blob-like structures are observed <cit.>. This suggests that thermohaline mixing alone is not sufficient to explain the observed extra mixing and the quest for additional mixing mechanisms is still ongoing. Internal gravity waves (IGWs) are suspected to be an efficient species transport mechanism in the radiative zones of stellar interiors <cit.>. IGWs are caused by density perturbations in a stably stratified fluid and have buoyancy as a restoring force. In stellar interiors, they are stochastically excited by convective motions at the convective–radiative interface. Therefore, one can expect IGWs to be generated at the lower boundary of the convective envelope of RGB stars and to propagate inside the radiative zone that separates the H-burning shell from the convective envelope. This could provide an additional mixing mechanism for RGB stars. In addition to transporting species, IGWs may also transport angular momentum <cit.>. Asteroseismological observations have revealed that the cores of RGB stars spin much faster than their envelopes <cit.>, but also much slower than if there was no additional angular momentum transport mechanism coupling the core to the envelope <cit.>. Current evolutionary models fail to predict this (relatively) slow rotation: an additional process that extracts angular momentum from the core is needed. IGWs <cit.> have been considered as a solution to this problem <cit.>. Due to the complex interplay between convective motions and the excitation and propagation of IGWs, detailed hydrodynamics simulations are required to accurately determine the properties of IGWs in stellar interiors and ultimately assess their impact on stellar evolution. Analytical approaches are also possible <cit.>, but they inevitably rely on a number of assumptions (e.g., the wave excitation mechanism, the shape of the power spectrum). Multi-dimensional hydrodynamics simulations of IGWs excitation and propagation have been performed for main-sequence stars <cit.>, but to our knowledge no results currently exist for RGB stars. In this work, we present the first hydrodynamics simulations of IGW excitation and propagation in RGB stars. We use the PPMstar gas dynamics code to perform three-dimensional, full-sphere, high-resolution simulations of two different phases in the evolution of a 1.2 M_⊙ star on the RGB. Based on these simulations, we present a first estimate of the mixing enabled by IGWs in RGB stars. In Section <ref>, we describe the MESA models that we use as base states for our hydrodynamics simulations and explain how the latter are set up in PPMstar. We then discuss the overall properties of our simulations in Section <ref>, where we present high-resolution renderings of our simulations as well as radial profiles and power spectra. Mixing by IGWs is investigated in Section <ref> using two different approaches. Section <ref> is devoted to the influence of the size of the convective envelope on our results and Section <ref> to the properties of the convective boundary. Finally, our conclusions are stated in Section <ref>. § METHODS §.§ MESA models We use MESA version 7624 <cit.> to generate the initial states of our hydrodynamics simulations. We calculated the evolution of a 1.2 M_⊙ star from the pre-main sequence to the tip of the RGB. We assume an initial metallicity of [ Fe/H]=-0.3, and the mixing length theory (MLT) is used, with mixing length ℓ_ MLT = 2 H_P (where H_P is the pressure scale height). Figure <ref> displays the evolution of our model from the zero-age main sequence to the tip of the RGB in the theoretical Hertzsprung–Russell diagram. Two circles identify the two phases simulated in 3D in this work. The first one is just after the bump luminosity at log L/L_⊙=2.00 (this is our “bump setup”), and the second one is very close to the tip of the RGB at log L/L_⊙=3.33 (this is our “tip setup”). Figure <ref> shows the Kippenhahn diagram of our MESA model along the RGB. The convective envelope is in grey and the H-burning shell is displayed as a thin blue line; the narrow region in between is the radiative zone where IGWs propagate. Two dashed vertical lines indicate the models that correspond to our bump and tip setups and the thick solid lines show the portion of those models that we actually simulate in 3D. It would be prohibitively expensive to simulate the whole star and choices have to be made regarding which regions to include. For both setups, we omit the inner R < 40Mm, which corresponds to truncating our setups just above the H-burning shell. The equation of state currently included in PPMstar does not account for the degeneracy pressure that becomes prominent in the dense inner core, and in any case this region is not strictly needed to study IGWs in the radiative zone above. Furthermore, recent 2D hydrodynamics simulations of a Sun-like star show that the location of the inner simulation boundary has a negligible effect on the IGWs <cit.>; a similar behaviour can be expected for the RGB. The mass contained inside this inner 40 Mm is taken into account when computing the gravitational acceleration in our 3D simulations. For the upper boundary, we adopt a maximum radius of R_ max=900 Mm for our fiducial simulations, which represents only 8% of the stellar radius for the bump setup and 1% for the tip setup. This is enough to include all the radiative zone and a portion of the convective envelope. However, we recognize that artificially blocking the flow at 900 Mm (PPMstar uses reflective boundary conditions) alters the convective motions in the envelope by impeding the development of large-scale convective modes. But extending our simulation sphere further out would degrade the grid resolution in the radiative zone where the IGWs propagate, and we thus settled on R≤ 900 Mm as a compromise between those two effects. We will explore how including a larger envelope affects our results in Section <ref>. To initialize the 3D hydrodynamics simulations, we only require (1) the mass contained within the inner simulation radius (i.e., within R<40Mm), (2) the pressure at the inner simulation radius, and (3) the entropy profile up to the outer simulation radius. From those quantities, the initial pressure (P), density (ρ), temperature (T), and mass (M_r) stratifications can be recovered by integrating the hydrostatic equilibrium equation from the inner boundary. Note that there is no composition gradient in our RGB setups, including across the convective boundary, meaning that only one fluid with the appropriate μ is needed in our 3D simulations. As in <cit.>, we smooth the MESA entropy profile to remove small-scale noise and we force a constant entropy in the convective envelope. Figure <ref> compares the Brunt–Väisälä frequency N obtained by this procedure to the original MESA profile. Only at the convective boundary (when N → 0) is there a small discrepancy between both profiles due to our smoothing procedure. §.§ PPMstar simulations We use the PPMstar explicit gas dynamics code <cit.> to perform our 3D hydrodynamics simulations. As described in <cit.>, a more realistic equation of state that includes both the ideal gas pressure and the radiation pressure is now implemented in PPMstar. Contributions from electron degeneracy pressure and Coulomb interactions remain negligible in the regions we simulate (R ≥ 40 Mm). In addition, radiation diffusion is now also included <cit.>. The Rosseland mean opacity is calculated using polynomial fits that are generated before each run by fitting OPAL opacity tables <cit.> within the restricted ρ–T domain relevant to each setup. Here, those fits depend only on ρ and T since the composition is uniform throughout the simulated region. We opted for this approach instead of a direct interpolation of the OPAL tables in the interest of code execution speed. Convection is driven by cooling down (i.e., removing heat) from the uppermost 50 Mm. The rate at which heat is removed corresponds to the luminosity that we are simulating (which is not necessarily the same as the nominal stellar luminosity as discussed in the next paragraph). In addition, we inject heat at the same rate in the first 20 Mm above the inner boundary of our simulations. This is to compensate the loss of heat at the upper boundary with the aim of keeping the thermal content of the star constant over the simulation. This driving strategy closely imitates energy transport in the real star. Heat is produced close to the centre in the H-burning shell, which is what our heating term at the inner simulation boundary mimics. Similarly, convection carries heat all the way to the surface in a real star, which is what our cooling term at the outer simulation boundary simulates. The explicit scheme used by PPMstar sets a lower limit on the Mach numbers that can be simulated. A very low Mach number flow would demand prohibitively small grid cells. Consequently, for our bump setup, we cannot perform the simulations at the nominal luminosity L_⋆. Our fiducial bump simulations use L=1000 L_⋆ to drive the convection zone. To extrapolate our results to nominal heating, we perform a series of simulations with different luminosity boost factors as indicated in Table <ref>. Note that the radiative diffusivity K is also increased by the same factor so that the energy transported by radiation scales as the driving luminosity (in order to conserve energy). The tip setup is different. Thanks to its higher luminosity and different stratification, the Mach numbers in its convection zone (Ma≃ 0.010-0.015) are high enough that the star can be simulated at nominal luminosity. This is also true for the IGWs in the stable layers. This gives our RGB tip simulations an exceptional degree of fidelity, providing solutions of the full conservation equations in 3D and over the 4π sphere, at the actual stellar luminosity, and including radiation diffusion with realistic opacities. To our knowledge, these are the first stellar interior hydrodynamic simulations of this kind. The one approximation we are making is that only a small portion of the envelope is included. This can admittedly have a large impact both on the convective and IGW motions <cit.>. We return to this question in Section <ref>. To demonstrate that the tip setup can reliably be simulated at nominal heating, we show in Figure <ref> how, for the bump setup, the rms velocity in the convective envelope and in the stable layers scales as a function of the boost factor applied to the heating luminosity. The convective velocities follow a well-defined L^1/3 scaling relation, as established in previous 3D hydrodynamics simulations <cit.>. In the stable layers, we observe the same L^1/3 dependence down to at least L=10^2.5 L_⋆ (this differs from the results of , a point to which we return in Section <ref>). This suggests that there are no numerical convergence issues at those luminosities. The smallest velocity that still adheres to the scaling law is |U| ≃ 0.1 km/s (L=10^2.5 L_⋆ in the bottom panel of Figure <ref>), which corresponds to a Mach number of ≃ 0.0003. As shown in Figure <ref>, the Mach numbers of our RGB tip simulations are above that threshold for R ≳ 300 Mm. This indicates that our nominal-heating RGB tip simulations can be trusted everywhere except in the innermost portion of the radiative interior. Finally, note that this analysis (Figure <ref>) was performed with the lowest-resolution grid (768^3) used in this work. This is therefore a pessimistic assessment of convergence errors as the scaling laws are expected to hold down to lower luminosities and smaller velocities when the grid resolution is increased (e.g., Figure 32 of ). Our simulations are performed on Cartesian grids of 768^3, 1536^3 or 2880^3 and run on average for t ≃ 1000h of star time, as indicated in Table <ref>. With a characteristic convective turnover timescale of 1 day, the simulations are long enough to determine the flow properties after eliminating the initial transient phase of a few hundred hours (Figure <ref>). We note however that our simulations are not long enough to achieve a thermal equilibrium state. Since the gas dynamics in the 3D simulations is different than what is assumed in the initial 1D MLT-based MESA stratifications, our setups are inevitably out of thermal equilibrium. This results in the gradual migration of the convective boundary. Furthermore, in all our simulations except X30, our choice of external boundary condition also leads to a spurious migration of the Schwarzschild boundary (see Section <ref>). For those reasons, the convective boundary does not remain at its original location shown in Figure <ref>. Finding configurations that are in equilibrium when simulated with 3D hydrodynamics is an interesting endeavour in itself, but one that is outside the scope of this work. The time steps are adjusted as to maintain a Courant number of 0.85. In the case of our 768^3-grid simulations, this corresponds to Δ t=3.2s for the bump setup and 2.6 s for the tip setup (Δ t is half that when using a 1536^3 grid with the same R_ max). A detailed output of the simulations (or dump) is produced every 2.6 h for the bump setup and every 1.3 h for the fiducial tip setup. The content of those dumps is detailed in <cit.>. PPMstar’s use of Cartesian coordinates optimizes numerical accuracy for a general fluid flow problem. It gives rise to a simple and highly effective design in which the computation proceeds in symmetrized sequences of 1D passes in the three coordinate directions (i.e., directional operator splitting). One consequence of our coordinate choice is that the application of boundary conditions becomes more difficult. Boundary conditions are currently implemented at specific radii (here, an inner boundary at 40 Mm and an outer boundary at R_ max), placed well away from the main region of interest to minimize potential numerical artifacts. We approximate these bounding spheres by the nearest set of cubical grid cell faces, which implies that these spheres are ragged at the scale of the grid. We impose a reflecting boundary condition at the bounding spheres using ghost cells that mirror the cells across the bounding surfaces. This is done in each 1D pass, and in each such pass the bounding surface is perpendicular to the direction of the pass, but it is not perpendicular to the gravitational acceleration vector. For convenience, we therefore smoothly turn off gravity beginning a few grid cell widths in radius before the bounding sphere is reached, allowing us to implement a simple boundary condition in each 1D pass. The downside of this approach is the introduction of a very thin layer next to the boundary where gravitational acceleration smoothly drops to zero. This approach has so far caused no noticeable problems <cit.>, but the current context is trickier because the reflection of IGWs at the inner boundary could matter. We find that over the course of the computation, motions are set going and grow in the thin layer next to the inner boundary. However, these do not come near to the observed IGW motions that are set in motion by the convective envelope (as we will see in Section <ref>, radiative damping dissipates the IGWs well before they reach the inner boundary), and they should not affect the computed results in the regions of interest. § MAIN PROPERTIES OF THE FLOW §.§ Centre-plane slice renderings To visualize the important features of our simulations, Figures <ref> and <ref> show renderings of the tangential velocity magnitude |U_t|, radial velocity U_r, and vorticity magnitude | ∇× U| for dump 390 (t=672h) of X22 (L=1000 L_⋆, 1536^3 grid). Those renderings display a centre-plane slice of the full 3D simulation sphere. In all three renderings, the convective envelope is easily distinguished from the radiative zone. The former is characterized by large velocities and is highly turbulent as revealed by the fine-scale structures in the vorticity rendering. In contrast, the radiative zone shows slower, more organized, wave-like flows. As we will see in Section <ref>, the almost circular structures visible in the |U_t| and vorticity renderings correspond to the superposition of several IGWs with different spatial and temporal frequencies. While the behaviour of our simulations is most easily visualized in the movies available at <https://www.ppmstar.org>, those static renderings nevertheless offer important insights. The rendering of the radial velocity component reveals that the convective envelope hosts several convective cells, with alternating downdrafts and updrafts (shown as an alternation of blue and red-orange colours) as we rotate around the sphere. This is reminiscent of the flow patterns observed in PPMstar simulations of He-shell flash convection in rapidly accreting white dwarfs <cit.> and of O-burning shells in massive stars <cit.>. However, this is very different from the behaviour found in our recent simulations of core convection in non-rotating massive main sequence stars, where a single dipole mode dominates the convective flow <cit.>. This also differs from the results of <cit.>, whose anelastic 3D simulations of the envelope of slowly rotating RGB stars are also dominated by a large dipole mode, as previously established by <cit.>. We attribute this difference to the artificial boundary imposed on the flow at 900 Mm. The largest-scale mode that develops in the convection zone is limited by the vertical extent of the convection zone, and therefore a large dipole mode is prevented from forming in our simulations. We investigate this question in Section <ref>. The tangential velocity rendering displays a few high-|U_t| (dark red) structures inside the convection zone that follow the contour of the convective boundary. Those structures are caused by the inward moving flows that collide with the convective–radiative interface. Unable to continue inward, those flows are forced to turn and continue in a perpendicular direction, thereby creating high-|U_t| structures. For example, the downdraft seen just a few degrees East from North in the U_r rendering of Figure <ref> creates a high-|U_t| double wedge structure where it hits the convective boundary. This behaviour is entirely analogous to the one described in <cit.> for core convection in massive main sequence stars. In Section <ref>, we will see that it is where those flows impact (or overshoot past) the convective boundary that waves are excited in the radiative zone. The |U_t|, U_r and | ∇× U | renderings of the RGB tip simulations are qualitatively similar to those shown for the bump setup in Figures <ref> and <ref>. We omit them for conciseness, but they are available, along with high-resolution movies, at <https://www.ppmstar.org>. §.§ Radial profiles Now that the overall morphology of the flow has been established, we investigate its properties more quantitatively. Figure <ref> displays radial profiles of |U_t| and |U_r| for both the bump and tip setups (see also Figure <ref>, which displays the same quantities but this time in terms of Mach numbers). We omit the 40 Mm < R < 200 Mm region in this and subsequent radial profile figures as the behaviour of the flow in this region is tainted by artifacts introduced by the inner boundary conditions of our simulations (Section <ref>). The results of both the 768^3 and 1536^3 simulations are shown and the agreement between both grid resolutions is excellent. Above 300 Mm, the difference never exceeds 20%. Larger discrepancies are apparent at R<300 Mm for the tip setup. This can be at least partially explained by the fact that a smaller grid cell size is required to satisfactorily resolve the slower flow at small radii (consistent with our discussion of Figure <ref>), but as we will see numerical heat diffusion also plays a role. In the convective envelope, the radial and tangential velocity components have similar magnitudes, except near the convective boundary where |U_t|>|U_r|. This is the result of the turning of the flow when downdrafts collide against the convective boundary, as described in the previous section and illustrated in Figure <ref>. Inside the radiative zone, the tangential component of the velocity remains 2 to 8 times larger than the radial component. This qualitatively matches the expected behaviour for a flow dominated by IGWs, since these waves have higher amplitudes in the tangential direction. Figure <ref> shows radial profiles of the vorticity magnitude, | ∇× U |, for both setups and two grid resolutions. As expected, the vorticity is much higher in the turbulent convective envelope than in the stable layers dominated by wave-like flows. In the convective envelope, doubling the resolution results in a ≃ 50% increase of the vorticity. A similar increase was also observed in the convective cores of our recent PPMstar simulations of massive main sequence stars <cit.>. This is due to the fact that the turbulent cascade in the convective envelope extends to the smallest scales resolved by the simulation grid. As will be shown in Figure <ref> (see Section <ref>), doubling the resolution allows this cascade to extend to smaller spatial scales and therefore increases the vorticity. This behaviour is to be contrasted with what is observed in the stable layers. For the bump setup, the vorticity profiles obtained at 768^3 and 1536^3 are in excellent agreement. This indicates good convergence with respect to the grid resolution: there are no smaller-scale motions to be resolved. The tip setup behaves somewhat differently as we find progressively larger discrepancies between both grid resolutions below 400 Mm. §.§ Power spectra To characterize the spatial structure of the flow, we show in Figure <ref> the power spectra of |U| at different radii for runs X22 and X26 (1536^3 grid, bump and tip setups, respectively). In those figures, the power is decomposed into spherical harmonics, each represented by their angular degree (or spherical wavenumber) ℓ.[The angular degree ℓ is related to the horizontal wavenumber k_h by k_h = √(ℓ (ℓ +1 ))/R.] The three largest radii are in the convection zone, the four smallest are in the stable layers, and R=500Mm is in the convection zone for X22 and in the radiative zone for X26 (the convective boundary is at R_c ≃ 470Mm for X22 and at R_c ≃ 580Mm for X26). The maximum ℓ value shown in those spectra is set by the highest-degree spherical harmonics that can be resolved given the angular resolution of the Cartesian simulation grid when projected on a sphere at a given radius. Note that the spectra are calculated from the filtered briquette data output <cit.>, for which the grid size in each direction is four times smaller than the computational grid. In the convection zone, we recover the expected Kolmogorov spectrum at small spatial scales. The spectra depart from the Kolmogorov ℓ^-5/3 scaling at ℓ≲ 4, which reflects the fact that the ℓ=1 and 2 modes are not able to fully develop in the relatively small envelope included in our simulations <cit.>. Note that we find the same results if we use a coarser grid resolution, as shown in Figure <ref>. The only difference is that in the high-ℓ limit the spectrum departs from the ℓ^-5/3 scaling at lower ℓ since smaller-scale turbulence is not resolved, consistent with our discussion of Figure <ref> in Section <ref>. In this Section, it will become clear from the properties of the flow, and in particular from the frequencies containing most of the power, that the stable layers are dominated by IGW motions. This IGW-dominated region has a very different spectrum compared to the unstable layers. First, the total power decreases rapidly as we move away from the convective boundary. This signals a strong damping of the IGWs (also visible in Figures <ref>–<ref>), which we attribute to radiative diffusion in Section <ref>. Secondly, for both setups, the spectrum resembles a broken power law with a flat portion up to ℓ≃ 10-40, followed by a very sharp (∼ℓ^-7) decline at higher wavenumbers. As with the convective layers, the general shape of the spectrum is insensitive to the grid resolution (Figure <ref>). From this observation, we can infer that the shift in the ℓ value where the spectrum goes from flat to rapidly decreasing is not simply due to a change in the effective angular grid resolution with R. As they travel toward the centre of the star, the high-ℓ waves are more readily damped than their low-ℓ counterparts. This IGW spectrum has both important similarities and differences with previous hydrodynamics simulations. The steep power law at large ℓ is reminiscent of the <cit.> simulations of IGWs in the Sun (where the resonant cavity is similar to that considered here, with IGWs propagating in a radiative zone surrounded by a convective envelope) and of the massive main-sequence star simulations of <cit.>. The former find a steep ∼ -5 to -7 power law (see their Figure 15) and the latter find a similarly steep ∼ -4 to -6 power law at large ℓ (see their Figure 6). However, a major difference is that both <cit.> and <cit.> find a spectrum that is monotonically decreasing with respect to ℓ, whereas we obtain a flat spectrum at low ℓ. We note that the comparison of the IGW spectra of Figure <ref> to those presented in <cit.> and <cit.> is not rigorous as in those works the IGW spectrum is separated into its spatial and temporal dependencies, E(ℓ, ν) = f(ℓ) g(ν). In Figure <ref>, the dependence on the temporal frequency ν was ignored but nevertheless affects the power spectra since the spherical wavenumber ℓ is coupled to ν through a dispersion relation. To independently study the dependencies on ℓ and ν, <cit.> and <cit.> decompose their spectra into the form given by Equation (<ref>) using singular value decomposition. Naturally, the spectrum cannot be entirely separated as in Equation (<ref>), and in our case we found that the singular value decomposition led to a poor representation of the full spectrum. We therefore opted not to use singular value decomposition to present our IGW spectra. The same considerations apply to the temporal frequency power spectra presented below. In Figure <ref>, we showed the spectra of the total power, that is, due to displacements both in the radial and horizontal directions. It is instructive to compare those spectra to spectra computed by considering only the radial velocity component (Figure <ref>). The most important difference is that instead of being flat at low ℓ, the U_r IGW spectra instead increase up to ℓ≃ 10-40. This behaviour is expected. For IGWs, the ratio U_r/U_t increases with frequency (see ) as the waves approach the Brunt–Väisälä frequency and the vertical motions become more important compared to the horizontal motions. This can explain the positive slope observed in Figure <ref>. A similar trend is also observed in the IGW spectra of our massive main sequence stars simulations <cit.> and in recent 3D simulations of late-type F stars <cit.>. In Figure <ref> we now show the power spectra for the same radii as in Figures <ref> and <ref>, but this time in the temporal frequency space. The spectra are truncated at ν = 80 μHz (bump setup) and ν = 104 μHz (tip setup), which correspond to the Nyquist cut-off frequencies given the time interval that separates each dump in our simulations (i.e., higher frequency modes cannot be resolved). To be clear, higher frequencies are resolved in the simulations themselves, but the detailed outputs that allow us to reconstruct the power spectra are written to disk only every ∼ 2000 time steps. In the stable layers, the spectra are relatively flat, although for the tip setup there is a noticeable decrease of the power at high frequencies. This high-frequency quenching is more pronounced close to the convective boundary. This is consistent with these waves being IGWs. IGWs can only propagate when their frequencies are smaller than the local Brunt–Väisälä frequency. Here, the relative amount of power at high frequencies grows as we move inward and N increases (Figure <ref>). It is instructive to compare the frequencies that contain most of the IGW power to the convective frequency ν_c at the bottom of the envelope. The convective turnover timescale is not a precisely defined quantity, but as the convective cells occupy the maximum space available to them in the envelope, we can estimate it by taking the thickness of the envelope (≃ 400Mm for X22 and 300 Mm for X26) and dividing it by the average convective velocity (|U|≃ 5 km s^-1 for X22 and 3 km s^-1 for X26). This yields a convective turnover timescale of 22 h (ν_c ≃ 13 μHz) for the bump setup and 28 h (ν_c ≃ 10 μHz) for the tip setup. Figure <ref> shows that a large fraction of the IGW power is contained at frequencies that exceed ν_c. This result is consistent with the fact that the power spectra in the convective envelope are flat (Figure <ref>). If there is no correlation between the convective turnover timescale and the convective spectrum, then we also expect to observe no correlation between the convective turnover timescale and the IGW spectrum. Comparing our wave spectra to asteroseismological observations of RGB stars would be interesting, but this exercise is complicated by the fact that the IGWs propagating in the radiative interior are coupled with pressure modes in the envelope <cit.>. Because of this and given the truncation of the envelope in our simulations, we cannot make a direct comparison between the frequencies of the mixed modes detected in upper RGB stars and the frequency spectra of Figure <ref>. Nonetheless, we note that the frequency at maximum oscillation power for mixed modes in a 1.2 M_⊙ RGB star at the bump luminosity, ν_ max≃ 40 μHz <cit.>, is within the range of frequencies where IGWs are excited in our simulations (Figure <ref>). To conclude our analysis of the wave spectra, we show in Figure <ref> power spectra of the radial velocity component as a function of both the angular degree and the frequency for an RGB tip simulation (X24). We use our longest simulation for this analysis in order to attain a finer frequency sampling in the Fourier decomposition. The power spectrum in the convective envelope (top panel) differs greatly from the spectrum obtained in the stable layers ≃ 0.8 H_P below the convective boundary (bottom panel). In the convection zone, the power spectrum is very smooth and has no specific features, as expected for turbulence. In the IGW-dominated region, we see a more distinctive power distribution, with no power at high frequencies (due to the quenching of IGWs with frequencies exceeding N) and in the low-frequency, high-ℓ region of the diagram. The most striking aspect of this wave spectrum is it blurriness. In contrast, hydrodynamics simulations of IGWs in stellar radiative interiors usually yield spectra where the power is predominantly contained in a set of discrete, well-defined ridges in the ℓ-ν space <cit.>, with each ridge corresponding to a specific radial order of standing IGW modes (or g modes). The absence of such ridges in Figure <ref> suggests that standing modes are not formed in our simulations or, in other words, that the mode lifetime is very short. For standing waves to form, two progressive (or travelling) IGWs have to constructively interfere with each other. Here, this would require that IGWs excited at the convective boundary and travelling inward undergo a reflection somewhere close to the centre of the star. This reflection would generate outward travelling waves that could constructively interfere with the inward travelling waves to create standing modes. The absence of standing modes in Figure <ref> therefore suggests that only inward moving progressive waves exist in our simulations. This situation is analogous to that described in <cit.> for a solar-like star, where low-frequency IGWs are damped before reaching their reflection point near the centre. In the solar case, the reflection point is located where the Brunt–Väisälä frequency N becomes equal to the IGW frequency. Here, N remains larger than the IGW frequency all the way to the inner simulation radius, effectively meaning that the waves can only be reflected at that radius (remember that we use reflective boundary conditions). But Figures <ref> to <ref> show that the power contained in the IGWs is strongly damped as the waves propagate inward, which most likely explains the absence of reflected waves (and, by extension, of standing modes). §.§ Internal gravity wave damping In the previous sections, we have seen how the amplitude of IGWs drops as they propagate inward (Figures <ref>–<ref>). What is the cause of this decrease? In a simulation without any heat diffusion and without any nonlinear interactions between waves, we expect the luminosity of each wave (i.e., the kinetic energy transported by wave packets moving radially at the group velocity U_ gr,r), L^ IGW_ℓ,ν = 4 π R^2 ρ (U_r^2 + U_h^2) U_ gr,r, to remain constant as a function of R. Using the IGW dispersion relation <cit.>, Equation (<ref>) can be expressed more conviently as L^ IGW_ℓ,ν = 4 π R^3 ρ U_r^2 N/√(ℓ ( ℓ +1 ))√( 1 - ω^2/N^2), where ω= 2 πν. In Figure <ref>, the dashed lines show the decrease in U_r predicted using this equation for four different (ℓ,ν) pairs representative of the IGWs present in our simulations. The IGW velocities are predicted to only decrease by a factor ∼ 2 between the convective boundary and R=200 Mm, a much more modest effect than the two orders of magnitude drop observed in Figure <ref>. A nonadiabatic effect must therefore be invoked to explain the wave amplitude damping observed in our simulations. If radiative diffusion is considered, the wave velocities are damped by an additional attenuation factor e^-τ, where τ is analogous to an optical depth and is given by <cit.> τ = [ ℓ (ℓ+1) ]^3/2/2∫_R_ CB^R K N N_T^2/ω^4√(N^2/N^2-ω^2) |dr|/r^3, where K is the thermal diffusivity, K = 4 a c T^3/3 κ c_ Pρ^2, with a the radiation constant, c the speed of light, κ the Rosseland mean opacity and c_ P the specific heat at constant pressure, and N_T is the thermal component of N, N_T^2 = -g/H_P∂lnρ/∂ln T( ∇_ ad - ∇), where the temperature gradients have their usual meanings. The solid lines of Figure <ref> show what happens if we include this radiative damping in our predictions of the IGW velocities. A sharp ∼ 100 × damping is predicted between the convective boundary and R ≃ 200 Mm, which agrees very well with our simulations (compare to Figure <ref>). To verify that radiative damping is indeed the mechanism leading to the IGW velocity decrease, we have performed two additional nominal-luminosity RGB tip simulations without radiative diffusion (X32 and X33, respectively on 768^3 and 1536^3 grids). Heating at the inner boundary is turned off for these runs, since with K=0 this extra heat would be spuriously trapped in the radiative cavity. Figure <ref> compares the spherically averaged velocity profiles of X32 and X33. It is entirely analogous to the bottom panel of Figure <ref>: the same grid resolutions are considered and the same simulation setup is used. The only difference is the omission of radiative diffusion. Clearly, the IGW velocities still undergo a considerable decrease between the convective boundary and R=200 Mm even if radiative diffusion is omitted. Remember that only a factor ∼ 2 decrease is expected in the purely adiabatic case (dashed lines in Figure <ref>). The stronger decline must be due to a nonadiabatic effect that we attribute here to the numerical diffusion of entropy, which mimics radiative diffusion. This interpretation is supported by the fact that the velocities decline faster when the grid resolution is lower (compare the dashed and solid lines in Figure <ref>), pointing to a numerical effect. Note that we have also observed numerical heat diffusion in our recent core-convection simulations <cit.>. We stress that the observed velocity damping is not due to numerical viscosity. If it were the case, we would expect to also see the same significant difference between both grid resolutions for simulations where radiative diffusion is included, as this effect operates independently from radiative diffusion. But this is not the case: the difference between the 768^3 and 1536^3 grid resolutions is much smaller when the simulations include radiative diffusion (Figure <ref>). This observation is naturally explained by numerical heat diffusion. Numerical heat diffusion is hardly noticeable in Figure <ref> because radiative diffusion has a considerably larger effect. In contrast, numerical heat diffusion is very important in the case where K=0, since it becomes the only mechanism available for entropy diffusion. Three important conclusions follow from the analysis presented in this section. First, numerical heat diffusion operates in our simulations, but is much weaker than radiative diffusion and can therefore be ignored. Secondly, radiative damping can naturally explain most of the decrease of the IGW velocities observed in our simulations. Thirdly, the spurious behaviour of the flow at the inner simulation boundary (Section <ref>) can be ignored, since radiative damping strongly suppresses the IGWs before they reach that radius. § MIXING BY INTERNAL GRAVITY WAVES Now that we have established the main properties of the flow, we turn to the problem of estimating the mixing enabled by IGWs in the radiative zone. To do so, we first perform an estimate of the diffusion coefficient D based on the vorticities and a simple analytical prescription (Section <ref>), and we then attempt to measure D more directly by studying the time evolution of a passive fluid added to our simulations (Section <ref>). As we will see, the second, more robust method disagrees with the first. §.§ Estimating the mixing from the vorticity §.§.§ Theoretical framework IGWs can cause vertical mixing in the stable layers of stellar interiors if their horizontal velocity shear is high enough to overcome the tendency of the fluid to remain stratified. In the adiabatic case (no heat diffusion), this is expected to take place only if the Richardson number drops below 1/4, Ri = N^2/( d U_t / d R )^2 < 1/4. In our RGB stars, Ri > 1/4 throughout the radiative zone (except within ≃ 0.1 H_p from the convective boundary) and no vertical mixing is therefore expected based on this simple criterion. But in real stars (and in our simulations), radiative diffusion modifies Equation (<ref>) and may allow mixing to take place at larger Ri <cit.>. The diffusion coefficient due to IGW shear proposed by <cit.> is then given by D ≃ηK/ Ri, where η is a dimensionless parameter of order 0.1 <cit.>. In the present context, this equation can be written as <cit.> D ≃ 0.1 K ( ∇× U )^2/N^2, where we have also assumed that η = 0.1. §.§.§ IGW vorticity scaling for the bump setup In order to estimate D using Equation (<ref>), we need the vorticity profiles |∇× U| from our simulations. We have already shown those quantities in Figure <ref>, but only the vorticity profile for the tip setup is directly usable. As the RGB bump simulations are driven with a luminosity that is much higher than the nominal value (see Table <ref>), the flow velocities and vorticities are necessarily overestimated. To extrapolate our RGB bump results to nominal luminosity, we use our series of 768^3 simulations with different heating rates. The mean vorticity measured in the convection zone is shown in the top panel of Figure <ref>, where it can be seen that it follows a L^1/3 scaling law as previously established in the case of core convection in massive main sequence stars <cit.>. This is consistent with Figure <ref>, which shows that the velocities also scale with L^1/3, as observed in previous 3D hydrodynamics simulations (see Section <ref>). As argued by <cit.>, the fact that both the velocity and the vorticity scale with L^1/3 requires that the spatial spectrum in the convection zone is independent of the heating factor. We find a shallower ∼ L^1/4 scaling when we measure the vorticity 200 Mm≃ 1 H_P below the convective boundary (bottom panel of Figure <ref>). Note that the vorticities for the lowest heating factors should be interpreted with caution as they correspond to very low velocities (Ma≲ 10^-4 for L ≤ 100 L_⋆), a regime where the validity of our simulations is questionable. This explains why the L=10 L_⋆ point does not line up with the trend established at higher luminosities (see also Figure <ref>). Note also that this L^1/4 scaling law is not well defined (e.g., L^1/5 would give a similar fit to the data), but we assume L^1/4 in what follows. This result strongly differs from the L^2/3 scaling found in <cit.>. As shown in Section <ref>, we also observe a different scaling of the IGW velocities (L^1/3 here compared to L^2/3 in the core convection case) and in this respect it is not surprising to also find a different scaling of the vorticities. However, unlike <cit.>, we do not observe the same scaling for the velocities and for the vorticities. This implies that the spatial IGW spectrum changes as a function of heating rate. Figure <ref> shows the |U| power spectra measured 200 Mm below the convective boundary (as in Figures <ref> and <ref>) for different heating rates. It reveals that there is indeed a strong dependence of the power spectra on the heating rate, with more power at low ℓ relative to high ℓ when the luminosity is increased. This is qualitatively similar to the findings of <cit.>, but this comparison is misleading for at least two reasons. First, the IGW spectra measured in our simulations (Figure <ref>) are very different from those reported in <cit.>. Their spectra show well-defined IGW standing modes, but also contain a significant amount of power at low frequencies and over all wavenumbers. Secondly, the spurious migration of the convective boundary in our simulations (Section <ref>) operates more rapidly when the heating rate is increased, meaning that the spectra shown in Figure <ref> are not all determined at the same radius since they are measured at a fixed distance from the convective boundary. Moreover, this implies that the IGWs are not excited at the same location in the star. Ideally, we should compare the wave spectra and the IGW vorticities at the same radius and for simulations where the convective boundary is at the same location. This cannot be accomplished with our current simulations. Using earlier dumps for high-L runs where the boundary moves rapidly is not possible because the boundary migrates before the dynamics has the time to reach a steady state. We are therefore forced to conclude that the scaling laws that we have determined for the IGW velocities and vorticities in the RGB bump setup are most likely incorrect. In the absence of any suitable alternative, we will nevertheless use them in what follows. Fortunately, this problem does not affect our RGB tip simulations, where no extrapolation to low luminosities is required, and it does not impact any of the conclusions of this work. §.§.§ Diffusivity estimates Equipped with our scaling relation for |∇× U| in the radiative zone of the bump setup, we can now estimate D by virtue of Equation (<ref>) for both setups. Figure <ref> shows the resulting diffusivity profiles. The magnitude of D in the stable layers is quite significant and suggests that IGW mixing could alter the evolution of upper RGB stars. For reference, at the bump luminosity, a diffusion coefficient of ∼ 10^9 cm^2 s^-1 at the base of the envelope is needed to explain the observed RGB extra mixing <cit.>. The diffusion coefficient profiles of Figure <ref> follow a distinctive double-exponential decay near the convective boundary, a conclusion that does not depend on the uncertain RGB bump vorticity scaling law. D initially decreases rapidly close to the radiative–convective interface but then exhibits a shallower decay further inside the radiative zone. This behaviour is reminiscent of the prescription used by <cit.>, and based on the stellar hydrodynamics simulations of <cit.>, to model mixing below the convective envelopes of thermally pulsating asymptotic giant branch (AGB) stars during the third dredge-up. With this prescription, D at a distance z below the convective boundary is given by D(z) = D_0 exp[ -2z /(f_1 H_P,0) ] z ≤ z_2 D_2 exp[ -2(z-z_2)/(f_2 H_P,0) ] z > z_2, where D_2 = D_0 exp[ -2 z_2 /(f_1 H_P,0) ], D_0 is the diffusion coefficient at the convective boundary, H_P,0 is the pressure scale height at the boundary, and f_1 H_P,0 and f_2 H_P,0 are the overshoot scale heights <cit.>. We show in Figure <ref> the values of f_1 and f_2 obtained by fitting Equation (<ref>) to the D profiles for the first 150 Mm below the convective boundary. If the Zahn formula is correct, if η remains constant from the bump luminosity to the tip of the RGB, and if η is constant throughout the radiative zone (we return to this point in Section <ref>), then Figure <ref> implies that the f values change throughout the RGB evolution and that a single prescription cannot be used to describe all the upper RGB evolution. <cit.> adjusted the free parameters of Equation (<ref>) in order to reproduce the IGW mixing calculations of <cit.>, based on the IGW mixing prescription of <cit.>. The extra mixing generated with this simple model was shown to be able to generate a ^13C pocket in the radiative zone of AGB stars that is large enough to obtain s-process yields that are compatible with observations. While promising, this mixing prescription has not yet been verified with multi-dimensional hydrodynamics simulations of the stable layers below a convective envelope. In this context, our results shown in Figure <ref> offer additional support for the double-exponential prescription used in AGB models. While the radial stratification of a thermally pulsating AGB star obviously differs from that of an upper RGB star, there are significant similarities (e.g., comparable luminosities, analogous geometries). It is therefore encouraging to recover a double-exponential profile in our simulations, especially since the f values we find are approximately similar to those assumed by <cit.>. §.§ Constraints on the diffusivity from the time evolution of a tracer fluid The diffusivity estimates presented in the previous section are far from robust. Apart from concerns regarding the RGB bump vorticity scaling law, their validity depends on the correctness of the Zahn formula (Equation <ref>) and on the assumed η value. Here, we attempt to measure the mixing more directly using a second passive fluid. PPMstar follows species advection using the high-order PPB scheme <cit.>. In setups that include a composition gradient <cit.>, a passive dye cannot be directly inserted in the simulations as PPMstar is currently a two-fluid code. Fortunately, our RGB setups have a uniform composition and a second fluid with the same mean molecular weight as the first fluid can be added to our base states. This is equivalent to adding a passive tracer. It has no effect on the flow but allows us to directly measure species mixing. We initialize the concentration of this second fluid as a series of spherical shells with Gaussian radial profiles. The expectation is that shear-induced IGW mixing will spread those Gaussian profiles in the stable layers. The diffusion coefficient can then be recovered by measuring the rate at which the fractional volume of the second fluid at the peak of each Gaussian (FV_ max) decreases with time. By applying the diffusion equation to a Gaussian, one can show that the diffusion coefficient can be calculated as D = -d FV_ max/dt/ FV_max,0σ_0^2, where d FV_ max/dt is the rate at which the FV at the peak of a Gaussian decreases, FV_ max,0 is its initial value, and σ_0 is the initial standard deviation of the Gaussian. Note that Equation (<ref>) assumes that the width of the Gaussian remains constant, which is an excellent approximation for the relatively short time scales over which our simulations are performed. Previous experience has taught us that the grid resolutions we have been using so far in this work (768^3 and 1536^3) are insufficient to measure diffusion coefficients with this technique. In fact, in <cit.> we show that in massive main-sequence stars the measured D steadily decreases with increasing grid resolution due to numerical entropy diffusion up to at least 2688^3. We therefore jump directly to a very high 2880^3 resolution for this analysis (run X30, see Table <ref>), and any mixing measured at that resolution should be interpreted as an upper limit given the results of <cit.>. The setup for this new run is identical to that described above for the tip RGB X26 run, except that (1) FV Gaussians with σ_0=8.3Mm (corresponding to a full width at half maximum of ≃ 25 grid cells) are placed 100 Mm apart in the stable layers, (2) the convective envelope now extends further out to R_ max=1100Mm (we can afford this extension given the larger 2880^3 grid resolution), (3) we have disabled heat conduction at the inner and outer boundaries. This last change was made after we realized that simultaneously cooling the top layers and allowing heat to escape through radiative diffusion at the outer boundary was effectively cooling the star by more than 1 L_⋆. By omitting radiative diffusion at the boundary, we can now precisely set the luminosity to 1 L_⋆ by cooling the upper layers at that exact rate. Due to the large computational cost of the 2880^3 grid, X30 ran for a shorter total duration than other simulations presented so far (552 h of star time, see Table <ref>). Nevertheless, as we will show below, this is sufficient to establish useful constraints on D. Figure <ref> shows the evolution of the height of the two Gaussians closest to the convective boundary (at R=450 and 550 Mm), where IGW mixing is expected to be the strongest (Figure <ref>). The amplitude of the Gaussians was recovered by fitting the radial FV profiles with a Gaussian. Initially, at t ≲ 250h, FV_ max fluctuates a lot. This is entirely attributable to the initial transient at the beginning of our simulation and for this reason we discard the t≤300h portion of the time series from the rest of our analysis. If strong IGW mixing was present, we would expect to observe a decrease of FV_ max for t ≥ 300h. At R=550 Mm, we do not see any evidence for such decline (top panel of Figure <ref>). The Kendall rank correlation coefficient between FV_ max and t is consistent with the null hypothesis where there is no dependence of FV_ max on t (p-value of 0.057). Similarly, a linear fit to the data gives a positive but statistically insignificant slope, d FV_ max/dt = (2.6 ± 1.0) × 10^-10 s^-1 (dashed line in Figure <ref>). From this linear fit, we can extract a lower limit on d FV_ max/dt by taking the 5-sigma lower limit, d FV_ max/dt > -2.5 × 10^-10 s^-1 (dotted line in Figure <ref>). Using Equation (<ref>), we find that this corresponds to log D ( cm^2 s^-1) < 8.2. In contrast, a tentative decline of FV_ max is visible for the 450 Mm Gaussian thanks to the lower noise level in the FV_ max time series (compare both panels of Figure <ref>). We find a Kendall rank correlation coefficient of 0.48, significantly different from 0 with a p-value of 10^-15. This time, a linear fit to the data yields d FV_ max/dt = -(1.03± 0.11) × 10^-10 s^-1, which allows a tentative measurement of log D ( cm^2 s^-1) = 7.80 ± 0.05. It is possible that this downward trend is only temporary and that a longer simulation would show a stabilization of FV_ max. As for the Gaussians located at smaller radii (250 and 350 Mm), we find that they do not maintain their Gaussian shapes to a sufficiently high level of accuracy to allow a precise determination of FV_ max. Part of the problem is that the fluctuations of FV at smaller radii are much smaller (as can be inferred from Figure <ref>). This means that FV_ max must be determined with an increasing precision, making even small departures from perfect Gaussianity problematic. The artifacts introduced by the inner boundary are also a consideration at those small radii. In Figure <ref>, we compare our estimates of D described in the previous paragraph to D calculated using Equation (<ref>) and the vorticities measured in X30. The latter D estimates differ from that previously shown in Figure <ref>, which can be explained by the higher grid resolution of X30, the different boundary conditions, and the slightly larger convective envelope. The main takeaway from Figure <ref> is that we can rule out IGW mixing on the scale predicted by Zahn's formula with η=0.1. There is a factor 6 discrepancy between both D estimates at 450 Mm and a factor ≳ 25 discrepancy at 550 Mm. The η=0.1 value we have assumed so far is only a rough order of magnitude estimate based on existing numerical simulations. A different value of η is certainly possible. For instance, <cit.> recommend η∼ 0.02, which would improve the agreement between both estimates in Figure <ref>. Furthermore, existing η determinations are still tentative given that they are based on low Reynolds number numerical simulations <cit.>. Taken at face value, our FV-based D determinations also suggest that η is not constant through the stable layers: the 450 Mm Gaussian implies η∼ 0.02 and the 550 Mm implies η≲ 0.004. Previous numerical simulations have found a dependence between the turbulent Reynolds number and the value of η <cit.>. This may be related to what we observe here. In any case, the analysis of the time evolution of the Gaussians presented in this section represents a much more direct assessment of the efficiency of IGW mixing, and the results from this analysis take precedence over those presented in the previous section based on the application of Zahn's formula. Given that we find that D ( cm^2 s^-1) ∼ 10^8 at most close to the boundary (remember that the finite grid resolution implies that the measured D at 450 Mm is formally an upper limit, ), our hydrodynamics simulations a priori suggest that IGW mixing is not an important mixing mechanism in the radiative zones of RGB stars and that it cannot provide the missing extra mixing required to explain upper RGB surface compositions. A diffusion coefficient of the order of 10^9 cm^2 s^-1 throughout the upper RGB would be needed, and here we do not even reach that value at the RGB tip, where the luminosity is highest and IGW mixing is expected to be most efficient. That being said, we will see in Section <ref> that this conclusion is not definitive and that in a real RGB star IGW mixing may be more efficient. § EFFECT OF THE ENVELOPE SIZE To document the effect of including a limited portion of the convective envelope in our simulations, we performed an additional run (X25) where we extended our setup to R_ max=1800Mm instead of our fiducial 900 Mm. We performed this run on a 1536^3 grid, meaning that it has the same resolution as X24 (performed on a 768^3 grid with R_ max=900Mm) in the region where both grids overlap. By comparing X24 and X25, we can therefore assess the impact of including a larger envelope while controlling for the grid resolution. Figure <ref> shows a vorticity magnitude rendering of X25. As expected, larger eddies are able to develop in this extended convective envelope. Throughout the simulation, the flow is dominated by just a few large cells (three are clearly visible in Figure <ref>), which is to be contrasted with the many small cells that characterize the rest of our simulations (Section <ref>). Accordingly, we find that the U_r power spectrum in the convective envelope now exhibits a Kolmogorov ℓ^-5/3 scaling down to ℓ=2 (Figure <ref>). Extending the envelope even further out would presumably allow a single large dipole mode to develop. However, for a computationally feasible grid size, this would result in a grid resolution that is too poor to properly characterize IGWs in the radiative zone. This conundrum could be resolved in the future by using a nested grid with smaller cells in the central radiative layers and larger cells in the convective envelope. This capability is not yet implemented in PPMstar. For now, the extended envelope of X25 is enough to document the sensitivity of the IGWs on the size of the convective envelope; we postpone a proper convergence study to future work. How does the development of larger convective cells affect the properties of the IGW-dominated flow in the radiative zone? Figure <ref> shows that the flow is 1.5-2 times faster in the convection zone with the extended envelope setup. Those faster convective motions in turn excite a more rapid flow below the convective boundary, with |U_r| and |U_t| up to ≃ 4 times faster in the radiative zone when a larger envelope is used (see also Figure <ref>). The vorticities are naturally also enhanced by up to a factor ≃ 3. Note however that the increase in vorticity is less pronounced in the outermost radiative layers: |∇× U| grows by only ≃ 50 % at 0.5 H_P below the convective boundary. This vorticity enhancement would directly impact our Zahn diffusion coefficient estimate (Equation <ref>) and increase it by up to one order of magnitude (the radiative diffusivity K and the Brunt–Väisälä frequency N in the stable layers are not affected by the inclusion of a larger envelope). The enhanced vorticity would also conceivably affect our constraints on D based on the analysis of the time evolution of the tracer fluid Gaussians (Section <ref>). Future work should focus on this aspect of the problem. We are forced to conclude that our tentative measurement of D in Section <ref> should be interpreted as a lower limit, as simulations including the full envelope would most likely result in more efficient mixing. Hence, we cannot conclusively rule out the idea that IGW mixing on the upper RGB is an important mixing mechanism and possibly at least part of the solution to the extra mixing problem. § THE CONVECTIVE BOUNDARY We now leverage the exceptionally high resolution (2880^3) of our X30 simulation to examine the properties of the convective boundary. Because radiative diffusion at the outer boundary has been omitted in X30 (see Section <ref>), heat is removed from the star at the same rate as it is injected. As a result, the Schwarzschild boundary does not migrate as in previous runs, therefore enabling a meaningful study of the boundary region. Figure <ref> tracks the evolution of the spherically averaged temperature gradients and FV profile in the boundary region (for reference, the evolution of the Brunt–Väisälä frequency is also given in Figure <ref>). In Section <ref>, we analyzed the time evolution of the FV Gaussians located well into the radiative zone, at R=450Mm and R=550Mm. X30 also includes an FV Gaussian centered at R=650 Mm, very close to the convective boundary. The ingestion of this Gaussian into the convective envelope provides a useful diagnostic for the extent of the fully mixed envelope. There are several things to note in Figure <ref>: * While the formal Schwarzschild boundary is virtually stationary, the dynamic convective boundary (defined, as previously in this work, as the location of the maximum U_t gradient) migrates inward (circles in Figure <ref>); * The temperature gradient in the region between the Schwarzschild and convective boundaries departs from the ∇_ rad value expected in the radiative zone and instead gradually approaches the adiabatic gradient ∇_ ad; * The fully mixed region (i.e., the region where FV is constant) grows past the Schwarzschild boundary. All those properties point to the formation of a convective penetration zone. Formally, a penetration zone is a region where both entropy and composition are mixed by convective motions beyond the Schwarzschild boundary <cit.>. Convective penetration below a convective envelope has been observed in 3D hydrodynamics simulations of a Sun-like star <cit.> and of a 5 M_⊙ star at the end of central He burning <cit.>, two examples where the geometry is similar to that of the RGB case. While the limited length of our simulation does not allow the establishment of a fully mixed, stationary penetration zone, it is clear from Figure <ref> that such a region is in the process of being formed. The thermal diffusion lengthscale √(Kt) over the full simulation (t=552h) is ≃ 50Mm, which explains why the penetration zone had the time to build up but has not yet reached a steady state. To visualize this nascent penetration zone, we show in Figure <ref> renderings of the vorticity magnitude and radial velocity in the boundary region. The outer white circular arc marks the Schwarzschild boundary. Turbulent motions visible in the vorticity rendering extend well beyond this radius and up to the dynamic convective boundary (identified by the inner white circular arc): this is the convective penetration zone. In fact, this is very similar to the behaviour observed by <cit.> in their 3D hydrodynamics simulations performed in a simplified plane-parallel geometry (compare the left panel of Figure <ref> to the left panel of their Figure 1). While the penetration zone is not fully established, it is still useful to compare its extent to existing observational constraints. We can infer from Figures <ref> and <ref> that after 550 h of simulation time, the penetration zone extends ∼ 0.2 H_P beyond the Schwarzschild boundary. Interestingly, it has been shown that the inclusion of a ∼ 0.25 H_P overshooting below the Schwarzschild boundary can eliminate the discrepancy between the observed and predicted location of the RGB bump <cit.>. The renderings of Figure <ref> reveal more than just the formation of a penetration zone. We also see a large plume moving inward (remember that blue colours stand for inward motions in our U_r renderings) and traversing the spherically-averaged dynamic convective boundary to reach the stable, IGW-dominated interior. This points to the presence of an overshoot zone beyond the penetration zone, where the convective motions are too weak to efficiently mix entropy and composition. This is in line with the schematic picture discussed by <cit.> and recently illustrated by <cit.>. In the vorticity rendering of Figure <ref>, we can even see how the intrusion of this plume in the radiative region excites IGWs. On each side of the plume, there are structures that form an angle with respect to the almost circular patterns that otherwise dominate the vorticity rendering of the stable layers. Those structures, indicated by two arrows in Figure <ref>, are IGWs excited by the intruding plume (this is most clearly seen in the movie). This suggests that penetrative plumes are an important wave excitation mechanism, consistent with our findings of Section <ref> based on the IGW power spectra. That being said, it is possible that in a real RGB star, with a much large convective envelope, the dipolar global flow morphology prevents the formation of such plumes. The evolution of the FV profile in Figure <ref> can be used to infer the diffusion coefficient close to the convective boundary. As in <cit.>, we take the FV radial profiles at different times and invert the 1D diffusion equation to determine the profile D(R) that can reproduce the observed change. The resulting D(R) is shown as a black dashed line in Figure <ref>. Our diffusion coefficient inversion technique only works if the gradient of FV is not zero, meaning that we cannot measure D further out in the envelope than what is shown in Figure <ref>. Note also that this method cannot be applied in the stable layers, where diffusion is much slower and the approach used in Section <ref> is the best option. In Figure <ref>, we show with a grey dashed line the diffusion coefficient predicted by the MLT formula D_ MLT = 1/3 U α H_P, where we have assumed that U corresponds to the total velocity amplitude in the PPMstar simulation and where we have fixed α=0.75 in order to fit the measured diffusivity (black dashed line) in the envelope far from the Schwarzschild boundary. As previously observed in other hydrodynamics simulations, a constant α value leads to an overestimation of D close to the boundary, a problem that can be solved by reducing the mixing length near the boundary <cit.>. We found that a good prescription for α is given by α = min(0.75, 1.8 Δ R + 0.08), where Δ R = R-R_ SB/H_P, with R_ SB the radius of the Schwarzschild boundary. This yields an excellent fit to the measured diffusivity in the convection zone (red line in Figure <ref> for R≥ R_ SB). The simpler prescription suggested by <cit.> and the exponential parametrization of <cit.> cannot reproduce the measured diffusivity to a comparable degree of accuracy. To extend our diffusivity model below the Schwarzschild boundary, we use the double-f prescription of Equation <ref>. We find that this particular convective boundary mixing model cannot simultaneously match the measured diffusivity in the penetration zone (black dashed line for R < R_ SB in Figure <ref>) and in the stable layers (square symbols as in Figure <ref>). The best overall match is given by f_1=0.06, f_2=0.9 and D_2=1.7× 10^8 cm^2 s^-1 (z_2=105 Mm = 0.41 H_P,0), and is displayed as a red line for R<R_ SB in Figure <ref>. This simple diffusivity model, with a modified mixing length in the unstable layers and a double-exponential profile below R_ SB, can be easily implemented in 1D stellar evolution codes, with the caveats that it underestimates mixing in the penetration zone and that it may not apply to the rest of the RGB evolution. § CONCLUSION We have presented the first 3D hydrodynamics simulations of IGW excitation and propagation in RGB stars. These simulations clearly show that a rich spectrum of IGWs is generated in the radiative zones of low-mass upper RGB stars (Section <ref>). By analysing the time evolution of a tracer fluid, we measured the mixing enabled by IGWs in the radiative interior (Section <ref>). In our simulations, we find that IGW mixing is too weak to explain the missing RGB extra mixing, but we cannot rule out that this mixing mechanism is much more efficient in real RGB stars. In fact, our simulations only include a limited portion of the convective envelope, and we have shown how this probably leads to an underestimation of IGW mixing in the radiative zone (Section <ref>). This is the most critical aspect of our simulations to be improved in future work. We have also studied the properties of the envelope convective boundary (Section <ref>). We found evidence for the establishment of a convective penetration zone and for the excitation of IGWs in the stable layers by plumes that traverse the penetration zone and encroach into the radiative zone. We also provided a simple prescription for the diffusion coefficient in the boundary region. Promisingly, we also find that the vorticity profiles measured below the convective boundary in our RGB simulations yield support to the idea that IGW mixing may be responsible for the formation of the ^13C pocket in AGB stars. This should be further studied with dedicated AGB hydrodynamics simulations. § ACKNOWLEDGEMENTS We are grateful to the referee for insighful comments and questions that have improved this manuscript. SB is a Banting Postdoctoral Fellow and a CITA National Fellow, supported by the Natural Sciences and Engineering Research Council of Canada (NSERC). FH acknowledges funding through an NSERC Discovery Grant. PRW acknowledges funding through NSF grants 1814181 and 2032010. FH and PRW have been supported through NSF award PHY-1430152 (JINA Center for the Evolution of the Elements). The simulations for this work were carried out on the NSF Frontera supercomputer operated by the Texas Advanced Computing Center at the University of Texas at Austin and on the Compute Canada Niagara supercomputer operated by SciNet at the University of Toronto. The data analysis was carried on the Astrohub online virtual research environment (<https://astrohub.uvic.ca>) developed and operated by the Computational Stellar Astrophysics group (<http://csa.phys.uvic.ca>) at the University of Victoria and hosted on the Compute Canada Arbutus Cloud at the University of Victoria. § DATA AVAILABILITY Simulation outputs are available at <https://www.ppmstar.org> along with the Python notebooks that have been used to generate the figures presented in this work. mnras § SUPPLEMENTARY FIGURES This Appendix contains additional figures that are all referenced in the main text.
http://arxiv.org/abs/2303.07134v2
20230313140334
Hereditary extriangulated categories: Silting objects, mutation, negative extensions
[ "Mikhail Gorsky", "Hiroyuki Nakaoka", "Yann Palu" ]
math.RT
[ "math.RT", "math.CO", "math.CT", "16F35, 18G10, 18G80, 05E10 (Primary) 18G25, 16D90, 16G20, 13F60\n (Secondary)" ]
scale cd/.style=every label/.append style=scale=#1, cells=nodes=scale=#1 theoremTheorem[section] corollary[theorem]Corollary proposition[theorem]Proposition lemma[theorem]Lemma conjecture[theorem]Conjecture *theorem*Theorem definition definition[theorem]Definition example[theorem]Example remark[theorem]Remark question[theorem]Question notation[theorem]Notation assumption[theorem]Assumption convention[theorem]Convention claim[theorem]Claim fact[theorem]Fact condition[theorem]Condition problem[theorem]Problem caution[theorem]Caution *definition*Definition
http://arxiv.org/abs/2303.06660v1
20230312134250
P-MMF: Provider Max-min Fairness Re-ranking in Recommender System
[ "Chen Xu", "Sirui Chen", "Jun Xu", "Weiran Shen", "Xiao Zhang", "Gang Wang", "Zhenghua Dong" ]
cs.IR
[ "cs.IR" ]
Renmin University of China xc_chen@ruc.edu.cn School of Information Renmin University of China csr16@ruc.edu.cn Jun Xu is the corresponding author. Work partially done at Beijing Key Laboratory of Big Data Management and Analysis Methods. Renmin University of China junxu@ruc.edu.cn Gaoling School of Artificial Intelligence Renmin University of China shenweiran@ruc.edu.cn Gaoling School of Artificial Intelligence Renmin University of China zhangx89@ruc.edu.cn Huawei Noah's Ark Lab wanggang110@huawei.com dongzhenhua@huawei.com In this paper, we address the issue of recommending fairly from the aspect of providers, which has become increasingly essential in multistakeholder recommender systems. Existing studies on provider fairness usually focused on designing proportion fairness (PF) metrics that first consider systematic fairness. However, sociological researches show that to make the market more stable, max-min fairness (MMF) is a better metric. The main reason is that MMF aims to improve the utility of the worst ones preferentially, guiding the system to support the providers in weak market positions. When applying MMF to recommender systems, how to balance user preferences and provider fairness in an online recommendation scenario is still a challenging problem. In this paper, we proposed an online re-ranking model named Provider Max-min Fairness Re-ranking (P-MMF) to tackle the problem. Specifically, P-MMF formulates provider fair recommendation as a resource allocation problem, where the exposure slots are considered the resources to be allocated to providers and the max-min fairness is used as the regularizer during the process. We show that the problem can be further represented as a regularized online optimizing problem and solved efficiently in its dual space. During the online re-ranking phase, a momentum gradient descent method is designed to conduct the dynamic re-ranking. Theoretical analysis showed that the regret of P-MMF can be bounded. Experimental results on four public recommender datasets demonstrated that P-MMF can outperformed the state-of-the-art baselines. Experimental results also show that P-MMF can retain small computationally costs on a corpus with the large number of items. [500]Information systems Recommender systems P-MMF: Provider Max-min Fairness Re-ranking in Recommender System Gang Wang Zhenghua Dong ================================================================== § INTRODUCTION Raised out of social, ethical, and economic considerations, the fairness problem becomes non-negligible in recommendation <cit.>. In multi-stakeholder recommender systems (RS), there are several different participants, including users, items, providers, etc <cit.>. Various models have been proposed for recommending fairly from the viewpoints of users <cit.>, providers <cit.>, or both <cit.>. In this paper, we are concerned about the problem of ensuring provider fairness in multi-stakeholder recommender systems. Image by Interaction Institute for Social Change | Artist: Angus Maguire. (interactioninstitute.org and madewithangus.com). Saskatoon Health Region. There are many cultural variations regarding fairness <cit.> in sociological researches. One practical fairness definition is based on two sociological concepts: equality and equity <cit.>. According to <cit.>, equality can be defined as: everyone is treated the same and provided the same resources to succeed, while equity can be defined as: ensuring that resources are equally distributed based on needs. Figure <ref> gives an intuitive example of the two types of fairness under the recommendation scenario. Suppose we have some resources (i.e., exposure slots) to ensure that providers can get the apples (i.e., survival in the market). As shown in Figure <ref>, equality ensures that the RS evenly gives each provider the same support, while equity (known as distributive justice) emphasizes that RS will assign resources to providers as different ratios <cit.>. Based on the concepts of equity <cit.>, the metrics of proportion fairness (PF) and max-min fairness (MMF) <cit.> have been respectively proposed. PF and MMF have been widely used for computation network and transportation <cit.>. Their formal formulations in the provider fair recommendation scenario will be explained in Section <ref>. Intuitively, PF and MMF tries to assign resources to the specified ratios <cit.>. PF is based on welfare-based principles (known as Aristotle’s Principle and Nash solution <cit.>), which maximizes the sum of welfare of providers. MMF (known as Rawls’ Principle and Kalai-Smorodinsky solution <cit.>) aims to improve the worst-off providers’ utilities. MMF has proven to be a better metric for the provider fairness problem, because worse-off providers, who occupy the majority of the platform, can survive with these supports. Taking care of these weak providers will increase the stability of the recommender market <cit.>. For example, according to the report by <cit.>, small sellers in Amazon have difficulty facing the challenges of “lower profitability” and “inability to personalize” on their own. The unfair system without ensuring MMF may result in a broken relationship between the providers and RS and, finally, force the providers to leave. Existing provider fair recommendation models either consider the PF of providers <cit.> or use heuristics to guarantee the utilities of the worse-off providers <cit.>. However, these heuristic methods do not directly consider the MMF and lack theoretical guarantees when adapting to online scenarios. Moreover, the heuristic methods lack the flexibility to trade-off with user utility, which inevitably hurts the users' experience. This paper aims to develop a practical re-ranking model that considers MMF from the providers' perspectives. We formulate the provider fair recommendation as a process of resource allocation <cit.>. In such a process, resources can be regarded as limited ranking slots, and providers are viewed as the demanders. The cost of allocation is defined as the preference of the users. Moreover, an MMF regularizer is imposed on the allocation to maximize the minimum allocation to a specific provider. To adapt the method to the online recommendation scenarios, we proposed an online re-ranking algorithm called P-MMF that focuses on provider max-min fairness by viewing the provider fair online recommendation as a regularized online optimizing problem. However, the optimization problem contains many integral variables, making it notoriously difficult to solve. We then derive its dual problem and propose an efficient algorithm to optimize the problem in the dual space. In the online setting, a momentum gradient descent method was developed to make an effective and efficient online recommendation. Our theoretical analysis shows that the regret of the P-MMF can be well-bounded. Furthermore, the P-MMF is also computationally efficient due to its insensitivity to the number of items. We summarize the major contributions of this paper as follows: (1) We analyzed the importance of ensuring equity for providers in multi-stakeholder recommender systems, and propose to use the max-min fairness metric in provider fair recommendation. (2) We formulated the provider fair recommendation as a resource allocation problem regularized by the max-min fairness, and proposed a re-ranking model called P-MMF that balances the provider fairness and the user preference. Our theoretical analysis showed that the regret of P-MMF can be bounded. (3) Simulations on a small dataset showed the superiority of MMF compared to PF in recommending fairly to providers. Extensive experiments on four publicly available datasets demonstrated that P-MMF outperformed state-of-the-art baselines, including the PF-based and MMF-based methods. § RELATED WORK Fairness has become a hot research topic in multi-stakeholder recommender systems <cit.>. Researchers have proposed several user-oriented and item/provider-oriented fairness re-ranking models. For user-oriented fairness, <cit.> proposed a user-centered evaluation that measures users' different interest levels in popular items. <cit.> addressed the user-centered fairness from a group fairness perspective. For provider-oriented fairness, <cit.> proposed a rule-based algorithm to ensure that the exposures of items should be equally distributed. <cit.> aimed to enhance dynamic fairness when item popularity changes over time. However, these provider-oriented methods did not consider the user's perspective. Recently, there are also studies that jointly consider the trade-off between user preference and provider fairness. <cit.> claimed that all providers should receive the amount of exposures proportional to their relevance in economy platforms. <cit.> studied the trade-offs between the user and producer fairness in Point-of-Interest recommendations. TFROM <cit.> and CPFair <cit.> formulated the trade-off as a knapsack problem and a relaxed linear programming problem, respectively. However, they used greedy-based algorithms in online scenarios, which only improves the proportion fairness of providers. Some studies noticed that the utilities of worse-off providers should also be guaranteed. For example, FairRec <cit.> and its extension FairRec+ <cit.> proposed hard constraints to ensure that every provider should have the lowest exposures. Welf <cit.> proposed a Frank-Wolfe algorithm to maximize the welfare functions of worse-off items. However, they were all designed for offline scenarios and suffered from high computational costs, which prevented them from being applied to real online recommendation systems <cit.>. In this paper, we formulate the re-ranking task as the resource allocation problem <cit.>, which is crucial in communications and transportation. In online resource allocation, most studies <cit.> focused on designing the time-separable reward functions, which is the sum of rewards over periods.  <cit.> proposed a local-based sub-gradient algorithm for the linear reward. <cit.> designed a dual-based online algorithm with learning from the distribution of requests. <cit.> proposed a mirror-descent method to solve the fairness-regularized online allocation problem. § PROVIDER FAIR RE-RANKING In this section, we first define the notations in a multi-stakeholders recommender system. Then we give the formal definitions of the proportion and max-min fairness. In a multi-stakeholders recommender system, multiple participants exist, including users, item providers, and other stakeholders. Let 𝒰, ℐ, and 𝒫 be the set of users, items, and providers, respectively. Each item i∈ℐ is associated to a unique provider p∈𝒫. The set of items associated with a specific provider p is denoted as ℐ_p. When a specific user u∈𝒰 accesses the recommender system, a list of K items, denoted by L_K(u)∈ℐ^K, is provided to the user. For each user-item pair (u, i), the recommender model estimates a preference score s_u,i∈ℝ. These items are ranked according to their preference scores. In this paper, we define the user-side utility of exposing item list L_K(u) to u as the summation of the preference scores in the list, denoted by f(L_K(u)) = ∑_i∈ L_K(u) s_u,i. We follow the literature convention <cit.> and define the fairness vector of providers as 𝐞∈ℝ^|𝒫|, where for a specific provider p, 𝐞_p∈ℝ^+ denotes the number of exposed items of provider p. The goal of provider fair re-ranking is to compute a new fair list L^F_K(u)∈ℐ^K which well balances the user utilities f(L^F_K(u)) and a provider fairness metric defined over 𝐞. In real-world applications, the users arrive at the recommender system sequentially. Assume that at time t user u_t arrives. The recommender system needs to consider long-term provider exposure during the entire time horizon from t=0 to T. Our task can be formulated as a resource allocation problem <cit.> with time-separable fairness. Specifically, the optimal utility of the recommender system can be defined as a time-separable utility function, which is the accumulated reward <cit.> over periods from 0 to T. In this case, 𝐞_p can be seen as the total number of exposed items of provider p, accumulated over the period 0 to T. Formally, when trading-off the user preference and provider fairness, we have the following mathematical program: max_L^F_K 1/T∑_t=1^T f(L^F_K(u_t)) + λ r(𝐞) s.t. 𝐞≤γ, where γ∈ℝ^|𝒫| denotes the weights of different providers, e.g., weighted PF or MMF <cit.>, and r(𝐞)∈ℝ is a provider fairness metric that serves as a fairness regularizer. Note that the constraint 𝐞≤γ can also be viewed as the maximum resources allocated to the providers. Following the definitions of PF and MMF <cit.>, r(𝐞) also has two different forms: Proportion Fairness (PF): r(𝐞) = ∑_p∈𝒫log[1+𝐞_p/γ_p]. Max-min Fairness (MMF): r(𝐞) = min_p∈𝒫[𝐞_p/γ_p]. Using the proportion fairness as the regularizer, we can reduce the difference between 𝐞 and γ, while using the max-min fairness we can improve the relative exposure (w.r.t. weights γ) of the least exposed provider. § OUR APPROACH: P-MMF In this section, we first formulate provider fairness in the recommendation as a resource allocation problem. Then, we propose an algorithm called P-MMF for the online recommendation. §.§ Resource allocation with provider fairness We formulate the providers' fair recommendation problem as a resource allocation process <cit.>. In such a process, the resources can be regarded as limited ranking slots that are allocated to providers. The allocation cost is defined based on the preference of the users and the max-min fairness. Formally, based on Equation (<ref>), the fair recommendation problem can be written as a linear programming: max_𝐱_t 1/T∑_t=1^Tg(𝐱_t) + λ r(𝐞) s.t. ∑_i∈ℐ𝐱_ti = K, ∀ t∈ [1,2,…,T] 𝐞_p = ∑_t=1^T∑_i∈ℐ_p𝐱_ti, ∀ p∈𝒫 g(𝐱_t) = ∑_i∈ℐ𝐱_tis_u_t,i, ∀ t∈ [1,2,…,T] 𝐞≤γ, 𝐱_ti∈{0, 1}, ∀ i ∈ℐ,  ∀ t∈ [1,2,…,T] , where 𝐱_t∈{0, 1}^|ℐ| is the decision vector for user u_t, and g(·) is the user-side utility function. Specifically, for each item i, 𝐱_ti = 1 if it is added to the fair ranking list L_K^F(u_t), otherwise, 𝐱_ti = 0. Note that g(·) is equivalent to f(·) in the sense that they produce the same result, while g(·) takes the binary decision vector as input. The first constraint in Equation (<ref>) ensures that the recommended lists are of size K. The second constraint in Equation (<ref>) suggests that the exposures of each provider p are the accumulated exposures of the corresponding items over all periods. In general, we think time-separable fairness would be preferred under the scenarios with weak timeliness. For example, recommending the items with long service life (e.g., games and clothes etc.). Figure <ref> gives a toy example of the linear programming problem (<ref>). In the example, we set T=2. Suppose there are two users, u_1 and u_2, arriving at the system one by one. At each time step, the system recommends a list of K=3 items. Therefore, the system has overall 2× 3 = 6 slots to expose. Suppose the system has two providers p_1 and p_2, each owning three items. Let's set identical weights for p_1 and p_2 (i.e., γ = [γ_1=6, γ_2=6]). The model solves problem (<ref>) and the solution is two binary vectors: 𝐱_1 for u_1 and 𝐱_2 for u_2. Finally, we count the exposures over the time T=2: 𝐞 = [e_p_1 = 2, e_p_2 =4], which means by recommending the ranking lists L_K^F(u_1) (created based on 𝐱_1) and L_K^F(u_2) (created based on 𝐱_2) to u_1 and u_2, provider p_1 and _2 get 2 and 4 exposures, respectively. Although here we have already given a linear programming solution Eq.(<ref>) to the problem, it can only be solved small-scale problems in an offline way. In online recommendation systems, for each user u_t access, the model needs to generate a fair ranking list L^F_K(u_t) from large-scale item corpus immediately. This means we have no idea about the information after t. Next, we will discuss how to use MMF in the online recommendation problem. §.§ P-MMF for online applications In this section, firstly, we formulate the MMF in online scenarios. Next, we consider the dual of the original problem. Focusing on the dual problem has several advantages: the dual problem has significantly fewer variables, and the variables no longer need to be integers as in the original problem. Finally, we proposed a momentum gradient descent algorithm for efficient online learning. §.§.§ At time step t, the recommender system receives a request from user u_t. An online algorithm h produces a real-time decision vector 𝐱_t∈{0,1}^|ℐ| based on the current user u_t and the previous history ℋ_t-1 = {u_s,𝐱_s}_s=1^t-1: 𝐱_t = h(u_t |ℋ_t-1). We define the online reward of max-min fairness to be the summation of rewards over all time steps: W = 1/T∑_t=1^Tg(𝐱_t) + λmin[𝐞/γ], where min[𝐞/γ] corresponds to the max-min fairness regularizer. Our goal is to design an algorithm h that attains low regret. Denote by W_OPT the optimal value, we measure the regret of an algorithm as the expectation difference between the optimal performance W_OPT of the offline problem and that of the online algorithm W over user distributions 𝒰: Regret(h) = 𝔼_u_t ∼𝒰[W_OPT - W]. §.§.§ Dual problem From the original problem in Equation (<ref>), we know that the integer decision variable 𝐱_t is of size |ℐ| for each time t, which is hard to solve. However, considering its dual problem, we can significantly reduce its computational cost. The dual problem of Equation (<ref>) can be written as: W_OPT ≤ W_Dual = min_μ∈𝒟[g^*(𝐀μ) + λ r^*(-μ)], where 𝐀∈ℝ^|ℐ|×|𝒫| is the item-provider adjacent matrix, and A_ip = 1 indicates item i∈ℐ_p, and 0 otherwise. Letting 𝒳 = {𝐱_t|𝐱_t ∈{0,1}∑_i∈ℐ𝐱_ti = K}, g^*(·),r^*(·) are the conjugate functions: g^*(c) = max_𝐱_t∈𝒳∑_t=1^T[g(𝐱_t)/T - 𝐜^⊤𝐱_t], r^*(-μ) = max_𝐞≤γ[r(𝐞)+μ^⊤𝐞/λ], and 𝒟 = {μ|r^*(-μ)<∞} is the feasible region of dual variable μ. Proof of Theorem <ref> can be found in Appendix <ref>. From Theorem <ref>, we can have a new non-integral decision variable μ∈ℝ^|𝒫|. In practice, the provider size |𝒫|≪ |ℐ|. Besides, due to 𝐀's sparsity, it is very efficient to compute 𝐀μ, which aims to project the variable μ from provider space into item spaces. In our online algorithm discussed in Section <ref>, we can have a closed form of the conjugate function g^*(·) in constant time. As for the feasible region 𝒟 and the conjugate function r^*(·), we have Theorem <ref> and Lemma <ref>. In the MMF, the feasible region of the dual problem 𝒟 = {μ  |  ∑_p∈𝒮γ_pμ_p ≥ -λ, ∀𝒮∈𝒫_s.}, where 𝒫_s is the power set of 𝒫, i.e., the set of all the subsets of 𝒫. The proof of Theorem <ref> can be found in Appendix <ref>, which implies the following Lemma <ref>: The conjugate function r^*(·) has a closed form: max_μ≤γr^*(-μ) = γ^Tμ/λ + 1, and the optimal dual variable is: _μ≤γr^*(-μ) = γ/λ. §.§.§ The P-MMF algorithm Algorithm <ref> illustrates P-MMF algorithm. Following <cit.>, P-MMF keeps a dual variable μ_t, the remaining resources β_t and the gradient 𝐠_t for each time t. Whenever a user arrives, the algorithm computes the recommended variable 𝐱_t based on the remaining resources and the dual variable μ_t (line 7). The final dual variable is estimated as the average dual variable for each time t: μ = ∑_t=1^Tμ_t/T. Intuitively, for μ_t, when the values of dual variables are higher, the algorithm naturally recommends fewer items related to the corresponding provider. The remaining resources β_t ensure that the algorithm only recommends items from providers with remaining resources. Note that in line 7, the formulation is linear with respect to 𝐱_t. Therefore, it is efficient to compute 𝐱_t through a top-K sort algorithm in constant time. The online learning process is as follows. Firstly, we get the closed form of the conjugate function of max-min regularizer r^*(-μ_t) according to Lemma <ref>. Then we can get the subgradient of the dual function g^*(𝐀μ)+λ r^*(-μ): -𝐀^⊤𝐱_t + 𝐞_t ∈∂(g^*(𝐀μ_t)+λ r^*(-μ_t)). We also add the last time momentum <cit.> to the updated gradient 𝐠_t. Finally, we utilize 𝐠_t to update the dual variable by performing the online descent in line 14, where we used weighted ℓ_2-norm:μ_γ^2^2 = ∑_j=1^|𝒫|γ_j^2μ_j^2. Therefore, the dual variable will move towards the directions of the providers with fewer exposures, and the primal variable 𝐱_t will move to a better solution. Note that the projection step in line 14 can be efficiently solved using convex optimization solvers <cit.> since 𝒟 is coordinate-wisely symmetric. min_μ∈𝒟μ-μ_t _γ^2^2 = min_∑_p∈𝒫(μ_pγ_p - μ_pγ_p)^2 s.t.∑_j=1^m γ_jμ_j + λ ≥ 0, ∀ m = 1, 2 , …, |𝒫|, where μ satisfies: γ_1μ_1 ≤γ_2μ_2 ≤⋯, ≤γ_|𝒫|μ_|𝒫|. We provide a regret bound on Regret(h) in Theorem <ref> but defer the proof to Appendix <ref> due to space limit. Intuitively, larger ranking size K and time T will lead to larger biases in P-MMF. Assume that the function ·_γ^2^2 is σ-strong convex and there exists a constant G∈ℝ^+ and H>0 such that g_t<G, μ_t-μ_0_γ^2^2≤ H.. Then, the regret can be bounded as follows: Regret(h) ≤K(1+λr̅ + r̅)/min_p γ_p + H/η + G^2/(1-α)ση(T-1) + G^2/2(1-α)^2ση, where r̅ is the upper bound of MMF regularzier, and in practice, r̅≤ 1. Setting the learning rate as η = O(T^-1/2), we can obtain a sublinear regret upper bound of order O(T^1/2) of magnitude. § EXPERIMENT We conducted experiments to show the effectiveness of the proposed P-MMF for provider-fair recommendations. The source code and experiments have been shared at github [<https://github.com/XuChen0427/P-MMF>. For the MindSpore <cit.> version, please see <https://gitee.com/mindspore/models/tree/master/research/recommend/pmmf>]. §.§ Experimental settings §.§.§ Datasets The experiments were conducted on four large-scale, publicly available recommendation datasets, including: Yelp[<https://www.yelp.com/dataset>]: a large-scale businesses recommendation dataset. We only utilized the clicked data, which is simulated as the 4-5 star rating samples. The cities of the items are considered as providers. It has 154543 samples, which contains 17034 users, 11821 items and 23 providers. Amazon-Beauty/Amazon-Baby: Two subsets (beauty and digital music domains) of Amazon Product dataset[<http://jmcauley.ucsd.edu/data/amazon/>]. We only utilized the clicked data, which is simulated as the 4-5 star rating samples. Also, the brands are considered as providers. They has 49217/59836 samples, which contains 9625/11680 users, 2756/2687 items and 1024/112 providers. Steam[<http://cseweb.ucsd.edu/ wckang/Steam_games.json.gz>] <cit.>: We used the data for gamed played for more than 10 hours in our experiments. The publishers of games are considered as providers. It has 29530 samples, which contains 5902 users, 591 items and 81 providers. As a pre-processing step, the users, items, and providers who interacted with less than 5 items/users were removed from all dataset to avoid the extremely sparse cases. We also removed the providers associated with less than 5 items. §.§.§ Evaluation We sorted all the interactions according to the time and used the first 80% of the interactions as the training data to train the base model (i.e., BPR <cit.>). The remaining 20% of interactions were used as the test data for evaluation. Based on the trained base model, we can obtain a preference score s_u, i for each user-item pair (u, i). The chronological interactions in the test data were split into interaction sequences where the horizon length was set to T. We calculated the metrics separately for each sequence, and the averaged results are reported as the final performances. As for the evaluation metrics, the performances of the models were evaluated from three aspects: user-side preference, provider-side fairness, and the trade-off between them. As for the user-side preference, following the practices in <cit.>, we utilized the NDCG@K, which is defined as the ratio between the sum of position-based user-item scores <cit.> in the original ranking list 𝐋_K(u_t) and that in the re-ranked list 𝐋^F_K(u_t): NDCG@K =1/T∑_t=1^T∑_i∈𝐋_K(u_t)s_u_t,i/log(rank_i+1)/∑_i∈𝐋_K^F(u_t)s_u_t,i/log(rank_i^F+1), where rank_i and rank_i^F are the ranking positions of the item i in 𝐋_K(u_t) and 𝐋_K^F(u_t), respectively. As for the provider fairness, we directly utilized the definition of MMF in Section <ref> as the metric: MMF@K = min_p∈𝒫{∑_t=1^T∑_i∈𝐋_K^F(u_t)𝕀(i∈ℐ_p)/γ_p}, where 𝕀(·) is the indicator function. As for the trade-off performance, we used the online objective traded-off with Equation (<ref>): W_λ@K = 1/T∑_t=1^T(∑_i∈𝐋_K^F(u_t)s_u_t,i) + λ·MMF@K, where λ≥ 0 is the trade-off coefficient. §.§.§ Baselines The following representative provider fair re-ranking models were chosen as the baselines: FairRec <cit.> and FairRec+ <cit.> aimed to guarantee at least Maximin Share (MMS) of the provider exposures. CPFair <cit.> formulated the trade-off problem as a knapsack problem and proposed a greedy solution. We also chose the following MMF models: Welf <cit.> use the Frank-Wolfe algorithm to maximize the Welfare functions of worst-off items. However, it is developed under off-line settings; RAOP <cit.> is a state-of-the-art online resource allocation method. We applied it to the recommendation by regarding the items as the resources and users as the demanders. We also compared the proposed P-MMF with two heuristic MMF baselines: K-neighbor: at each time step t, only the items associated to the top-K providers with the least cumulative exposure are recommended; min-regularizer: at each time step t, we add a regularizer that measures the exposure gaps between the target provider and the worst-providers. Appendix <ref> shows the algorithm details. §.§.§ Implementation details As for the hyper-parameters in all models, the learning rate was tuned among [1e-2,1e-4]/T^1/2 and the momentum coefficient α was tuned among [0.2,0.6]. For the maximum resources (i.e., the weights) γ, following the practices in <cit.>, we set γ based on the number of items provided by the providers: γ_p = KTη|ℐ_p|/|ℐ|, where η is the factor controlling the richness of resources. In all the experiments, we set η=1+1/|𝒫|. We implemented P-MMF with both CPU and GPU versions based on cvxpy <cit.> and its PyTorch version <cit.>, respectively. §.§ Simulation on a small dataset Note that Problem (<ref>) can use MMF or PF as its regularizer, though directly solving it on large-scale datasets is difficult. To verify the correctness of the formulation and to investigate different impacts of MMF-based and PF-based regularizers on provider fair recommendation, we first conducted a numerical simulation using 5% of the Yelp data, which consists of 844 users, 813 items, 10 providers, and with the length of the horizon T=256 . Specifically, we solved the Problem (<ref>) with PF based or MMF based regularizers (i.e., setting their provider weights as even distribution γ_p = KT, ∀ p∈𝒫), using the solver cvxpy <cit.>. At each time t, after receiving the recommendation decision variable 𝐱_t, we calculated the overall provider exposure 𝐞 on the dataset. Then the Lorenz curves <cit.> of provider exposures were drawn and shown in Figure <ref>. The Lorenz curve is often used to represent exposure distribution. Here it shows the proportion of overall exposure percentage assumed by the bottom x% providers. In other words, for the bottom x% providers, what percentage (y%) of the total exposures they have. Note that the diagonal line to the upper right is known as the absolute fair line. From the curves shown in Figure <ref>, we can observe that when the λ→∞ (i.e., only consider provider's fairness), both PF and MMF can achieve the expected proportion γ (i.e., even exposures here). However, after considering the user preference, the MMF-based regularizer tends to consider the worst providers' exposure first, while PF does not. For example, when the trade-off coefficient λ changes among [0.01,0.05,0.1], 60% of the least exposure providers will increase [18.81%,18.96%, 12.58%] exposures by MMF. If using PF-based regularizer, then the increased exposure ratios become [10.1%,16.27%, 9.58%]. The results verified that formulating recommendations as a resource allocation problem regularized by MMF leads to better provider-fair recommendations than PF. §.§ Experimental results on full datasets In this section, we conducted the experiments with the online algorithm developed in Section <ref>. In all of the experiments, BPR <cit.> was chosen as the base ranking model for generating preference scores. We set the length of the horizon T=256. Table <ref> reports the experimental results of P-MMF and the baselines on all datasets in terms of the metric W_1@K. Underlined numbers mean the best-performed baseline. To make fair comparisons, all the baselines were tuned and used W_1@K as the evaluation metric. Note that similar experiment phenomena has also been observed on other λ values. From the reported results, we found that P-MMF outperformed all of the PF-based baselines in terms of W_1@K (K=5, 10, 20), verified that P-MMF can give supports to the poor-conditioned providers. We also observed that P-MMF outperformed all the MMF-based baselines, indicating P-MMF's effectiveness in enhancing provider fairness while keeping high user preference. Figure <ref> shows the Pareto frontiers <cit.> of NDCG@K and MMF@K on four datasets with different ranking size K. The Pareto frontiers were drawn by tuning different parameters of the models and choosing the (NDCG@K, MMF@K) points with the best performances. In the experiment, we selected the baselines of CPFair, min-regularizer, Welf, and ROAP, which achieved relatively good performances among all baselines. From the Pareto frontiers, we can see that the proposed P-MMF Pareto dominated the baselines (i.e., the P-MMF curves are at the upper right corner). Pareto dominance means that under the same NDCG@K level, P-MMF achieved better MMF@K; Under the same MMF@K level, P-MMF achieved better NDCG@K. The results demonstrate that P-MMF splendidly improves the utilities of poor-conditioned providers without sacrificing users' utilities too much. §.§ Experiment analysis We also conducted experiments to analyze P-MMF on Yelp. §.§.§ Ablation study on different base models P-MMF and other baselines are re-ranking models which re-rank the results outputted by a base recommender model. To verify the effectiveness of P-MMF with different base ranking models, we choose three other base models to generate user-item preference scores s_u,i, including DMF <cit.> which optimizes the matrix factorization with the deep neuarl networks; LINE <cit.> is a matrix factorization model based on graph embeddings; and LightGCN <cit.> which builts a user-item interaction graph and adapts Graph Convolutional Network <cit.> to conduct recommendation. All the experiments were also conducted on the full Yelp dataset with T=256. Table <ref> shows the experimental results of P-MMF with different base models. We observed that P-MMF consistently outperformed the PF-based and MMF-based baselines. The results also verified that P-MMF is more effective than the baselines in re-ranking the results outputted by different base models. §.§.§ Regret bound experiments To further show the effectiveness of the P-MMF, we directly compute the regret Regret(h)=W_OPT - W, where W_OPT is the oracle performance defined in Equation (<ref>), and W is the online performance defined in Equation (<ref>). Due to the huge computational cost of obtaining W_OPT on large-scale datasets, we conducted the experiments on the 5% of the Yelp data created in Section <ref>. We compared P-MMF with the state-of-the-art provider-fair online MMF baselines: min-regularizer and ROAP. The experiments were conducted on ranking size K=10. Note that in the experiment, we fixed the user arriving size N, and the regret is computed through the summation over the N/T samples where T is the length of the horizon. According the Theorem <ref>, the summation Regret(h) is comparable with O(T^1/2N/T) = O(N/T^1/2). Figure <ref> shows the summation Regret(h) curves w.r.t. T. Figure (a) and (b) show the curves when the trade-off co-efficient λ was set as 1 and 0.1, respectively. From Figure <ref>, we can see that P-MMF has lower regret bound than other online models, especially when λ is large. Moreover, we can see that the regret bound of P-MMF is decreasing with the increase of T, which verified the theoretical analysis results. Similar results have also been observed for other λ values. §.§.§ Online inference time We experimented with investigating the online inference time of P-MMF and the most practical RS model DMF <cit.>. In real recommender systems, the number of providers is relatively small and steady. However, the number of users and items is usually huge and grows rapidly. Therefore, we tested the inference time under CPU and GPU implementations of P-MMF and DMF w.r.t. the different number of items while keeping the number of users and providers unchanged. The GPU implementation is based on PyTorch <cit.>. Figure <ref> reports the curves of inference time (ms) per user access w.r.t. item size. We can see that P-MMF with CPU and GPU versions need only about 20-40ms and 17-18ms for online inference, respectively. Moreover, we can see that the inference time of P-MMF did not increase much with the increasing number of items. For example, by increasing the item size from 0 to 200000, the P-MMF CPU version only needs a little bit more time (19ms) for online inference. The inference time for the GPU version almost kept unchanged. As for comparisons, DMF's inference time increased rapidly: both CPU and GPU versions need much more time (about 65ms). The phenomenon can be easily explained with the dual problem analysis in Theorem <ref>. We see the parameter size of P-MMF is provider size, which is far less than the item size |𝒫|≪ |ℐ|. Therefore, the online inference time is not sensitive to item numbers. We conclude that P-MMF can be adapted to the real online recommendation scenarios efficiently because of its low and robust online computational cost, even when the number of items grows rapidly. § CONCLUSION This paper proposes a novel re-ranking model called P-MMF that aims to balance provider fairness and user preference. Firstly, We formalize the task as a resource allocation problem regularized by a max-min fairness metric. Then, to adapt the online scenarios in the recommendation, we proposed a momentum gradient descent method to conduct online learning for resource allocation in the dual space. Theoretical analysis showed that the regret of P-MMF is bounded. Extensive experimental results on four large-scale datasets demonstrated that P-MMF outperformed the baselines and Pareto dominated the state-of-the-art provider fair baselines. This work was funded by the National Key R&D Program of China (2019YFE0198200), the National Natural Science Foundation of China (61872338, 62006234, 61832017), Intelligent Social Governance Interdisciplinary Platform, Major Innovation & Planning Interdisciplinary Platform for the “Double-First Class” Initiative and the Outstanding Innovative Talents Cultivation Funded Programs 2023 of Renmin University of China. ACM-Reference-Format § APPENDIX §.§ Proof of Theorem <ref> For max-min fairness, we have the regularizer as r(𝐞) = min_p∈𝒫(𝐞_p/γ_p), we can easily proof that the exposure vector 𝐞 can be represented as the dot-product between decision varible 𝐱_t and the item-provider adjacent matrix 𝐀: 𝐞 = ∑_t=1^T(𝐀^⊤𝐱_t). Then we treat the 𝐞 as the auxiliary variable, and the Equation (<ref>) can be written as: W_OPT = max_𝐱_t∈𝒳,𝐞≤γ[∑_t=1^Tg(𝐱_t)/T + λ r(𝐞)] s.t. 𝐞 = ∑_t=1^T(𝐀^⊤𝐱_t), where 𝒳 = {𝐱_t|𝐱_t ∈0,1∑_i∈ℐ𝐱_ti = K}. Then we move the constraints to the objective using a vector of Lagrange multipliers μ∈ℝ^|𝒫|: W_OPT = max_𝐱_t∈𝒳,𝐞≤γmin_μ∈𝒟[∑_t=1^Tg(𝐱_t)/T + λ r(𝐞) - μ^⊤(-𝐞+∑_t=1^T𝐀^⊤𝐱_t)] ≤min_μ∈𝒟[max_𝐱_t∈𝒳[∑_t=1^Tg(𝐱_t)/T - μ^⊤∑_t=1^T𝐀^⊤𝐱_t] + max_𝐞≤γ(λ r(𝐞)-μ^⊤𝐞)] =min_μ∈𝒟[f^*(𝐀μ) + λ r^*(-μ)] = W_Dual, where 𝒟 = μ|r^*(-μ)<∞} is the feasible region of dual variable μ. According to the Lemma 1 in the  <cit.>, we have 𝒟 is convex and positive orthant is inside the recession cone of 𝒟. §.§ Proof of Theorem <ref> We let the variable 𝐳_p = (𝐞_p/γ_p-1), we have: r^*(μ) = max_𝐞≤γ[min(𝐞_p/γ_p) + μ^⊤𝐞/λ] = μ^⊤γ /λ + 1 + max_𝐳_p ≤ 0[min(𝐳_p) + 1/λ∑_p∈𝒫μ_pγ_p𝐳_p] Let s(𝐳) = min_p 𝐳_p and 𝐯 = (μ⊙γ)/λ, ⊙ is the hadamard product. Then we define s^*(𝐯) = max_𝐳≤ 0(s(𝐳) + 𝐳^T𝐯). We firstly show that if ∑_p∈𝒮𝐯_p ≥ -1, ∀𝒮∈𝒫_s, then s^*(𝐯) = 0 and 𝐳 = 0 is the optimal solution, otherwise s^*(𝐯) = ∞. We can equivalently write 𝒟 = {𝐯|∑_p∈𝒮𝐯_p ≥ -1, ∀𝒮∈𝒫_s}. We firstly show that s^*(𝐯) = ∞ for 𝐯∉𝒟. Suppose that there exists a subset 𝒮∈𝒫_s such that ∑_p∈𝒮𝐯_p < -1. For any b > 1, we can get a feasible solution: 𝐯_p= {[ -b, p∈𝒮; 0, otherwise. ]. Then, because such solution is feasible and s(𝐳) = -b, we obtain that s^*(𝐯) ≥ s(𝐳) - b(∑_p∈𝒮𝐯_p) = -b(∑_p∈𝒮𝐯_p+1). Let b→∞, we have s^*(𝐯)→∞. Then we show that s^*(μ) = 0 for 𝐯∈𝒟. Note that 𝐳 = 0 is feasible. Therefore, we have s^*(𝐯)≥ s^*(0) = 0. Then we have 𝐳≤ 0 and without loss of generality, that the vector 𝐳 is sorted in increasing order, i.e., 𝐳_1≤𝐳_2, ⋯, ≤𝐳_|𝒫|. The objective value is s^*(𝐯) = 𝐳_1 + ∑_j∈|𝒫|𝐳_j𝐯_j = ∑_j=1^|𝒫|(𝐳_j-𝐳_j+1)(1+∑_i=1^j𝐯_j)≤ 0. Thus we can have s^*(μ) = 0 for 𝐯∈𝒟 and we have r^*(-μ) = μ^⊤γ/λ + 1. §.§ Proof of Theorem <ref> Firstly, in practice, we normalize the user-item preference score s_u,i to [0,1]. Therefore, ∑_t=1^Tg(𝐱_t)/T≤ K. In max-min regularizer r(𝐞). Let's abbreviate its upper bound to r̅. In practice, r̅≤ 1 We have W_OPT≤ K + λr̅. We consider the stopping time τ of Algorithm <ref> as the first time the provider will have the maximum exposures, i.e. ∑_t=1^τ𝐀^⊤𝐱_t ≥γ. Note that is τ a random variable. Similarly, followed the prove idea of <cit.>, First, we analysis the primal performance of the objective function. Second, we bound the complementary slackness term by the momentum gradient descent. Finally, We conclude by putting it to achieve the final regret bound. Primal performance proof: Consider a time t<τ, the recommender action will not violate the resource constraint. Therefore, we have: g(𝐱_t)/T = g^*(𝐀μ_t) + λμ_t^T𝐀^⊤𝐱_t, and we have 𝐞_t = _𝐞≤γ{r(𝐞) + μ^⊤𝐞/λ} r(𝐞_t) = r^*(-μ) - μ_𝐭^T𝐞_t/λ. We make the expectations for the current time step t for the primal functions: 𝔼[g(𝐱_t)/T + λ r(𝐞_t)] = 𝔼[g^*(𝐀μ_t) + μ_𝐭^T𝐀^⊤𝐱_t + λ r^*(-μ) - μ_𝐭^T𝐞_t] = W(μ_t) - 𝐄[μ_t^T(-𝐀^⊤𝐱_t + 𝐞_t)]. Consider the process Z_t = ∑_j=1^Tμ_j^t(-𝐀^⊤𝐱_t + 𝐞_t)-𝐄[μ_t^T(-𝐀^⊤𝐱_t + 𝐞_t)] is a martingale process. The Optional Stopping Theorem in martingale process <cit.> implies that 𝔼[Z_τ] = 0. Consider the variable w_t(μ_t) = μ_t^T(-𝐀^⊤𝐱_t + 𝐞_t), we have 𝔼[∑_t=1^τw_t(μ_t)] = 𝔼[∑_t=1^τ𝔼[w_t(μ_t)]] Moreover, in MMF, the dual function W_Dual is convex proofed in Theorem <ref>, we have 𝔼[∑_t=1^τg(𝐱_t)/T + λ r(𝐞_t)] = 𝔼[∑_t=1^τW_Dual(μ_t)] - 𝔼[∑_t=1^τw_t(μ_t)] ≤𝔼[τ W_Dual(μ_τ)] - 𝔼[∑_t=1^τw_t(μ_t)], where μ_τ =∑_t=1^τμ_t/τ. Complementary slackness proof Then we aim to proof the complementary slackness ∑_t=1^Tw_t(μ_t) - w_t(μ) is bounded. Suppose there exists G, s.t. the gradient norm is bounded 𝐠_t ≤ G. Then we have: ∑_t=1^τw_t(μ_t) - w_t(μ) ≤λ^2/η + G^2/(1-α)ση(τ-1) + G^2/2(1-α)^2ση, where the project function μ-μ_t _γ^2 is σ-strongly convex. Next we prove the inequality in Equation (<ref>). According to the Theorem 1 in  <cit.>, we have 𝐠_t _2^2 = (1-α)∑_s=1^tα^t-s(𝐠_s)_2^2 ≤ G^2, and ∑_t=1^τw_t(μ_t) - w_t(μ) ≤μ_t-μ_0_γ^2^2/η + G^2/(1-α)ση(τ-1) + G^2/2(1-α)^2ση, ∀μ. Assuming there exists H>0, s.t. μ_t-μ_0_γ^2^2≤ H. According to the Cauchy-Schwarz' inequality. The results follows. Let M=H/η + G^2/(1-α)ση(T-1) + G^2/2(1-α)^2ση. We now choose a proper μ, s.t. the complementary stackness can be further bounded. For μ = μ̂ + θ, where θ∈ℝ^|P| is non-negative to be determined later and μ̂ = _μ-μ^⊤(∑_i=1^T𝐀^⊤𝐱_t)/λ. According to the constraint 𝐞 = ∑_i=1^T𝐀^⊤𝐱_t, we have that ∑_t=1^T(r(𝐞_t) + μ^⊤𝐞_tλ) ≤ r^*(-μ̂) = r(∑_i=1^T𝐀^⊤𝐱_t) + μ̂^T(∑_i=1^T𝐀^⊤𝐱_t)/λ. Note that in proof of Theorem <ref>, the feasible region 𝒟 is recession cone, therefore, μ∈𝒟. Therefore, we have ∑_t=1^τw_t(μ_t) = ∑_t=1^Tw_t(μ̂) - ∑_t=τ+1^Tw_t(μ̂) + ∑_t=1^τw_t(θ) + M. Put them together: Under the max-min fair, we obtain that W_OPT = τ/TW_OPT + T-τ/TW_OPT≤τ W_Dual(μ_τ) + (T-τ)(K+λr̅). Therefore, combining Eq. (10,12,13) the regret Regret(h) can be bounded as: Regret(h) = 𝔼[W_OPT-W] ≤𝔼[W_OPT-∑_t=1^τ(g(𝐱_t)/T - λ r(𝐀^⊤𝐱_t/γ))] ≤𝔼[W_OPT-τ W_Dual(μ_t) + ∑_t=1^τw_t(μ_t) + ∑_t=1^T(𝐞_t-𝐀^⊤𝐱_t)] ≤𝔼[(T-τ)(K+λr̅)+∑_t=1^Tw_t(μ̂) + ∑_t=1^τw_t(θ)] + M ≤ (T-τ)(K+λr̅+λ K) + ∑_t=1^τw_t(θ) + M. Let C = K+λr̅+λ K, then setting the θ = Cmin_p γ_p𝐮_p, where 𝐮_p is the p-th unit vector. We have ∑_t=1^τw_t(θ) = C/(min_p γ_p) - C(T-τ). Then the Regret(h)≤ M + C/(min_p γ_p), when we set η = O(T^-1/2), the Regret(h) is comparable with O(T^1/2). The result follows. §.§ Algorithm for Min-reguarlizer In this section, we proposed a heuristic method for provider MMF online application, named Min-reguarlizer. It has a regularizer that measures the exposure gaps between the target provider and the worst-providers. The detailed algorithm is shown in Algorithm <ref>. The notations are the same as P-MMF in Algorithm <ref>.
http://arxiv.org/abs/2303.07167v1
20230313151030
I Don't Care Anymore: Identifying the Onset of Careless Responding
[ "Max Welz", "Andreas Alfons" ]
stat.ME
[ "stat.ME", "stat.AP", "stat.ML" ]
Hybrid Kinetic/Fluid numerical method for the Vlasov-Poisson-BGK equation in the diffusive scaling Tino Laidin 1 Thomas Rey1 March 30, 2023 ================================================================================================== Questionnaires in the behavioral and organizational sciences tend to be lengthy: survey measures comprising hundreds of items are the norm rather than the exception. However, recent literature suggests that the longer a questionnaire takes, the higher the probability that participants lose interest and start responding carelessly. Consequently, in long surveys a large number of participants may engage in careless responding, posing a major threat to internal validity. We propose a novel method to identify the onset of careless responding (or an absence thereof) for each participant. Specifically, our method is based on combined measurements of up to three dimensions in which carelessness may manifest (inconsistency, invariability, fast responding). Since a structural break in either dimension is potentially indicative of carelessness, our method searches for evidence for changepoints along the three dimensions. Our method is highly flexible, based on machine learning, and provides statistical guarantees on its performance. In simulation experiments, we find that it achieves high reliability in correctly identifying carelessness onset, discriminates well between careless and attentive respondents, and can capture a wide variety of careless response styles, even in datasets with an overwhelming presence of carelessness. In addition, we empirically validate our method on a Big 5 measurement. Furthermore, we provide freely available software in to enhance accessibility and adoption by empirical researchers. Keywords: Survey Methodology, Careless Responding, Response Styles, Changepoint Detection, Machine Learning § INTRODUCTION Research in the behavioral and organizational sciences often involves the administration of lengthy self-report questionnaires. For instance, common personality measures tend to consist of hundreds of items, such as the Revised NEO Personality Inventory <cit.> with 240 items or the Minnesota Multiphasic Personality Inventory-2 Restructured Form <cit.> with 338 items. Even if one does not use such extensive measures, the number of items can easily reach three digits by including several shorter measures. However, recent work suggests that questionnaire length can have a concerning adverse effect on measurement accuracy: Questionnaire participants may experience fatigue or boredom as they progress through a lengthy questionnaire, which can provoke careless responding <cit.>. We call such participants partially careless respondents as they initially provide accurate responses, but resort to careless responding after a certain item and remain careless for the remainder of the questionnaire.[Partially careless responding is similar to what <cit.> call “partial random responding”.] Careless responding has been identified as a major threat to the validity of research findings <cit.>, is suspected to be present in all survey data <cit.>, and already small proportions of careless respondents such as 5% can jeopardize validity <cit.>. Questionnaire data should therefore be screened for respondents who engage in careless responding with the intention to exclude such respondents from primary analyses <cit.>. Yet, in lengthy questionnaires, it is likely that many participants eventually starts to respond carelessly due to fatigue or boredom <cit.>. It follows that in sufficiently lengthy questionnaires, a possibly large proportion of all participants are partially careless respondents. Thus, screening for and excluding respondents who have engaged in careless responding may lead to the exclusion of an unacceptably large proportion of the sample. For instance, <cit.> stress that “in many cases, by doing so the available sample size may be decreased dramatically, by 50% or more.” Screening data for careless responding is typically viewed as a data preprocessing step. Notwithstanding, explicitly studying careless responding may reveal interesting insights about the study participants. Indeed, <cit.>, <cit.>, and <cit.> find evidence that careless responding is related to certain personality traits. Hence, we stress that investigating partial carelessness is not only relevant as a methodological concern, but also as a valuable source of information that may help advance behavioral and organizational theory. For instance, if one views careless respondents as outliers, one may follow the guidelines of <cit.> for theory-building in organizational research. In this paper, we introduce a novel method for identifying the item after which carelessness onsets in each questionnaire participant, or an absence thereof. Our method combines multiple dimensions of evidence in favor (or against) careless responding to construct a score that, for each item, measures if a given respondent has started responding carelessly by that item. More specifically, our score is a test statistic based on self-normalization, which is used for changepoint detection in multidimensional series <cit.>. We argue that the notion of a changepoint is intuitive when studying partial carelessness: Once a participant starts responding carelessly, we expect a structural break in their responses. In particular, such a respondent may abandon content-based responding and resort to careless response styles, while no such break occurs in the absence of carelessness. Our method is highly flexible as it does not assume a statistical model, nor does it predefine what types of careless response styles exist, and it is primarily intended for lengthy multi-scale surveys. We demonstrate the empirical power, reliability, and practical usefulness of our method by means of extensive simulation experiments as well as an empirical application. To the best of our knowledge, our method is the first attempt to systematically detect the onset of careless responding and contributes to the literature by being able to segment the responses of each respondent into a segment of accurate responses and—if a changepoint was identified—a segment of careless responses. With this knowledge, researchers can restrict their primary analyses to the segments of accurate responses without having to discard all responses of a partially careless respondent. In addition, researchers can separately study the segments of careless responses to build theory on and obtain better understanding of the nature of (partially) careless responding. Finally, we provide freely available software that implements our proposed method in . As such, our novel method is a useful and accessible tool for any researcher who is concerned with survey fatigue or careless responding in general. § CARELESS RESPONDING IN THE EMPIRICAL LITERATURE <cit.> define careless responding as “a response set in which the respondent answers a survey measure with low or little motivation to comply with survey instructions, correctly interpret item content, and provide accurate responses”.[In their definition, <cit.> referred to careless responding as insufficient effort responding. Other synonyms are participant inattention <cit.>, inconsistent responding <cit.>, protocol invalidity <cit.>, and random responding <cit.>. Notably, <cit.> point out that the latter—random responding—might be a misnomer since careless responding can also be characterized by some non-random pattern (e.g., a recurring sequence of 1-2-3-4-5).] There is a rich literature on theory and effects of careless responding, as well as the prevention and detection of careless respondents. We refer to <cit.>, <cit.>, and <cit.> for recent literature reviews and best practice recommendations. To briefly summarize the literature, careless responding is found to be widely prevalent <cit.> and the proportion of careless respondents in a sample is commonly estimated to be 10–15% <cit.>, although some estimates range from 3.5% <cit.> to 46% <cit.>. Even a small proportion of careless respondents of 5–10% can jeopardize the validity of a survey measure through a variety of psychometric issues <cit.>. For instance, careless responding can lead to lower scale reliability, produce spurious variability, deteriorate the fit of statistical models, and cause type I or type II errors in hypothesis testing <cit.>. It is therefore recommended to carefully screen survey data for the presence of careless responding <cit.>. Numerous methods have been proposed to identify participants who engage in careless responding, for instance consistency indicators such as psychometric synonyms <cit.>, longstring indices <cit.>, or multivariate outlier analyses <cit.>. More recently, <cit.> and <cit.> have proposed machine learning techniques. Another method for the detection of careless responding is the inclusion of detection items <cit.>. Such detection items are based on the presumption that an attentive respondent will respond in a specific way, while careless respondent may fail to do so.[For instance, it is expected that an attentive respondent would strongly disagree to so-called bogus items such as “I am paid biweekly by leprechauns” <cit.>. A careless respondent may accidentally “agree” to this item as a consequence of inattention. Alternative types of detection items are instructed items and self-report items <cit.>.] We discuss detection items and preventive measures against carelessness in detail in Section <ref>. Detailed overviews of common methods for the detection of careless responses along their individual strengths and weaknesses are provided in Table 1 in <cit.>, Table 1 in <cit.>, <cit.>, and <cit.>. In general, common detection methods are designed to detect one careless response style. For instance, the longstring index of <cit.> counts the maximum number of consecutive identical responses, which is intended to capture straightlining behavior. Yet, careless responding may manifest in three distinct ways: inconsistency, invariability, and fast responses <cit.>, which allows one to classify a given detection method based on the type of careless responding it is designed to detect <cit.>. One may then combine multiple methods to capture different types of carelessness, which is a practice recommended by <cit.>, <cit.>, <cit.>, and <cit.> to balance strengths and weaknesses of the individual methods. However, <cit.> deem it rare that careless respondents respond carelessly from the beginning to the end of a survey. Instead, participants may begin a survey as attentive and truthful respondents, but may resort to careless responding due to fatigue or boredom as a lengthy survey progresses <cit.>. Indeed, there is substantial evidence that the probability that a participant becomes careless increases with the number of survey items <cit.>. It follows that there is a high likelihood that a large number of participants are partially careless respondents in lengthy surveys that may comprise hundreds of items. We therefore assume for the remainder of this paper that all participants begin a survey as attentive and accurate respondents, while some of them (possibly none or all) resort to careless responding from a certain item onward.[We discuss possible violations of this assumption in Section <ref>.] The item at which carelessness onsets may differ between participants. Common methods for the detection of careless respondents are intended for detecting which participants have engaged in careless responding, but not when a given participant becomes careless (provided they become careless at all). To the best of our knowledge, our proposed method is the first one to explicitly aim at detecting the onset of careless responding for each participant (or an absence thereof). Our method is designed for long surveys that encompass hundreds of items, in which it is possible that a substantial proportion of the participants (or even all) are partially careless. The work that is perhaps closest to ours is that of <cit.>, which is also concerned with changepoints in item response data due to careless responding. However, our method differs to that <cit.> in three fundamental aspects. First, <cit.> aim at detecting changepoints in parameters of item response models, while we do not assume such models. Second, their method is is restricted to questionnaires measuring one single construct, while our method is designed for lengthy multi-construct questionnaires that are common in the behavioral and organizational sciences. Third, their focus is on detecting careless respondents instead of the onset of carelessness. § METHODOLOGY We expect the onset of careless responding to manifest in changes in a respondent's behavior. Specifically, we expect careless responding to result in a change in at least one of the three dimensions that <cit.> identify as indicative of carelessness: First, internal consistency of the given responses; second, variability of the given responses; and third, response time. For each respondent's given responses and response times, our method searches for a joint changepoint along these three dimensions. We measure the first dimension, internal consistency, by means of reconstructions of observed responses. The reconstructions are generated by an auto-associative neural network (henceforth autoencoder; <cit.> that is designed to learn response patterns that characterize attentive responding. We expect that random content-independent responses cannot be learned well and are therefore poorly reconstructed by the autoencoder, leading to a changepoint in reconstruction performance. We propose to measure the second dimension, response variability, by means of a novel algorithm that is inspired by the longstring index of <cit.>. Since long sequences of identical responses or constant response patterns are not expected in surveys that use positively and negatively coded items, we expect a changepoint in response variability once a respondent commences to respond carelessly through straightlining or pattern responding behavior. Finally, the third dimension, response time, measures the time a respondent has spent on each page of the survey or the time spent on each item. <cit.> find evidence that careless responding is associated with shorter per-page response times, meaning that we expect a changepoint in response time once carelessness onsets. Overall, our method attempts to capture evidence for the onset of carelessness by combining three indicators that are potentially indicative of such an onset, where the different indicators are supposed to capture different manifestations of carelessness. Conversely, if a respondent never becomes careless, we do not expect a changepoint in either of the three dimensions. Combining multiple indicators is a generally recommended practice to capture various types of careless responding <cit.>. We provide a detailed description of our assumptions in Appendix <ref> and a technical definition of our method in Appendix <ref>. In the following, we describe in detail each of the three dimensions we consider. §.§ Quantifying Internal Consistency With Autoencoders <cit.> describe internal consistency as patterns that are expected based on theoretical/logical grounds or trends in the data. For instance, items that are part of the same construct are expected to correlate highly in most participants, provided that participants are attentive. In contrast, inconsistent careless responding “generate[s] responses that fail to meet an expected level of consistency” <cit.>. Respondents may choose to engage in inconsistent careless responding if they attempt to conceal their carelessness, for instance by randomly choosing from all response options or randomly choosing responses near the scale midpoint <cit.>. For our purposes, we consider the defining characteristic of inconsistent careless responding to be content-independent responses that are randomly chosen from all response options, where the probability to choose a certain response option may differ between response options, such as preferring responses near the scale midpoint. In order to identify inconsistent careless responding, we propose to use the machine learning method of autoencoders <cit.>. Autoenocoders were originally developed to filter random noise in signal processing applications <cit.>. Since we consider the defining characteristic of inconsistent careless responding to be near-randomly chosen responses—which may be viewed as random noise—we expect autoencoders to perform well in filtering such responses. An autoencoder is a neural network that attempts to reconstruct its input.[For excellent textbooks on neural networks, we refer the interested reader to <cit.> and <cit.>.] In other words, the output variables are equal to the input variables. The idea behind reconstructing input data is to learn the internal structures of the data by forcing the network to discern signal from random noise. Consequently, noisy data points that do not follow learned structures are expected to not be well-reconstructible. In this paper's context of careless responding in questionnaire data, noisy data points correspond to inconsistent careless responses, which are characterized by content-independent randomness. To achieve the goal of learning the internal structures of a dataset, it is crucial to avoid that an autoencoder simply copies its input. Therefore, autoencoders are typically forced to learn to express the input data in terms of a representation of lower dimension than the input data (cf. , and Chapter 14.6 in ). When expressing data in a lower dimension, some information loss is inevitable. The rationale behind autoencoders is that the incurred information loss can be seen as filtered noise, while the retained information in the lower-dimensional representation is the signal contained in the input data. Hence, by compressing data in fewer dimensions, the autoencoder learns the internal structure of the input data (the signal), while filtering random noise. The autoencoder then uses the (primarily) noiseless lower-dimensional representation to reconstruct the input data. It follows that noiseless data points are expected to have a low reconstruction error—which is the difference between observed and reconstructed input—while data points that primarily consist of noise are likely to have a relatively high reconstruction error. Overall, autoencoders are characterized by compressing and then reconstructing input data, which is referred to as compression-decompression structure. It follows that an autoencoder can be seen as a dimension reduction technique due to the role of compressing information to a lower dimension. In fact, autoencoders are a nonlinear generalization of principal component analysis <cit.>. The compression-decompression structure is reflected in the autoencoder's architecture, for which Figure <ref> provides a schematic example. Concretely, an autoencoder is a fully connected network whose nodes are organized in five layers, namely an input, a mapping, a bottleneck, and an output layer. The input layer holds the data we wish to reconstruct and comprises as many nodes as the data have dimensions. The subsequent mapping layer is designed to be flexible by comprising many nodes and is intended to prepare the compression, which takes place in the successive bottleneck layer in the center of the network. The central bottleneck layer comprises less nodes than the dimension of the input data, resulting in the sought low-dimensional representation of the input. The following de-mapping layer is symmetric to the mapping layer and reconstructs the input data based on the low-dimensional representation. Finally, the output layer returns the reconstructed data, which are necessarily of the same dimension as the input data in the input layer. In this paper's context, the data we wish to reconstruct are participant responses to a rating-scale questionnaire. Correspondingly, the dimension of the data equals the number of items in the questionnaire. Typically, questionnaires comprise a number of constructs that the items are supposed to measure. The fact that a questionnaire measures multiple constructs gives rise to a lower-dimensional representation of the observed responses, which renders the application of an autoencoder natural for dimension reduction. We therefore recommend to specify the number of nodes in the bottleneck layer to be equal to the number of constructs the questionnaire at hand measures.[Choosing the number of nodes in the bottleneck layer is equivalent to choosing the number of retained principal components in PCA, since both actions govern the strength of information compression through dimension reduction.] Consider the following illustrative example: The Revised NEO Personality Inventory measure <cit.> contains 240 items and measures six subcategories (called facets) of each Big 5 personality trait, such as anxiety and modesty. Thus, it measures 6 × 5 = 30 underlying variables (the facets), which suggests that a lower-dimensional representation measures the 30 facets and is therefore of dimension 30. It follows that we would set the number of nodes in the autoencoder's bottleneck layers to 30. Furthermore, our autoencoder can be extended to incorporate information on page membership of each item through so-called group lasso regularization (see Appendix <ref> for details). This information may be of value because careless responding behavior is possibly similar within each page, but may differ between pages. However, incorporating information on page membership is optional, and the method can be used without providing such information. Besides the number of nodes in the bottleneck layer and possibly page membership of items, there are numerous additional design choices in our autoencoder, such as the number of nodes in the mapping and de-mapping layer or the choice of transformation functions. We disuses these and provide practical recommendations for each choice in Appendix <ref>. Furthermore, Appendix <ref> provides a mathematical definition of autoencoders. Suppose now that we have obtained autoencoder reconstructions of the responses of each questionnaire participant. To introduce some notation, let there be n participants and p items and denote by x_ij the observed rating-scale response of the i-th participant to the j-th item, i=1,…,n and j=1,…, p. Denote by x_ij the autoencoder's reconstruction of the observed response x_ij. We define the reconstruction error _ij associated with participant i's response to item j to be the squared difference between reconstructed and observed response, scaled by the number of answer categories. Formally, for participants i=1,…,n, and items j=1,…,p, _ij = (x_ij - x_ij/L_j)^2, where L_j denotes the number of answer categories of item j. Recall that we expect the reconstruction errors _ij to be low in the absence of careless responding and high in the presence of inconsistent careless responding. Hence, if participant i starts providing inconsistent careless responses at item k∈{1,…,p}, we expect a changepoint at position k in the participant's series of p reconstruction errors, as reconstruction errors are expected to be higher from item k onward. An example can be found in top plot in Figure <ref>. §.§ Quantifying Invariability We propose to measure response invariability through a novel algorithm inspired by the longstring index of <cit.> that we call . Our proposed exploits that invariable careless responses are characterized by content-independent response patterns. A pattern sequence has the defining property that it consists of recurring occurrences of the same response pattern. Consider the following sequence of responses: 1-2-1-2-1-2. In this sequence, there are recurring occurrences of the pattern 1-2. This pattern is of length two since each individual occurrence thereof comprises two items. We denote by J the number of items an individual pattern comprises (that is, the pattern's length). In the previous example (<ref>), we have J=2. Analogously, a sequence 1-2-3-1-2-3 consists of recurring occurrences of a pattern 1-2-3 of length J=3, whereas a straightlining sequence 1-1-1-1 consists of recurring occurrences of “1”, which is a pattern of length J=1. For a pattern of length J, assigns to each participant's response the number of consecutive items contained in the recurring pattern that the response is part of. Consider the following two illustrative examples. First, if J=2, the response sequence 1-2-1-2-1-4-3-5-4-5-4 will be assigned the sequence 4-4-4-4-1-1-1-4-4-4-4 because the first four responses and last four responses comprise two occurrences of the distinct patterns 1-2 and 5-4, respectively, which are both of length J=2. The central three responses (1-4-3) are not part of any pattern of length J=2, hence they are each assigned the value “1”. It follows that high values of the sequence are indicative of invariable careless responding characterized by patterns. Second, for a pattern comprising a single item, J=1 (i.e. consecutive identical responses), the response sequence 3-2-3-3-1-4-1-1-1 is assigned the sequence 1-1-2-2-1-1-3-3-3, since the subsequences of consecutive identical responses 3-3 and 1-1-1 comprise two and three responses, respectively.[ generalizes the longstring index of <cit.>, which we recover by calculating for J=1 and picking out its maximum value.] Both examples demonstrate that once invariable carelessness onsets, we can expect a changepoint in sequences from relatively low to relatively high values. However, a sequence crucially depends on the choice of pattern length J, which is restrictive since invariable careless respondents may choose widely different patterns. Consequently, a single choice of pattern length J is unlikely to capture all careless response patterns that may emerge. To tackle the issue of choosing an appropriate value for pattern length J, we propose to calculate a sequence multiple times with varying choices of J, namely J=1,2,…,L_max, where L_max is the maximum number of answer categories an item in the survey can have. The rationale behind this choice is that we consider it unlikely that careless respondents choose complicated individual patterns whose length exceeds the number of answer categories. In addition, evaluating a sequence for multiple pattern lengths is expected to capture a wide variety of careless response patterns instead of only capturing patterns associated with one single pattern length. Then, after calculating sequences with various choices of J, we recommend for each response to retain the largest sequence value that has been assigned to the response across the multiple computations of an sequence. We call this adaptive procedure and use its ensuing sequence as our final quantitative measure of invariable careless responding. For the same reason as for , we expect a changepoint in once carelessness onsets. We provide a detailed description of and in the Appendix (Algorithms <ref> and <ref>, respectively). An example of can be found in the central plot of Figure <ref>. §.§ Response Time The last dimension considered indicative of careless responding is response time. Response time is typically measured by the total time a participant spent on the questionnaire, time spent on each questionnaire page, or (less common) time spent on each questionnaire item. Following <cit.>, we propose to measure response time via the time a participant spends on each page of a questionnaire. Specifically, we assign to each participant's response the time (in seconds) they spent on the page on which the response is located, divided by the number of items on that page (e.g., bottom panel in Figure <ref>). Once careless responding onsets, we expect a changepoint in response time towards faster responses <cit.>. For instance, <cit.> and <cit.> propose to classify a response as careless if a participant has spent less than two seconds on it (calculated based on per-page response time divided by the number of items on each page). In contrast, our approach only requires a changepoint in response time and does not require specifying a threshold below which we classify a response time as being associated with carelessness. §.§ Identifying Carelessness Onset via Changepoint Detection For each participant, we can obtain up to three individual series of length equal to the survey's total number of items. Each individual series measures one of the three dimensions indicative of carelessness. Specifically, the three dimensions are the reconstruction errors in (<ref>), an sequence, and response time. It may be preferable to have all three dimensions available for each participant, but our proposed method can also be applied to single dimensions or two dimensions, for instance when response times cannot be measured. For now, we assume that all three dimensions can be measured and are collected in a three-dimensional series. As motivated in the previous two sections, we expect changepoints in each dimension from the onset of careless responding (e.g., Figure <ref>), and no changepoint in the absence of carelessness. Therefore, we propose to use a statistical method designed for the detection of a single changepoint in a multidimensional series. Concretely, we propose to use the nonparametric cumulative sum self-normalization test of <cit.>, which searches for the location of a possible changepoint in a multivariate series and derives a corresponding statistical test. This test has attractive theoretical guarantees that are derived in <cit.> and <cit.>. The changepoint detection method of <cit.> calculates the value of a certain test statistic for each multidimensional element in a given series. If the maximum value of the test statistic exceeds a specific critical value, the method flags a changepoint located at the associated element. If the critical value is never exceeded, no changepoint is flagged. The the critical value is implied by the choice of the significance level of the test. Following <cit.>, we recommend an extraordinarily low significance level of 0.1% so that the test becomes extremely conservative in flagging changepoints. Our extremely conservative approach is consonant with the literature, as there should be overwhelming evidence in favor of careless responding when labeling respondents as such <cit.>. We provide a detailed description of the method of <cit.> in Appendix <ref>. In practice, we apply this method to each participant's individual three-dimensional series to locate the onset of carelessness (or an absence thereof) for each participant. As an example, Figure <ref> shows a series of per-response test statistics associated with a three-dimensional series in Figure <ref>, and the corresponding (simulated) respondent becomes careless after the 276th of 300 items (content-independent pattern responding). Indeed, the maximum test statistic occurs at the 276th item and the maximum value exceeds the critical value at significance level 0.1% so the test flags a changepoint at this item. § SIMULATION EXPERIMENTS §.§ Data Generation We demonstrate our proposed method on simulated data inspired by existing survey measures and empirical findings on careless responding. For this purpose, we generate rating-scale responses of n=500 respondents to p=300 items using the package <cit.>. Each item has five Likert-type answer categories (anchored by 1 = “strongly disagree” and 5 = “strongly agree”) whose probability distribution can be found in Table <ref>. The p=300 items comprise 15 constructs, each of which are measured through 20 items (of which 10 are reverse-worded), resulting in the aforementioned 15× 20 = 300 items. We assume that there are 15 pages of 20 items each and that each participant is presented with the same randomly ordered set of p=300 items. We simulate construct reliability by imposing that items from different constructs are mutually independent and items within a construct have a correlation coefficient of ± 0.7. Each construct has a Cronbach-α value of 0.979 on the population level and is therefore highly reliable in the absence of carelessness. We simulate per-item response times (in seconds) of attentive respondents as draws from a Weibull distribution with scale and shape parameters equal to six and two, respectively. This results in an expected per-item response time of about 5.3 seconds, which is based on data in <cit.>. The blue line in Figure <ref> illustrates the distribution of these response times. We then calculate the total time a participant spends on each page of the simulated survey, divided by the number of items on each page, and use the ensuing per-page response times for the response time dimension. Of the n=500 respondents, we fix a (relative) prevalence of partially careless respondents of γ∈{0, 0.2, 0.4, 0.6, 0.8, 1}. For the selected partially careless respondents, we sample carelessness onset items, from which on all responses are careless. We sample onset items as draws—rounded to the nearest integer—from a three-parameter Weibull distribution with location, scale, and shape parameters equal to 240, 20, and 2.2, respectively. We visualize this distribution in Figure <ref>. For instance, this design postulates a probability of about 90% that carelessness onsets before having answered 90% of all items, which reflects estimates in Table 6 in <cit.> for ordinary surveys with 300 items. We introduce carelessness by replacing with careless responses all responses that come after the sampled carelessness onset item, including the onset item itself. We simulate the following four different types of careless responses that each reflect careless response styles. First, random responding <cit.>, which is characterized by choosing answer categories completely at random. Second, straightlining, which is characterized by constantly choosing the same, randomly determined answer category. This response style is a special case of aquiescence due to carelessness <cit.>. Third, pattern responding <cit.>, which is characterized by a fixed, randomly determined pattern, such as 1-2-3-1-2-3 or 5-4-5-4. Fourth, extreme responding due to carelessness <cit.>, which is characterized by randomly choosing between the two most extreme answer categories, regardless of item content. In addition to these four careless response styles, we also consider the case of fully attentive responding. This reflects respondents who never becomes careless; we call such respondents attentive. Recall that we consider carelessness prevalence levels γ∈{0,0.2,…,1}, which implies that (1-γ)n respondents never become careless. In each dataset that includes careless responding, we ensure that all four careless response styles as well as fully attentive respondents are present. To achieve this, we assign to each of the γ n partially careless respondents one of the four careless response styles so that there are γ n / 4 partially careless respondents who adhere to that particular response style from their corresponding carelessness onset item onward. We determine at random which respondents are partially careless and which ones are attentive. Like the given responses, we introduce carelessness to the response times by replacing all per-item response times from the carelessness onset item onward with draws from a Weibull distribution of unit shape and scale equal two; see Figure <ref>. This distribution implies an average careless response time of two seconds per item, which is based on the “two-seconds-per-item” rule of <cit.> and <cit.>. We again calculate the per-page response times from the per-item times and use the per-page times for the response time dimension. We repeat the above described data generating process 100 times. Importantly, we keep the location of carelessness onset of each participant constant across the 100 repetitions. This will be useful for performance assessment. We apply our proposed method to each dataset and report the estimated location of each flagged changepoint. We search for changepoints in all seven possible combinations of the three dimensions (reconstruction error, , per-page response time) via the changepoint detection method of <cit.>. We report the results of the following four cases that are of primary interest: all three dimensions, the two dimensions of reconstruction errors and sequences that remain when excluding response time (since measuring time may not be feasible in pen-and-paper questionnaires), and the two separate individual dimensions thereof. This separation will help highlight the added value of combining different indicators of carelessness in the hope of capturing different manifestations thereof. §.§ Performance Measures We wish to quantify the accuracy of the location of each flagged changepoint. For this purpose, we use the Adjusted Rand Index <cit.>. The ARI is a continuous measure of classification performance and takes value 0 for random classification and value 1 for perfect classification. In wake of this, we take the perspective of viewing the detection of carelessness onset as classification problem: For each item, a simulated respondent either responds attentively or carelessly. Using the true location of changepoints (the carelessness onset items), the ARI measures how well our method has estimated the location of carelessness onset of a given respondent. Specifically, the closer the ARI is to its maximum value 1, the better our method performs at accurately estimating carelessness onset. ARI values close to 0 indicate poor performance. If the respondent of interest is attentive and there are consequently no careless responses, then the ARI assumes value 0 if a changepoint is flagged. We provide a mathematical definition of the ARI in Appendix <ref>. We average the ARIs of multiple respondents (either all respondents or subgroups thereof) and report the resulting average. Note that when averaging over ARIs calculated on attentive respondents, we obtain the proportion of attentive respondents who are correctly identified as attentive. If we deduct this number from 1, we obtain the proportion of attentive respondents that are incorrectly flagged as careless. §.§ Results We start presenting the results of our proposed method for the three dimensions by means of a visual inspection. For a carelessness prevalence level of γ = 0.6, Figure <ref> displays a heatmap holding the indices of the participants in its rows and the item indices in its columns. For participant i ∈{1,…,n} and item j∈{1,…,p}, the color scale of the cell at position (i,j) measures the frequency across the 100 repetitions with which the response of participant i to item j has been flagged as changepoint: The darker the red scale, the more frequently the corresponding item was flagged as changepoint. The blue rectangles in Figure <ref> visualize the true location of the careless onset items; recall that those are fixed across the repetitions. The y-axis of the plot is rearranged so that the participant indices are ordered according to their respective carelessness onset. Since the carelessness onset items stay constant across the repetitions, a good detection performance is characterized by flagging cells that correspond to onset items. Indeed, we can see that there is a dark red band that closely follows the blue rectangles. This means that our method accurately estimated the location of carelessness onset of the participants. Note that the top 40% of the rows in Figure <ref> very rarely see flagged changepoints. Those are the respondents who never become careless. Based on this visual example, our method seems to not only accurately estimate the careless onset, but also discriminate well between partially careless respondents and fully attentive respondents. Results are similar for other carelessness prevalence levels, and we provide corresponding heatmaps in Appendix <ref>. Varying the prevalence of careless responding, Figure <ref> visualizes the ARI averaged over all attentive respondents (left panel) and all partially careless respondents (right panel). In the left panel of Figure <ref>, each of the four specifications rarely flag changepoints in fully attentive respondents, even in samples where carelessness is extremely prominent (80% prevalence). For instance, for carelessness prevalence of up to 60%, the proportion of incorrectly flagged changepoints in attentive respondents is less than 0.01. Only when carelessness prevalence is extremely high at 80%, the proportion of false positives slightly increases to about 0.05 for each specification (except , which remains below 0.01). The right panel in Figure <ref> visualizes the ARI when averaged over partially careless respondents. The ARI of our proposed method with the three dimensions remains remarkably constant at about 0.95 throughout carelessness prevalence levels, mirroring an excellent performance of flagging changepoints in correct locations. Notably, excluding the time dimension results in only a relatively small decrease in ARI. This may be because in our data generation process, careless response times are faster for all types of careless responses. In contrast, when using solely autoencoder reconstruction errors or sequences, we observe a drop in ARI values to about 0.5 in high carelessness prevalence levels. This drop in performance is expected due to different careless response styles being present: Reconstruction errors are designed to capture inconsistent carelessness such as random responses and may therefore miss invariant carelessness, while sequences are designed for capturing invariant carelessness such as straightlining and may therefore miss inconsistent carelessness. To explore this further, Figure <ref> displays ARIs for each careless response style. As expected, using reconstruction errors to detect the onset of carelessness works well for inconsistent response styles such as random or extreme responding, resulting in ARI values of about 0.85–0.95 throughout all carelessness prevalence levels, but does not accurately capture invariable response styles (ARIs of less than 0.02). Conversely, using sequences works well for detecting invariable careless response styles such as straightlining or pattern responding (ARI of consistently about 0.95), but does not work for inconsistent carelessness (ARI of about 0–0.1). However, when combining and reconstruction errors (and possibly response time), we obtain high ARI values (0.85–0.99) throughout all considered careless response styles. We derive from this that our method succeeds in combining complimentary indicators for carelessness onset to capture different manifestations of careless responding. §.§ Additional Simulations and Conclusions We have conducted a wide variety of additional simulation experiments, which are described and discussed in Appendix <ref>. They suggest that our proposed method consistently performs well, even in substantially more complex designs, for instance when there is a large degree of response heterogeneity. However, in highly complex designs with overwhelmingly many careless respondents (prevalence of ≥ 80%), our method sometimes identifies changepoints in too many attentive respondents (more than a significance level of 0.1% would suggest). Since this issue only arises in specific situations and for extremely high carelessness prevalence, we leave addressing it to further research. Overall, the findings presented in the main text are representative, meaning that they are robust across distinct simulation designs. We conclude from our simulation experiments that our proposed method seems to perform well for reliably detecting carelessness onset, while simultaneously successfully discriminating between partially careless respondents and fully attentive respondents. In addition, our simulations highlight the importance of using multiple indicators to capture different manifestations of carelessness <cit.>. § EMPIRICAL VALIDATION A major challenge in the empirical validation of our method is that the onset of potential carelessness is unknown in empirical data, but such knowledge is required to evaluate the accuracy of our method in locating carelessness onset (or a lack thereof). We therefore employ the following validation strategy. We use a rich empirical dataset of high quality, in the sense that all scales are reliably measured and careless responding is absent. Such a dataset allows us to artificially introduce partially careless responses by replacing given responses with simulated careless ones. In the ensuing hybrid dataset, we can evaluate the performance of our method in a realistic data configuration, as opposed to the stylized data configuration from the simulations. For empirical validation, we consider empirical data for the five factor model of personality <cit.>. This model assumes that variation in a measurement of personality can be explained by the five personality traits (“factors”) of neuroticism, extraversion, agreeableness, openness, and conscientiousness, which are commonly referred to as the “Big 5”. A popular way of measuring the Big 5 is the NEO-PI-R instrument of <cit.>, which comprises 240 items that collectively measure six subdomains (“facets”) for each of the Big 5 factors (e.g., depression and anxiety are facets of the neuroticism trait), resulting in a measurement of 5× 6 = 30 facets. Each facet is measured with eight items, each of which is answered on a five-point Likert scale. Overall, this instrument measures 30 constructs (the facets). We use a dataset of <cit.>, who administered a Dutch translation of the NEO-PI-R instrument <cit.> to 500 first year psychology students at the University of Amsterdam in The Netherlands. The items of the instruments were presented in a random, but identical order to all participants and the dataset is publicly available in the package <cit.>. Unfortunately, the data only contain the students' responses, but no response times, so we restrict our analysis of careless responding to the two dimensions of autoencoder reconstruction errors and sequences. In addition, we do not have information on the page membership of each item, hence we do not include such information in the autoencoder architecture. Moreover, 175 of the 500× 240 = 120,000 total responses are not contained in the set of admissible answer categories {1,2,3,4,5} implied by five-point Likert scales, for instance values such as 3.31 or 4.03. Such inadmissible values may be due to prior imputation of missing responses or other data preprocessing. However, since there is no information on what kind of preprocessing was performed for those observations, we drop all students that have at least one inadmissible response, resulting in a final sample of n=400 students. In general, the dataset of <cit.> as provided by <cit.> seems to be of high quality as it appears to be carefully cleaned and preprocessed, all five factors are measured very reliably (indicated by Cronbach-α estimates of 0.92, 0.88, 0.85, 0.88, and 0.90 for neuroticism, extraversion, openness, agreeableness, and conscientiousness, respectively), and factor loadings align well with theory <cit.>. We consequently do not expect careless responding to be an issue in this dataset. Indeed, when applying our proposed method, a changepoint is only flagged in one of the 400 participants at a significance level of 0.1% (see Appendix <ref> for details). For empirical validation, we take a fixed number of students and from a certain item onward replace their given responses by synthetically generated careless responses. This results in a dataset comprising empirical attentive responses and synthetic careless responses. On this hybrid dataset, we can empirically validate our method since we have knowledge of the true onsets of careless responding. Concretely, of the n=400 students in the data of <cit.>, we fix the prevalence of to-be partially careless respondents to γ∈{0.2, 0.4, 0.6, 0.8, 1} and sample a carelessness onset item for each partially careless respondent. We replace the given responses from the onset item onward by synthetically generated careless responses. For each to-be careless respondent, we randomly sample the onset item to be between the 160th and 204th item, which respectively correspond to 66.7% and 85% of the 240 items. Like in the simulation setup of Section <ref>, we again consider the four careless response styles of random, extreme, pattern, and straightlining responding, each of which are set to be present in γ n/4 of all students. We again calculate the Adjusted Rand Index (ARI) of each student and average across the n students. We repeat this procedure 100 times, where we sample anew in each replication the to-be careless students, carelessness onsets, and careless respondents. We report the ARI averages across the repetitions. Figure <ref> visualizes the results at significance level 0.1%. Just like in the simulation experiments, almost no attentive respondents are incorrectly identified as careless. Conversely, for the careless respondents, using both dimensions of autoencoder reconstruction errors and results in ARI values of about 0.8 across all considered carelessness prevalence levels. Plotting ARIs by careless response styles reveals that onsets of straightlining or pattern carelessness are very accurately estimated when using both dimensions, with ARI values of more than 0.95. Likewise, the ARIs of careless extreme responding are consistently at about 0.85. The ARIs for random careless responding amount to about 0.4–0.45. A quick inspection reveals that they are due about half of the random respondents not being identified as careless (i.e., no changepoints), which may be due to the extremely conservative significance level. Indeed, increasing the significance level to 0.5% elevates the ARIs of random respondents to about 0.6 without significantly increasing the number of attentive respondents being incorrectly identified as careless. Further improvements are possible by slightly increasing the significance levels (see Appendix <ref>). However, the overall performance across all careless response styles is excellent with an ARI of about 0.8, and almost no attentive respondents are incorrectly identified as careless. We conclude that our proposed method performs very well on empirical data. Nevertheless, at extremely conservative significance levels, some random respondents may not be identified as careless. While this smaller drawback can be alleviated by choosing significance levels to be slightly less conservative (such as 0.5%), we still recommend to follow the literature by requiring overwhelming evidence in favor of carelessness to label respondents as (partially) careless <cit.>, and therefore maintain our suggestion to opt for a significance level of 0.1%. § ALTERNATIVES AND LIMITATIONS In this section, we discuss potential alternatives to our proposed method and its limitations. §.§ Potential Alternatives to Our Method In general, one may argue that the onset of carelessness can be detected by a priori including detection items in the survey: A survey designer may follow a recommendation of <cit.> and include at most three bogus, instructed, or self-report items and space them every 50–100 items. One may treat it as evidence of the onset of carelessness if a participant fails a detection item by not providing the response that would be expected from an attentive respondent. However, there are a number of practical and theoretical disadvantages with this approach.[A detailed discussion on the caveats of detection items can be found in <cit.>.] First, the recommendation that one should not include more than three detection items <cit.> is fairly restrictive as carelessness may have onset at a much earlier item than the detection item, resulting in a failure to exclude a potentially large number of careless responses. Second, attentive respondents may ironically choose a “wrong” response to a bogus item because they find doing so humorous <cit.> or they misinterpret the item <cit.>.[For instance, <cit.> find that some respondents would agree to the popular bogus item “All my friends say I would make a great poodle” because they believe that they are loyal friends and they associate loyalty with dogs.] Third, a careless respondent may choose the “correct” response by mere chance or lie in self-report items <cit.>, resulting in overlooking this careless respondent. Fourth, it is unclear if a “somewhat disagree” response to a detection item to which “strongly disagree” is expected should be considered careless <cit.>. Fifth, it may not be possible to include detection items in the survey for legal or ethical reasons, or the survey analyst has no control over the survey design. Moreover, the packages <cit.> and <cit.> support the calculation of an intra-individual variance (IRV) across subsets of responses.[Specifically, this is implemented in the functions in the package and in the package .] If sets of responses towards the end of a survey exhibit a sufficiently larger <cit.> or lower <cit.> variance than earlier sets of responses, there might evidence for an onset of partially careless responding. However, it would require the user to a priori know in which subsets of responses carelessness occurs in order to confirm the presence of partial carelessness in these subsets. In addition, it is unclear when a variance can be considered sufficiently low or high to infer carelessness: Determining cutoff values below or above which a participant is to be flagged as careless may depend on survey design and survey content.[For example, if 5-point scales are used a lower cutoff is necessary than for a 9-point scale, since IRVs will be very different for those scales.] Instead of detecting careless responding, one may attempt to prevent such behavior during survey administration. Preventive measures against careless responding may entail promising rewards for responding accurately <cit.>, threatening with punishment for careless responding, and the presence of a proctor <cit.>. There is evidence that each of these three preventive measures can prevent or at least delay carelessness onset <cit.>. However, either of these three preventive measures can be undesirable or unethical in practice: Administering proctored questionnaires is often impractical and expensive, and is typically infeasible in online studies. <cit.> and <cit.> advise against using threats if one wishes to maintain a positive long-term relationship with questionnaire participants, such as when there is a professional relationship between researcher and participants. In addition, threats seem inappropriate in longitudinal studies or when the participants are members of a questionnaire panel (as is common in survey research) or when they are suspected to suffer from anxiety, trauma, or depression (as is common in psychological research). On the other hand, promising rewards may cross ethical boundaries in organizational surveys and in the context of employment-related decisions <cit.>. Notwithstanding, we stress that preventive methods against carelessness are complementary to detection methods (such as ours) for the overarching goal of improving the reliability of collected questionnaire data. If possible and ethical, we recommend that survey designers take preventive measures against careless responding, include detection items, and—after questionnaire administration—analyze the data for the presence of careless responding through detection methods. As a result, one minimizes the probability that the analyzed data are plagued by (undetected) careless responding, thereby enhancing data quality and reliability. §.§ Limitations Throughout this paper, we have assumed that all participants start as truthful and accurate respondents, while some of them may begin to respond carelessly from a certain item onward. However, in certain scenarios, this assumption may not hold true. In the following, we discuss two such scenarios. First, there may be some participants who alternate between periods of accurate and careless responding <cit.>. In this case, our method may only flag one of the possibly multiple changepoints. Extending our method to this situation is an area of further research. Second, some respondents may respond carelessly throughout all survey items. Consequently, our method is unlikely to flag a changepoint since there is no change in behavior. This is clearly undesirable because we would like to identify all participants who have engaged in careless responding. Nevertheless, there is a plethora of established methods for detecting respondents who have been careless throughout the survey (see Section <ref>). In this sense, our method—which is intended for detecting partial carelessness—is complementary to existing methods that are intended for detecting respondents that have been careless throughout all items. Consequently, if one suspects that respondents who have been careless throughout all items are present, we recommend to apply established detection methods following the guidelines of <cit.> and <cit.>. Participants which are flagged as careless by these methods, but for which no changepoint was flagged by our method have likely been careless throughout the entire survey. Response time is one of the three dimensions along which our proposed method may search for changepoints. However, in some series of response times, it is possible that there could be “natural” structural breaks due to survey design: For instance, items that naturally take longer to respond to due to higher complexity or length might be placed in the beginning or end of a questionnaire. If the structural break is very pronounced, it may happen that our method identifies a changepoint at this break despite an evidence of carelessness in other dimensions. Studying this issue is left to further research. Moreover, the changepoint detection procedure of <cit.> is based on asymptotic arguments when the number of items is large, hence our method is designed for lengthy questionnaires. It is likely that the statistical power to identify carelessness onset drops considerably in short questionnaires, but studying this is beyond the scope of this paper. However, partial careless responding due to fatigue may be less prevalent in short questionnaires <cit.>. § COMPUTATIONAL DETAILS Throughout this paper, we have followed recent guidelines by <cit.> on the application of machine learning methods for the detection of careless responding. In particular, an implementation of our proposed method is publicly available from <https://github.com/mwelz/carelessonset>. We will develop this code into an package to be submitted to the Comprehensive Archive Network (<https://cran.r-project.org/>). § DISCUSSION AND FUTURE RESEARCH In this paper, we have proposed a method to identify the onset of careless responding (or absence thereof) for each participant in a given survey. Our method is based on recent literature stressing that in lengthy surveys—which are common in the behavioral and organizational sciences—a large proportion of survey participants may respond partially carelessly due to fatigue or boredom. Our method combines three indicators for the potential onset of carelessness and simulation experiments highlight the importance of evidence from multiple indicators that capture different manifestations of carelessness for obtaining reliable estimates for the onset. Due to our method's promising performance on empirical and synthetic data, we consider it a promising first step for research on partially careless responding. For instance, the algorithm may need additional validation as a measurement of response invariability, which could be done in empirical follow-up work. Moreover, <cit.> envisage “artificial intelligence and machine learning being used to detect careless responding and response distortion in real time in the foreseeable future." We believe that it is possible to train our autoencoder on responses from many different surveys so that it does not need to be re-fitted on every survey. With such a trained autoencoder, we could build reconstruction errors in real time and use them together with live measurements of response time and to detect the onset of careless responding in real time. Nevertheless, detecting changepoints in real time may require the use of a different changepoint detection method that is designed to detect changepoints as soon as they happen. Such methods are called online changepoint detection methods; an overview of which is provided in <cit.> and references therein. Furthermore, <cit.> explicitly model careless responding via Item Response Theory. This approach assumes that careless responding is due to certain characteristics on the participant level. Nevertheless, fatigue in long surveys is likely to be an additional explanatory factor for careless responding <cit.>. We speculate that estimates of the onset of careless responding could be used to extend the model of <cit.> to account for survey fatigue. Overall, our proposed method could be a starting point for an exciting and fruitful new direction of research on careless responding, in which artificial intelligence and machine learning could play a key role <cit.>. § ACKNOWLEDGMENTS We thank Dennis Fok, Patrick Groenen, Christian Hennig, Erik Kole, Nick Koning, Robin Lumsdaine, Kevin ten Haaf, the participants of ICORS 2021 and 2022, SIPS 2022, the 2022 Meeting of the Dutch/Flemish Classification Society, the Econometrics Seminar at Erasmus School of Economics, and the Econometrics Seminar at the University of Maastricht for valuable comments and feedback. This work was supported by a grant from the Dutch Research Council (NWO), research program Vidi (Project No. VI.Vidi.195.141). § SETUP AND ASSUMPTIONS Throughout our paper, we consider the following setup. Let X be an n× p data matrix holding the rating-scale survey responses of n respondents to p items. We assume that all observations (i.e. all respondents whose responses the survey collects) are independently and identically distributed, which is a standard assumption in statistics and machine learning. Moreover, we do not know if and when careless responding occurs in X. We require four more assumptions, which are listed below. The responses in X admit an n × s lower-dimensional representation, , where s ≪ p. The dimension s is known and corresponds to the number of constructs the survey measures. The survey that generated X is reliable in the sense that if all participants responded accurately, X would accurately measure all constructs. All participants begin the survey as attentive respondents by providing accurate and truthful responses. As the survey progresses, some (possibly none or all) participants start responding carelessly and continue to do so for the remainder of the survey. The onset of partial carelessness is characterized by a changepoint in either one, two, or all three of the following indicators: autoencoder reconstruction errors (<ref>), sequences, and response times. Assumption <ref> is very mild in survey data because surveys typically measure multiple constructs and the number of constructs is typically known. We refer to Section <ref> for a detailed discussion. In the example of the NEO-PI-R instrument <cit.>, there are p=240 items that measure s=30 constructs. Assumption <ref> is also mild in survey data. There exist well-established and reliable survey measures for a large variety of variables. For instance, the International Personality Item Pool <cit.> is a pool of more than 250 personality scales. It is in general recommended to use well-established measures to ensure a highly reliable measurement <cit.>. The reliability of a measurement can be estimated in multiple ways, such as Cronbach's alpha, the omega coefficient and variations thereof, as well as the H coefficient; we refer to <cit.> for a description of these and other reliability measures. Hence, Assumption <ref> is satisfied when the survey data were collected with measures of high reliability, Assumption <ref> is discussed in Section <ref> and Assumption <ref> is motivated in detail in Section <ref>. § DETAILS OF AUTOENCODERS §.§ Network Architecture and Estimation Denote by x_ij the response of the i-th participant to the j-th survey item. Collect the responses of the i-th participant to all p items in a p-dimensional vector x_i = (x_i1, x_i2, …, x_ip)^⊤. Hence, the n× p data matrix X is given by X = (x_1, x_2, …,x_n)^⊤. An autoencoder is a network with the following architecture. The network consists of M layers, where the first layer holds the input data x_i (input layer) and the last layer (output layer) holds the reconstructed input data. Let the ℓ-th layer contain N^(ℓ) nodes. Since the first layer is the input layer, the last layer is the output layer, and an autoencoder attempts to reconstruct its input variables, we have that N^(1) = N^(M) = p. Each node in a given layer contains an activation, which is a function of transformed activations from previous layers. Transformations in the ℓ-th layer are obtained through what is called an activation function g_ℓ (·). Formally, for participant i=1,…,n, the activation a_ij^(ℓ) of the j-th node, j=1,…, N^(ℓ), of the ℓ-th layer, ℓ=2,…, M, is given by a_ij^(ℓ) = g_ℓ( z_ij^(ℓ)), where z_ij^(ℓ) = ∑_k=1^N^(ℓ-1)ω_jk^(ℓ) a_ik^(ℓ-1) + b_j^(ℓ). The ω_jk^(ℓ) are fixed but unknown weights and the b_j^(ℓ) are intercept terms, which are also fixed and unknown. Observe that in the first layer, we have a_ij^(1) = x_ij. The activations of the last layer, a_ij^(M), hold the network's output, which correspond to the autoencoder's reconstruction of responses x_ij. We jointly refer to the weights and intercept terms as the network's parameters. Since the parameters are unknown in practice, they need to be estimated. We collect in a vector  all parameters that need to be estimated. To emphasize the dependence on the parameter vector , we define for a fixed  a prediction function _(·) of the network, which corresponds to the activations in the last layer: _ (x_i) = ( f_1,(x_i), f_2,(x_i), …, f_p,(x_i) )^⊤ = ( a_i1^(M), a_i2^(M), …, a_ip^(M))^⊤, for participants i = 1,…,n. The reconstruction of the input vector x_i is then given by x_i = _ (x_i). Because of the fact that each node is a function of nodes from a previous layer, the nodes in adjacent layers are often visualized by connecting edges. For instance, Figure <ref> provides a schematic overview of an autoencoder neural network. To fit an autoencoder, we aim at minimizing its reconstruction error. For a prespecified loss function (·), we fit the neural network by finding the that yields the best average reconstruction error, = min_{1/n∑_i=1^n ∑_j=1^p ( x_ij - f_j,(x_i) ) }. The prediction function of the fitted network is subsequently given by _(·). For the loss function in (<ref>), we choose the smooth and robust Pseudo-Huber loss, which is defined for a fixed δ >0 as (z) = δ^2( √(1 + (z/δ)^2) - 1 ). This choice results in quadratic loss for small values of z and linear loss for large values of z. Consequently, the Pseudo-Huber loss function avoids that large individual reconstruction errors strongly affect the fit, which would make it hard for the network to distinguish ordinary observations from irregular observations, as the latter typically lead to large prediction errors. To solve the optimization problem in (<ref>), we use stochastic gradient descent. We refer to Chapter 8.5 in <cit.> for details. The optimization problem (<ref>) can be generalized by adding a penalty term λΩ(·) to the optimization criterion, where λ≥ 0 is a prespecified tuning parameter. The penalized version of (<ref>) reads ∈min_{1/n∑_i=1^n ∑_j=1^p ( x_ij - f_j,(x_i) ) + λΩ(_ω) }, where we use the following definition for a q-dimensional parameter _ω: _ω = (θ_1ω,…θ_qω)^⊤, whose components are given by, for j=1,…,q, θ_jω = θ_j if j-th parameter is a weight parameter, 0 if j-th parameter is an intercept parameter. Observe that we only penalize weight parameters, but not intercept parameters. For the penalty function Ω (·), we choose the group-lasso penalty, which is defined as follows. Let {G_j}_j=1^m be a disjoint and exhaustive partition of parameters {1,…, q} into m groups, that is, G_j ⊆{1,…,q} for all j=1,…,m, such that ⋃_j=1^m G_j = {1,…, q} and ⋂_j=1^m G_j = ∅. The group-lasso penalty is given by Ω(_ω) = ∑_j=1^m √(# G_j)√(∑_k∈ G_jθ_kω^2), where # A denotes the cardinality of some set A. All parameters in a given group G_j are either jointly shrunk to zero or are jointly nonzero <cit.>. In our context, each group G_j holds items on the same survey page such that the number of groups, m, corresponds to the number of survey pages. We apply the group-lasso penalty between the input layer and the mapping layer, which is supposed to let items from later pages (where careless responding is more likely) be routed through different nodes in the mapping layer than items from earlier pages. Figure <ref> provides a schematic example. §.§ Modeling Choices Following <cit.>, we specify five layers, M=5, and a symmetric network architecture. That is, the number of nodes in input and output layer are equal and correspond to the number of items, p. In addition, the number of nodes and types of activation function are equal in the mapping an de-mapping layer (layers 2 and 4, respectively). Specifically, we set the number of nodes in both layers to ⌊ 1.5× p ⌋ because a relatively large number of nodes is expected to give the autoencoder flexibility to learn many different types of response behavior (attentive and careless). Based on Assumption <ref>, the number of nodes in the central bottleneck layer equals the number of scales in the questionnaire. Concerning the activation functions, we again follow a recommendation in <cit.> and propose to use nonlinear activation functions in the mapping as well as de-mapping layers, and a linear activation function in the bottleneck layer. Specifically, we propose to use the hyperbolic tangent activation in the (de-)mapping layers and the identity mapping in the bottleneck layer. Definitions are given in Table <ref>, which summarizes our proposed autoencoder architecture. For fitting the autoencoder, we use the stochastic gradient descent algorithm with a batch size of 10, a learning rate of 0.0001, and 100 epochs. In the presudo-Huber loss (<ref>), we set constant δ = 1. We set the tuning parameter in the penalized loss function (<ref>) to λ = 0.01. § ALGORITHMS AND CHANGEPOINT DETECTION §.§ Longstring Pattern Algorithms In Section <ref>, we have motivated and described algorithms to compute and sequences. Formal algorithms are provided in Algorithms <ref> and <ref>, respectively. §.§ Details on Changepoint Detection In the following, we describe the cumulative sum self-normalization test of <cit.>, which tests for the presence and location of a single changepoint in a multivariate series. Let {Y_j}_j=1^p be a series of length p consisting of d-dimensional random variables Y_j. Our goal is to estimate the location of a possible changepoint in the value of this series. Define by _a,b = (b-a+1)^-1∑_j=a^b Y_j the d-dimensional mean of the series calculated on the subset implied by periods a ≤ b. For location k∈{1,2,…,p-1}, define the test statistic T_p(k) = D_p(k)^⊤V_p(k)^-1D_p(k), where D_p(k) = k (p-k) /p^3/2(_1,k - _k+1,p), V_p(k) = L_p(k) + R_p(k), which are contained in ^d and ^d× d, respectively, with matrices L_p(k) = ∑_i=1^k i^2(k-i)^2 / p^2 k^2 ( _1,i - _i+1,k) ( _1,i - _i+1,k)^⊤, R_p(k) = ∑_i=k+1^p (p-i+1)^2(i-1-k)^2 / p^2k^2 ( _i,p - _k+1,i-1) ( _i,p - _k+1,i-1)^⊤, which are both contained in ^d× d. Consider a prespecified threshold K_p > 0. Based on the test statistic in (<ref>), flag the single change-point detection location as k = max_k=1,…,p-1 T_p(k) if max_k=1,…,p-1 T_p(k) > K_p, ∅ otherwise. <cit.> and <cit.> derive theoretical guarantees of this procedure and it turns out that an appropriate choice of K_p is directly implied by the desired significance level α∈ (0,0.5) and the dimension d of the series. Table 1 in <cit.> presents values of K_p for common choices of α and certain dimensions d, which we present in Table <ref>. In our case, we have dimension d=3 and level α = 0.001, so we choose threshold K_p = 246.8. It is worth to point out that this test can also test for a changepoint in statistics other than the mean, which was considered here. In addition, it can be extended to test for multiple changepoints. We refer the interested reader to <cit.> for details. In the context of our paper, we use the test statistics (<ref>) to test for changepoints in the three-dimensional series Y_j = [ _j; _j; _j ], j = 1,…, p, where _j is the reconstruction error (<ref>) of a response to item j, _j is the value of the sequence assigned to this response, and _j is the response time associated with the response. We obtain such a series for each of the n survey participants and subsequently test each of the n series for changepoints. As a final technical note, response times when measured on page-level and sequences may exhibit low variation. Computing their variation over a relatively narrow interval—as required by the test statistics in (<ref>)—may result in a singular (and therefore not invertible) variation matrix V_p(k) such that (<ref>) cannot be computed anymore. To avoid this issue, we by default inject Gaussian noise of tiny magnitude to each _j and _j, j=1,…,p. Specifically, we inject draws from a normal distribution with mean zero and variance 0.01× 0.01. Doing so results in tiny but nonzero variation, which renders V_p(k) invertible. §.§ Details on the Adjusted Rand Index In the following, we describe how the Adjusted Rand Index <cit.> is calculated for the p responses of a single respondent. The ARI is a continuous measure of classification performance and the respondent either responds attentively or carelessly to each item. Denote by n_11 the number of careless responses that are correctly identified as careless and by n_00 the number of attentive responses that are correctly identified as attentive. Conversely, denote by n_10 the number of careless responses that are incorrectly identified as attentive, and by n_01 the number of attentive responses that are incorrectly identified as careless. Intuitively, n_11 and n_00 measure correct classification, whereas n_01 and n_10 measure misclassification. With A = n_112 + n_002 + n_102 + n_012, B = n_00 + n_012 + n_10 + n_112, C = n_00 + n_102 + n_01 + n_112, D = p2, the ARI for the respondent of interest is given by ARI= 1 if n_10=p or n_01=p or n_11=p or n_00=p, A - BC/D /(B+C)/2 - BC/D otherwise. Observe that the ARI assumes value 1 if there is no misclassification, which is the maximum value it can take. Hence, for accurate estimates of the carelessness onset item, the ARI will be close to value 1. For very inaccurate estimates of carelessness onset, the ARI will be close to 0, or sometimes even below that. It is unclear how to interpret negative ARI values, but such values only occur rarely. We refer to <cit.> for a detailed discussion of the ARI's properties. It can be shown that if a changepoint is flagged in an attentive respondent, the ARI takes value 0, and when no changepoint is flagged in an attentive respondent, the ARI takes value 1. Hence, when averaging ARIs of attentive respondents, the ensuing average can be interpreted as the proportion of attentive respondents who are correctly identified as attentive. Conversely, averages of ARIs calculated on partially careless respondents do not have a direct interpretation other than “the higher, the better”. § ADDITIONAL RESULTS §.§ Simulations §.§.§ Heatmaps for Different Carelessness Prevalence In the simulation design of Section <ref>, Figures <ref>–<ref> visualize heatmaps akin to Figure <ref> (in which careless prevalence is 60%) for careless prevalence levels of 20%, 40%, 80%, and 100%. All figures use changepoint estimates obtained at significance level 0.1%. §.§.§ Results at Less Conservative Level Consider again the simulation design of Section <ref>. Figure <ref> is equivalent to Figure <ref>, just with significance level 0.5% instead of 0.1%. The results are very similar to Figure <ref>, save for about 10% attentive respondents being incorrectly identified as careless when carelessness is extremely prevalent at 80%. We therefore do not recommend choosing a more liberal significance level that is higher than 0.1%. §.§.§ Design with Strong Response Heterogeneity This simulation design is exactly the same as in Section <ref>, save for two key differences. First, a simulated dataset of responses measures 10 constructs, each of which is measured by 30 items. resulting in a total of 10× 30 = 300 items (as in Section <ref>). Second, we alter the response probability distributions of the five answer categories. Like in <cit.>, instead of the distribution in Table <ref>, we distinguish between four distinct types of distributions for the different constructs: centered about the midpoint, skewed towards agreeing, skewed towards disagreeing, and polarizing (likely to agree or to disagree). Table <ref> lists each distribution. All 10 items within a construct follow the same response probability distribution. We use the “centered” and “polarizing” distributions in seven constructs each, and the “agreeing” and “disagreeing“ constructs in eight constructs each, resulting in the aforementioned 10× 2× (7+8)=300 items. This simulation design is supposed to be very challenging for the autoencoder because it must learn response behaviors for a variety of highly heterogeneous scales, where each of which is measured by only 10 items. Consequently, the autoencoder must learn more heterogeneous responses based on less items (compared to Section <ref>), thereby creating an interesting challenge for our proposed method. In the following, we present and discuss results (averaged over 100 repetitions) at significance level 0.1%. Figure <ref> is analogous to Figure <ref>. We can see that our method identifies fewer careless onset items, but when it identifies changepoints, its estimates of onset location are highly accurate. Again, incorrectly detected changepoints in attentive respondents does not seem to be an issue at all. Figure <ref> shows ARIs for several subgroups and is analogous to Figure <ref>. Just like in Figure <ref>, our method barely ever incorrectly identifies changepoints in attentive respondents. Conversely, the ARI for careless respondents is again fairly constant across different carelessness prevalence levels with an ARI of about 0.85–0.9, which is an excellent performance, in particular when considering the difficulty of the experimental design. In addition, our method is again highly precise in accurately estimating changepoints in invariable careless respondents with near-perfect ARIs. In extreme careless responding, our method achieves an outstanding ARI of about 0.9). In random careless respondents, the ARIs are notably smaller, in particular if prevalence of carelessness is high (ARI of 0.5–0.63). This is primarily due to the extremely conservative significance level: Random carelessness behavior is arguably the hardest to detect, so our method needs to accrue high levels of evidence to identify such respondents. Combined with an extremely conservative significance level and an overall highly challenging design, our method sometimes does not identify a changepoint for some random careless respondents, which substantially drags down the ARI estimate (as such cases are awarded an ARI of zero). However, if our method estimates a changepoint in random careless respondents, its estimated location is reasonably precise. Note that it is possible to achieve substantially higher ARI values in random careless respondents by choosing a higher significance level (see Figure <ref>), but—just like in Section <ref>—we do not recommend doing so for the sake of staying conservative, at the cost of some undetected random careless respondents. Overall, with ARIs of 0.85–0.9 for careless respondents and almost no incorrectly flagged attentive respondents, our method performs very well at significance level 0.1% in this challenging simulation design. §.§.§ Simulated NEO-PI-R Administration In this design, we adapt the design of Appendix <ref> to emulate an administration of the NEO-PI-R instrument <cit.>. In short, this instrument comprises 240 items that measure the 30 facets of the Big 5 personality traits (see Section <ref> for a detailed description). Each facet construct is measured with eight items on a five-point Likert scale. We assume that all eight items comprising a construct follow the same response probability distributions. Consider the distributions in Table <ref>. We use the “centered” and polarizing distributions in seven constructs each, and the “agreeing” and “disagreeing” constructs in eight constructs each, resulting in the aforementioned 8× 2 × (7+8) = 240 items. Half of the items in a given construct are reverse-worded. We generate responses for 500 respondents and simulate 100 datasets. Akin to previous designs, we replace a fixed proportion of responses by (partially) careless responses. We randomly sample carelessness onset to be between the 160th and 204th item; these items respectively correspond to 66.7% and 85% of all items. Just like in the design of Appendix <ref>, this design in supposed to be challenging because there is strong heterogeneity between constructs, just like one would expect in an empirical administration of the NEO-PI-R. However, there is less heterogeneity than in Appendix <ref> due to the smaller number of (heterogeneous) constructs measured. Figures <ref> and <ref> visualize the results at significance level 0.1%, averaged across the 100 repetitions. Figure <ref> is analogous to Figure <ref>, just for significance level 0.5%. The conclusions remain similar to the previous designs: At 0.1% level, in rarely any attentive respondents a changepoint is identified, while invariant carelessness and extreme responding are detected exceptionally accurately. Pure random responding is also identified accurately with ARIs of 0.75–0.8, but with decreasing accuracy when carelessness prevalence is high. Again, we can achieve substantially better ARIs for random responding by choosing the level to be 0.5% (see Figure <ref>), but advise against this choice. §.§ Empirical Validation §.§.§ Application on Original Data Figure <ref> shows the two dimensions of autoencoder reconstruction errors and sequences, as well as test statistics associated with the single student in the data of <cit.> for whom our method identifies a changepoint at significance level 0.1%. When running our proposed method on both dimensions on the 400 students that have exclusively integer-valued responses, this student is the only participant in which a changepoint is identified at significance level 0.1%. The changepoint occurs at item 113, before which the reconstruction errors are strikingly larger than afterwards. There does not seem to be a structural break in the sequences. Overall, this suggests that this student initially starts the questionnaire as inconsistent careless respondent (random-like responding), but switches to being attentive as they progress through the items. In addition to a visual analysis of reconstruction errors and sequences, we analyze the observed responses of the student for whom a changepoint is flagged via the their intra-individual variance (IRV). There is some evidence that carelessness manifests in low values of IRV (, in case of invariable carelessness) and high values of IRV (, in case of inconsistent carelessness) when when compared to IRVs of attentive respondents. We therefore compute IRVs across the items prior to a flagged changepoint and IRVs across items from the flagged changepoint onward. We do so for the student for whom a changepoint is flagged and the remaining 399 seemingly attentive participants. Table <ref> contains the corresponding IRV values. Recall from Figure <ref> that the student is suspected to start the questionnaire carelessly and that their high pre-changepoint reconstruction errors suggest inconsistent carelessness. Indeed, they have a substantially higher IRV value (1.65) in their pre-changepoint responses than post-changepoint responses (1.33), which reflects larger response variation in their suspected periods of carelessness, possibly due to random-like responding. §.§.§ Validation With Less Conservative Level In this subsection, we present our method's results when applied on the data of <cit.> in which we have included generated careless responses. The sole difference to Section <ref> is that we report results for the less conservative significance level 0.5% instead of 0.1%. Hence, Figure <ref> is equivalent to Figure <ref>, just when the less conservative level is used. As explained in the main text, choosing the less conservative level of 0.5% results in a noticeable improvement of the ARI for participants with random and extreme careless response styles, without a significant adverse effect of attentive respondents being incorrectly identified as careless.
http://arxiv.org/abs/2303.07385v1
20230313180221
Linearised conformal Einstein field equations
[ "Justin Feng", "Edgar Gasperin" ]
gr-qc
[ "gr-qc" ]
plain propositionProposition lemmaLemma theoremTheorem assumptionAssumption *conjectureConjecture *subconjectureSubconjecture corollaryCorollary mainMain Result *definitionDefinition remarkRemark IndRemark 0.95 IndAssumption 0.95 IndProposition 0.95 a b η g σ ℓ L e p f F T Q S Ψ H Σ ∇ g L …s Ξ d Φ T F ,1]Justin Feng [E-mail address:justin.feng@tecnico.ulisboa.pt] ,2]Edgar Gasperín [E-mail address:edgar.gasperin@tecnico.ulisboa.pt] [1,2] CENTRA, Departamento de Física, Instituto Superior Técnico IST, Universidade de Lisboa UL, Avenida Rovisco Pais 1, 1049 Lisboa, Portugal Linearised conformal Einstein field equations [ March 30, 2023 ============================================= The linearisation of a second-order formulation of the conformal Einstein field equations (CEFEs) in Generalised Harmonic Gauge (GHG), with trace-free matter is derived. The linearised equations are obtained for a general background and then particularised for the study linear perturbations around a flat background —the inversion (conformal) representation of the Minkowski spacetime— and the solutions discussed. We show that the generalised Lorenz gauge (defined as the linear analogue of the GHG-gauge) propagates. Moreover, the equation for the conformal factor can be trivialised with an appropriate choice for the gauge source functions; this permits a scri-fixing strategy using gauge source functions for the linearised wave-like CEFE-GHG, which can in principle be generalised to the nonlinear case. As a particular application of the linearised equations, the far-field and compact source approximation is employed to derive quadrupole-like formulae for various conformal fields such as the perturbation of the rescaled Weyl tensor. Keywords: conformal boundary, conformal Einstein field equations, scri-fixing. § INTRODUCTION Although nowadays gravitational wave effects can be studied using the full non-linear Einstein field equations, linear perturbation theory remains an active area of research, e.g. black hole perturbation theory, quasinormal modes, post-Newtonian and post-Minkowskian expansions. As it is well-known, the concept of gravitational radiation can be traced back to 1918 to the study of the linearisation of the Einstein field equations around flat spacetime and the derivation of the celebrated quadrupole formula. However, a rigorous formulation of the notion of gravitational radiation had to wait for further development of mathematical aspects of the theory put forward by Bondi, Sachs, Newman and Penrose and others in the decade of 1960 —see <cit.> for a historical review. The notion of null-infinity (and more generally the notion of a conformal boundary) developed in the aforementioned theory proved crucial for the modern understanding of gravitational radiation. Null-infinity ℐ corresponds to an idealisation of the asymptotic region of the physical spacetime (ℳ̃, ) and it is defined through a conformally related manifold (ℳ,) where =Ξ^2 so that ℐ can be identified with the region where Ξ=0 —but ∇_a Ξ≠ 0. Unfortunately, the Einstein field equations (EFEs) are not conformally invariant so evaluating quantities at ℐ is non-trivial. To circumvent this problem, there are different approaches aimed at specific goals. For instance, the hyperboloidal approach in their different renditions <cit.> represents a compromise between the preservation of standard formulations of the EFEs used in Numerical Relativity and the inclusion of ℐ at the expense of dealing with formally singular (but numerically tractable) equations. On the other hand, there exists another strand of research that stems from taking further the conformal approach while insisting on having formally regular equations. This conformally regular approach was initiated in 1981 when H. Friedrich derived in <cit.> a reformulation of the Einstein field equations known as the conformal Einstein field equations (CEFEs) —see <cit.> for an exhaustive discussion. One of the distincive features of the CEFEs is that the conformal factor is a variable, hence the location of the conformal boundary is not fixed a priori. Strategies for fixing the conformal boundary, or scri-fixing, have been introduced for the CEFEs in <cit.> for vacuum and <cit.> for trace-free matter, but they require the existence of a congruence of conformal curves. Despite many advances in the mathematical analysis of spacetimes and numerical evolutions with the CEFEs <cit.>, the application of the CEFEs to physical problems has been surprisingly limited. This is evident in (and possibly a result of) the fact that the application of linear perturbation theory to the CEFEs has not been studied in the existing literature. Such an analysis is needed to make contact with standard (linear) metric approaches to characterising gravitational radiation. This article aims to provide a first step in this direction by studying the linearisation of the CEFEs in a form that resembles standard formulations of the linearised Einstein field equations. The core of the CEFEs are the Bianchi identities, which provide a set of evolution and constraint equations for the Weyl curvature (coupled with other fields in the non-linear case). One approach to the linearised problem concerns the study of the spin-2 equation in a fixed background spacetime, which can be thought as the linearisation of the Weyl sector of the CEFEs in spinorial form. The spin-2 equation on a particular background known as the Minkowski i^0-cylinder has been analysed in <cit.>. The spin-2 equation ∇_A'^Aϕ_ABCD=0, although elegant, looks very different to the standard linearisation of metric formulations of the Einstein field equations. Hence, in this article, we study the linearisation not of the original set of CEFEs but rather we start from a metric and second-order formulation of the CEFEs which is closer in spirit to standard hyperbolic reductions of the EFEs in generalised harmonic gauge (GHG) employed in Numerical Relativity. This non-linear wave-like formulation of the CEFEs was originally derived in the vacuum case in <cit.> and has been extended for the case of trace-free matter in <cit.>. In this paper, we linearise these equations around a general background and then the solutions to the linearised equations around flat spacetime are studied. As a concrete application of the linearisation, we derive, in the far-field approximation, quadrupole-like formulae for the conformal fields, obtaining in particular a quadrupole-like formula for the perturbation of the rescaled Weyl tensor. As a byproduct, we show how the gauge source functions can be chosen so that the conformal factor remains unperturbed. This can be regarded as a “scri-fixing” strategy for the linearised CEFEs for trace-free matter. We then argue that the same strategy carries over to the non-linear wave-CEFEs in the context of the hyperboloidal initial value problem, providing a simpler alternative to the scri-fixing strategy in <cit.> based on conformal curves. §.§ Notations and conventions The signature convention for (Lorentzian) spacetime metrics will be (-,+,+,+). Latin indices from the first half of the alphabet a,b,c,,... will be used as abstract tensor indices while Greek indices will denote spacetime coordinate indices, taking values from the set {0,1,2,3}. If an adapted coordinate system (with coordinates x^μ) is introduced, x^0=t represents the time coordinate, and Latin indices from the second half of the alphabet represent spatial indices, taking values from the set {1,2,3}. Symmetrisation and antisymmetrisation of tensors will be denoted with round and square brackets and taking the trace-free part of a tensor will be denoted by adding {} on the relevant indices. For instance T_(ab):= 12(T_ab + T_ba), T_[ab]:=12(T_ab - T_ba) and T_{ab}:= T_ab - 14g_abT. The curvature conventions are fixed by the relation (∇_a ∇_b -∇_b ∇_a) v^c = R^c_dab v^d. Although we will occasionally refer to expressions in spinorial form (as much of the literature on the CEFEs employs spinor notation), all calculations in this article are performed in tensor notation. §.§ Organisation of the paper Section <ref> gives a brief summary of the CEFEs and the wave-like hyperbolic reduction of <cit.>. This is included to give a concise reference to the reader and to provide the non-linear context of the equations studied in this paper. Section <ref> contains the linearisation of the wave-CEFEs in GHG around a general background. Section <ref> particularises the equations for a flat background and discusses the perturbed solutions via Green's functions methods and, in the far-field approximation, quadrupole-like formulae for the conformal fields are derived. § THE CONFORMAL EINSTEIN FIELD EQUATIONS The conformal Einstein field equations (CEFEs) are a reformulation of the Einstein field equations (EFEs) with the aim of dynamically implementing R. Penrose's conformal approach. The CEFEs were originally introduced in <cit.> and encode a set of differential conditions satisfied by the geometry of a conformal extension (ℳ,) of a spacetime (ℳ̃,) (with =Ξ^2) satisfying the EFEs. To differentiate between these two, the pair (ℳ,) is called the unphysical spacetime while the pair (ℳ̃,) is called the physical spacetime. The feature that distinguishes the CEFEs from other reformulations of the EFEs is that (for trace-free matter) the CEFEs are formally regular at Ξ=0 —see <cit.>. To see this and concisely introduce the CEFEs, it is convenient to define the following zero-quantities —see <cit.> for an extensive discussion: Z_ab := ∇_a∇_bΞ +Ξ L_ab - s g_ab - 1/2Ξ^3T_{ab}=0 , Z_a := ∇_as +L_ac∇ ^cΞ - 1/2Ξ^2T_{ab}∇^bΞ - 1/6Ξ^3∇^bT_{ba}=0 , δ_bac := ∇_aL_bc-∇_bL_ac - d^d_cab∇_dΞ -Ξ T_abc =0 , λ_abc:= ∇_ed^e_abc-T_bca=0 , P^c_dab := R^c_dab - Ξ d^c_dab - 2( δ^c_[aL_b]d - g_d[aL_b]^c). Z := λ - 6 Ξ s + 3 ∇_aΞ∇^aΞ -1/4Ξ^4T=0 M_a:=∇^bT_ba - Ξ^-1T∇_aΞ=0. where Ξ is the conformal factor, s is the Friedrich scalar, L_ab is the Schouten tensor, R^a_bcd is the Riemann tensor, d^a_bcd is the rescaled Weyl tensor, T_ab is the rescaled energy-momentum tensor with trace T:=g^abT_ab and T_abc is the rescaled Cotton tensor. The zero-quantities Z_ab, Z_a, δ_abc,λ_abc , Z and M_a are defined simply as a bookkeeping device in the sense that the CEFEs are satisfied when a collection of fields {g_ab, Ξ, s ,L_ab, d_abcd, T_ab, T_abc} solve the equations Z_ab=0, Z_a=0, δ_abc=0, λ_abc=0, P^d_abc=0, Z=0, M_a=0. Observe that the only singular terms in the zero-quantities (<ref>) appear with the trace of the unphysical energy-momentum tensor, specifically in equation (<ref>). However for trace-free matter all the equations implied by the zero-quantities (<ref>) are formally regular at Ξ=0. The geometric variables are defined via s := 14∇_a∇^aΞ + 124RΞ, L_ab :=12R_ab-112Rg_ab, d^a_bcd :=Ξ^-1C^a_bcd. where R_ab and R denote the Ricci tensor and Ricci scalar of (ℳ,) while C^a_bcd is the conformally invariant Weyl tensor. Given a solution to the CEFEs, it can be verified that the associated physical metric g̃_ab=Ξ^-2g_ab will satisfy the Einstein field equations: R̃_ab-1/2R̃g̃_ab + λg̃_ab= T̃_ab , where T̃_ab is the physical energy-momentum tensor, λ is the cosmological constant, and R̃_ab and R̃ are the respective Ricci tensor and Ricci scalar. The matter variables in (<ref>) are related to their physical counterparts as: T_ab :=Ξ^-2T̃_ab, T:=Ξ^-4T̃, T̃:=g̃^abT̃_ab , T_abc :=Ξ^-1∇̃_[aT̃_b]c -1/3Ξ^-1g̃_c[b∇̃_a]T̃ . Here T̃_ab is the physical energy-momentum tensor and ∇̃ is the Levi-Civita connection of g̃_ab. A comprehensive discussion and derivation of the CEFEs can be found in <cit.>. Though the conceptually clean setup is the vaccum case, we include matter primarily for the purpose of deriving quadrupole-like formulae in subsection <ref>. From this point onward, it will be assumed that only trace-free matter models are in consideration. Notice that the conditions T=0 and T_{ab}=T_ab simplify some of the matter terms in the zero-quantities (<ref>). We now consider some properties of the rescaled Cotton tensor under the trace-free matter assumption. Under this assumption, the rescaled Cotton tensor can be written in terms of the unphysical energy-momentum tensor as T_abc :=Ξ∇_[aT_b]c + 3 T_c[b∇_a]Ξ -g_c[aT_b]e∇^eΞ . Observe as well that the Cotton tensor has the symmetries T_abc=T_[ab]c and T_[abc]=0. Furthermore, the trace-free assumption and ∇̃^aT̃_ab=0 implies that ∇^aT_ab=0, ∇_cT_ab^c = 0. Additionally, using again equations (<ref>), (<ref>) and exploiting Z_ab=0 gives ∇ _aT_b^a_c = - 12Ξ∇ _a∇ ^aT_bc - (4 s - 13Ξ R)T_bc + Ξ ^3 T_b^a T_ca - 12Ξ ^2 T^ad d_bacd - 14Ξ ^3 T_ad T^ad g_bc + ∇ ^aΞ (-2 ∇ _aT_bc + ∇ _(bT_c)a). The Ricci scalar R is not determined by the CEFEs and in fact, it encodes the conformal gauge freedom. Given two conformal extensions of the same physical spacetime =Ξ^2 and =Ξ̌^2 one has that =ϰ^2 with ϰ := Ξ̌/Ξ and ϰ≃𝒪(1) at the conformal boundary. Hence, their Ricci scalars are related via 6 ∇_a ∇^a ϰ -R ϰ =- Řϰ^3. Observe that if Ř is considered as a given scalar function in (ℳ,) then, this equation can always be solved locally for ϰ. Thus, the Ricci scalar in the CEFEs is a gauge quantity that is called the conformal gauge source function —see <cit.> for further discussion. In this article, we will adhere to the metric formulation of the CEFEs which consists of using the definition of the Schouten tensor to obtain an equation for the metric. Namely, from R_ab=2L_ab + 1/6Rg_ab, one substitutes the expression for the Ricci tensor as second derivatives of the metric respect to some coordinate basis x^μ and reads L_μν as a source term in the resulting equation. The source term L_μν is then coupled to the rest of the variables via equations (<ref>). In view that the Ricci scalar is the conformal gauge source function, to have a clean split between gauge quantities and non-gauge quantities one could opt for using the trace-free Ricci tensor as variable instead of L_ab, Φ_ab := 1/2(R_ab - 1/4Rg_ab). The factor 1/2 in its definition is conventional and it is put so that Φ_ab corresponds to the tensorial counterpart of the trace-free Ricci spinor Φ_AA'BB' of the Newman-Penrose formalism. In this case, the evolution equation for the metric is read of from R_ab=2Φ_ab + 1/4Rg_ab. For convenience, we employ such a splitting, and will use the trace-free Ricci tensor rather than the Schouten tensor as a dynamical variable. There are different hyperbolic reduction strategies to turn the tensorial expressions (<ref>) into partial differential equations. In the next section, we revisit a hyperbolic reduction that is most appropriate for the aims of this article. §.§ Geometric wave equations A first derivation of the metric conformal Einstein field equations as a set of wave equations was given in <cit.> for the vacuum case and in <cit.> for the case of trace-free matter. Our discussion differs in the use of the trace-free Ricci tensor instead of the Schouten tensor; we do this to make transparent the split between gauge and non-gauge quantities. Since we only make a simple variable change, the derivation will not be repeated here. The geometric wave equations read □Ξ = 4 s - 16Ξ R , □ s = ΞΦ _abΦ ^ab - 16∇ _aR ∇ ^aΞ - 16 s R + (R12)^2 Ξ + 14Ξ ^5 T_ab T^ab - Ξ ^3 T^abΦ _ab + Ξ T_ab∇ ^aΞ∇ ^bΞ, □Φ_ab = 4 Φ _a^cΦ _bc - Φ _cdΦ ^cd g_ab -2 ΞΦ ^cd d_acbd + 13Φ _ab R + 16∇ _b∇ _aR - 124 g_ab□ R + 12Ξ ^3 T^dc d_adbc - Ξ∇ _cT_b^c_a - 2T_(a|c|b)∇ ^cΞ, □ d_abcd = 12 d_abcd R + 2 Ξ d_a^e_d^p d_becp -2 Ξ d_a^e_c^p d_bedp -2 Ξ d_ab^ep d_cedp - Ξ^2T_[c^ed_d]eab - Ξ^2T_[a^ed_b]ecd + Ξ^2T^ep( d_aep[cg_d]b - d_bep[cg_d]a ) + 2 ∇_[aT_|cd|b] +2 ∇_[cT_|ab|d]+ 2 g_d[b∇_|eT_c|^e_a] + 2 g_c[a∇_|eT_d|^e_b], where □=∇_a∇^a denotes the geometric wave operator. Observe that these are tensorial in the same way as expressions (<ref>) and they do not include an equation for the metric. When recast in this form, the original set of equations (<ref>) form constraints on initial data; the propagation of the constraints was shown in <cit.>. A further discussion of these wave equations as an explicit system of second order hyperbolic PDEs is given in Appendix <ref> —see also <cit.>. To obtain a set of equations for the matter fields encoded in T_ab and T_abc, an explicit matter model is required. Namely, given a matter model consisting on some fields τ={τ_1, ... ,τ_n} so that T_ab=T_ab(τ) —and hence T_abc=T_abc(τ, ∇τ) using equation (<ref>)—one has to derive wave equations for each of the fields encoded in τ and their derivatives. To give a concise and general discussion, the wave equations for the matter fields will not be presented as this is a case-dependent analysis and can be revisited for a number of trace-free matter models in <cit.>. §.§ Wave equation for metric The wave equation for the metric is derived from the expression of the trace-free Ricci tensor in some fiduciary coordinate system x^μ. Here and in what follows, Γ^μ_αβ will denote the Christoffel symbols of the Levi-Civita connection ∇ of in the coordinate basis x^μ. First, one defines the GHG-constraint as C^μ := Γ^μ + ℋ^μ, where Γ^μ:=g^αβΓ^μ_αβ are the contracted Christoffel symbols and ℋ^μ are the coordinate gauge source functions. Recall that Γ^μ = - ∇_α∇^αx^μ so that setting C^μ=0 is equivalent to imposing the generalised harmonic gauge condition ∇_α∇^αx^μ= ℋ^μ. with the above definitions, the reduced Ricci tensor ℛ_μν is defined as ℛ_μν:=R_μν - ∇_(μC_ν). A customary calculation —see for instance <cit.>— shows that the reduced Ricci tensor can be expressed in terms of derivatives of the metric as ℛ _μν = - 12 g_μν - ∇ _(μℋ_ν) + g^σδg^αβ (Γ_νδβΓ_σμα + 2Γ_δνβΓ_(μν) α ) where := g^αβ∂_α∂_β is the standard reduced wave operator. Similarly, recalling that the Ricci scalar of encodes the conformal gauge freedom, one introduces C := R - F where F is the conformal gauge source function. Imposing the constraint C=0 is equivalent to choosing a representative from the conformal class [] in the same way that imposing C^μ=0 is equivalent to choosing the coordinates to satisfy equation (<ref>) —see Remark <ref>. Therefore, using equation (<ref>) and imposing the GHG-coordinate and conformal gauge constraints C^μ=0, C=0, we obtain the following reduced wave equation for the components of the unphysical metric in the x^μ coordinates: g_μν = - 4Φ_μν - 1/2F g_μν - 2 ∇ _(μℋ_ν) - g^σδg^αβ (Γ_νδβΓ_σμα + 2Γ_δνβΓ_(μν) α ). One can perform a similar procedure on the remaining wave equations (<ref>) to obtain them in their reduced form, but since it is not absolutely necessary for the discussion that follows, that discussion is provided in Appendix <ref>. § THE CONFORMAL EINSTEIN FIELD EQUATIONS IN THE LINEAR APPROXIMATION In this section the linearisation of the wave equations (<ref>) is obtained. To set up the notation regarding linearisation, first, we outline the general procedure. Consider a one-parameter family of fields ϕ(ε) which satisfy an equation ℰϕ(ε)=0, where ℰ is some (non-linear) differential operator. Then, the field ϕ:=ϕ(0) will be called the background solution as it satisfies the equation ℰϕ=0. Let D denote the linearisation operator: D(ℰϕ):=d/dε(ℰϕ(ε))|_ε=0 Then, using that Dϕ=0, one obtains ℒδϕ=0 where ℒ is a linear operator acting on δϕ:= dϕ/dε|_ε=0. Issues of linearisation stability (the existence and correspondence between exact and linearised solutions) will not be addressed here. For the ongoing discussion ϕ = (φ, ), where φ encodes all the geometric variables while and respectively encode the gauge and matter variables. Namely, for the geometric sector φ, one is considering an approximate solution of the form g_μν=g_μν + δ g_μν, Φ_μν= Φ_μν + δΦ_μν, Ξ = Ξ + δΞ, s= s + δ s For the gauge sector one has the split F=F + δ F, ℋ_μ = ℋ_μ + δℋ_μ. For the matter sector one has the split T_μν=T_μν + δ T_μν, T_μνα = T_μνα + δ T_μνα. From this point forward (unless otherwise stated), indices will be raised and lowered with the background metric g_μν. §.§ Equation for the metric perturbation One of the advantages of the wave formulation of the CEFEs is that the metric sector of the equations resembles conventional formulations of General Relativity. This can be seen clearly even in the non-linear equation (<ref>) where this equation is formally identical to the standard (non-conformal) Einstein field equations in generalised harmonic gauge with a source term in this case given by -4Φ_ab-1/2Fg_ab which could be thought conceptually as some artificial “geometric matter term”. To exploit the latter viewpoint let us define 𝒲_ab:=2Φ_ab + 1/4Fg_ab, so that equation (<ref>) agnostically reads: R_ab=𝒲_ab. Expressing the equation for the metric in this way is advantageous since one can follow the classical discussion for linearising the Einstein field equations with respect to a general background g_ab —see for instance Sec. 7.5 of <cit.>. Since a few gauge transformations are needed and we want to reserve the symbol δ g_μν for the last transformation, we first decompose the metric as g_μν=g_μν + h_μν. Then, a straightforward linearisation of equation (<ref>) gives □ h_μν = - 2 δ𝒲_μν + ^αβ _β _μh_να + ^αβ _β _νh_μα - ^αβ _μ _νh_αβ where □ := ∇_μ∇^μ with ∇ denoting the Levi-Civita connection of . Then, upon commuting covariant derivatives and defining the trace-reversed metric perturbation ĥ_μν:=h_μν-1/2 h_α^α_μν, we obtain □ĥ _μν = -2 δ𝒲_μν + δ𝒲_α^α g_μν -2 R_μανβ ĥ^αβ + 2 R_(ν^α ĥ_μ) α - g_μν _β_α ĥ^αβ + 2_(μ_|α| ĥ_ν) ^α where δ𝒲_α^α:=^αβδ𝒲_αβ, and R_μναβ and R_μν are the Riemann and Ricci tensors of , which can be written in terms of the rescaled Weyl tensor and trace-free Ricci tensors via the decomposition: R_μναβ = Ξd_μναβ -2 Φ _β [μg_ν] α +2 Φ _α [μg_ν] β + 112R (g_μαg_νβ - g_μβg_να). To avoid unnecessarily long expressions, background curvature terms will not be expanded out. Notice that equation (<ref>) contains only divergences of ĥ_μν and derivatives of the trace are absent. To obtain hyperbolic equations, the divergence terms _αĥ_ν^α are removed by employing a slight generalisation of the procedure outlined in <cit.>; one begins by recognising that the quantity q_μν := h_μν + 2_(μξ_ν) is a gauge transformation of the metric perturbation h_μν. Introduce its trace-reversed version δ g_μν=q̂_μν:= q_μν-12q_c^cg_μν. Since the vector field ξ_ν is arbitrary, one can choose a gauge in which ξ_ν satisfies an inhomogeneous wave equation. In particular, the divergence of δ g_μν: _νδ g_μ^ν = F_μ, may be rewritten as the following wave equation: □ξ_μ + R_μνξ^ν + _νĥ_μ^ν = F_μ , where F_μ is a given set of functions of the coordinates x^α and the evolved fields (but not their derivatives), which we call the Lorenz gauge source functions. These are related to the linearisation of the coordinate gauge source functions ℋ^μ as discussed in Remark <ref>. If ξ_ν satisfies the above wave equation, then δ g_μν satisfies the gauge (<ref>). The gauge condition in (<ref>) is a linear analogue of the generalised harmonic gauge condition, and as such we called it the generalised Lorenz gauge —a similar definition is given also in <cit.> in the non-conformal context assuming a flat background. Working in the generalised Lorenz gauge, we obtain the following equation for the metric perturbation: □ δg_μν = - 2 δ𝒲_μν + δ𝒲^α_α g_μν - 2 R_μανβ δg^αβ + 2 R^α_(ν δg_μ) α - _μν _αF^α + 2 _(μF_ν) subject to the gauge condition (<ref>). The analogy between the Lorenz and Harmonic gauge is more subtle when dealing with a non-flat background since the direct linearisation of the generalised harmonic condition C^μ:=Γ^μ + ℋ^μ=0 renders δ C^μ= _βδ g^βμ - ℋ^αδ g^μ_α - Γ^μ_αβδ g^αβ + δℋ^μ =0. Comparing equations (<ref>) and (<ref>) one concludes that : F^μ = ℋ^αδ g^μ_α + Γ^μ_αβδ g^αβ - δℋ^μ . Observe that even for the harmonic case ℋ^μ = δℋ^μ=0 equation (<ref>) reduces to _βδ g^βμ = Γ^μ_αβδ g^αβ, retrieving the Lorenz gauge condition only if the background connection vanishes Γ^μ_αβ=0. To complete the discussion now we look at the expression for δ𝒲_μν. It follows from the definition of 𝒲_ab in equation (<ref>) that δ𝒲_μν = 2 δΦ _μν + 14Fδ g_μν - 18Fδ g^α_α_μν + 14δ F _μν. Recalling that the conformal gauge constraint has been imposed C:= R - F=0, observe that the linearisation of this condition leads to the following constraint: δ C = δ𝒲^μ_μ - R^μνδ g_μν + 12Rδ g^μ_μ - δ F =0. For consistency, the background conformal gauge source function and the background Ricci scalar should be identified: R=F. Then, with this identification and using equations (<ref>) the linearisation of the conformal constraint reads δ C = 2δΦ_μ^μ -2 Φ^μνδ g_μν=0. The latter equation states that although Φ_μν is trace-free, in general, its perturbation may not be. Nonetheless, the trace of the perturbation is fixed by equation (<ref>). In particular, notice that if the background is flat, this condition reduces to δΦ_μ^μ=0. To obtain the final expression for the metric perturbation equation is then enough to substitute equation (<ref>) into equation (<ref>). Although the resulting equation for δ g_μν looks more complicated than the usual expression for the metric perturbation this is mainly because the linearisation was performed with respect to a general background and due to the use of the generalised Lorenz gauge. Later on, when the background is fixed the expressions presented in this section will simplify considerably. §.§ Equations for the perturbation of other conformal fields The linearisation of the rest of the conformal fields can be obtained systematically. The main calculation involves obtaining a suitable expression for the linearisation of the geometric wave operator acting on each of the conformal fields. To do the calculation in the scalar sector, first notice that for a scalar field φ one has that D□φ = □δφ - h^νμ _ν_μφ - ^μα _αh_νμ ^νφ + 12^μα _νh_μα ^νφ where φ denotes a background quantity and δφ the perturbation. Performing the same gauge transformations of subsection <ref> for the metric perturbation h_μν and imposing the generalised Lorenz gauge one obtains: D □φ = □δφ + 12δ g^μ_μ□φ - δ g^μν _ν _μφ - F^μ _μφ. A direct calculation using the latter expression and exploiting that the background fields ϕ satisfy the CEFEs in the form of equations (<ref>) as well as equations (<ref>), give the following equation for the perturbation of the conformal factor □δΞ = - 16FδΞ - 16δ F + 4 δ s - ^μνδ g_μν +( 124F - s )δ g^μ_μ + F^μ _μ + 12 ^3 ^μνδ g_μν A similar calculation gives the linearised wave equation for the Friedrich scalar. The explicit expression is lengthy and has been put in Appendix <ref>. For tensor fields the calculation is slightly more involved. To give an abridged discussion consider now the case of the linearisation of □ w_μ, where w_a is some covector field. A direct calculation gives, D □ w_μ = □δ w_μ - 12w^ν□ h_μν + w^ν _α _[νh_μ] ^α - h_να ^α ^νw_μ + 2 ^αw^ν _[νh_μ] α - _αh_μν ^αw^ν - ^νw_μ ( _αh_ν^α - 12 _νh^α_α) where w_μ denotes a background quantity and δ w_μ the associated perturbation. Substituting the term □ h_μν using equation (<ref>) and rewriting the equation in terms of the trace-reversed metric perturbation ĥ_μν renders D □ w_μ = □δ w_μ - w^ν _α _μĥ_ν^α + δ𝒲_μ^νw_ν - ^αw^ν( _αĥ_μν - 12_μν _αĥ^β_β) -2 ^αw^ν ( _[μĥ_ν] α - 12 g_α [ν _μ] ĥ^β_β) - ^α^νw_μ(ĥ_να - 12ĥ^β_β_να) - _αĥ_ν^α ^νw_μ Commuting covariant derivatives on the second term in the right-hand side of equation (<ref>), performing the gauge transformation described in subsection <ref> and imposing the generalised Lorenz gauge one obtains D □ w_μ =□δ w_μ + 12δ g^ν_ν□w_μ - δ g_να ^α ^νw_μ - δ g_ν^αR_μαw^ν + δ g^αβR_μανβw^ν - ℒ_w_μ + δ𝒲_μ^νw_ν + 2 ^αw^ν ( _[ν(δ g)_μ] α -12 _αδ g_μν) + ^νδ g^α_α _[νw_μ] + 12_μδ g^α_α _νw^ν where ℒ_ denotes the Lie-derivative along F^μ. Extending the latter calculation on tensors of higher valence is a long but straighforward calculation. The latter leads to the following linearised equations for the conformal fields: □δ g_μν = H^g_(μν)(δϕ, δϕ ; ϕ, , ϕ, ) □δΞ = H^Ξ_(δϕ, δϕ ; ϕ, , ϕ ) □δ s = H^s(δϕ, δϕ ; ϕ, , ϕ, ) □δΦ_μν = H^Φ_(μν)(δϕ, δϕ ; ϕ, , ϕ, , F, δ F ) □δ d_μναβ = H^d_[μν][αβ](δϕ, δϕ ; ϕ, , ϕ, ϕ, ) . Here we recall that ϕ schematically represents the conformal fields, and the gauge sources are schematically denoted as ; containing the Lorenz gauge source functions F^μ as well as F and δ F. The semicolon separates the arguments which do not contain the evolved perturbation variables explicitly. Observe that only the equation for δΦ_μν contains second derivatives of δ F which restricts the allowed choices for δ F—see Remark <ref>. The expressions for H^g_μν, and H^Ξ are given in the respective equations (<ref>) and (<ref>). The expressions for H^s, H^Φ_μν and H^d_μναβ are lengthy and are given explicitly in Appendix <ref>. § ANALYSIS OF WAVE SOLUTIONS AROUND FLAT SPACETIME §.§ Fixing the background solution The discussion given in the last section is general in the sense that neither the background solution ϕ nor the gauge source functions have been fixed. The first observation to be made is that, although the expression for H^d_μναβ is complicated, in fact, if one restricts the analysis to the vacuum case and a conformally flat background (so that d_μναβ=0 but Φ_μν≠ 0 and R≠ 0), then the equation for the perturbation of the rescaled Weyl tensor reduces to □ δ d_μναβ = 1/2Fδ d_μναβ, and this equation decouples from the rest. This is to be expected since as one way to study linearised gravity is through the spin-2 equation for which the metric perturbation plays no role —see <cit.>. Since the aim of this article is to give a first analysis into the linearised version of the CEFEs, it is relevant to now examine the complete system even if some of the equations decouple as in the case described above. The simplest choice of background is one in which the background geometry is flat. Naively, one would think that this forces the background conformal factor to be constant, Ξ=1, and the equations trivialise to the standard non-conformal case; this would defeat the purpose of considering the CEFEs in the first place, as one would not be able to incorporate the conformal boundary in such an analysis. Fortunately, there exists a non-trivial conformal transformation that maps the Minkowski spacetime into itself such that spatial infinity and null infinity for the physical Minkowski spacetime are respectively mapped to the origin and the lightcone through the origin of the (conformally transformed) unphysical Minkowski spacetime. The evaluation of the field at the conformal boundary of the physical spacetime corresponds to evaluation at finite coordinate locations in the unphysical spacetime. We point out that such a conformal transformation does not necessarily yield a full compactification, as some points (such as the physical origin) are mapped to infinity —see Figure <ref>. This choice for a flat background, which we call the inversion representation of the Minkowski spacetime, is the simplest non-trivial case (in the sense that it can incorporate the conformal boundary) that one can analyse in the conformal set-up. Therefore, the following analysis can be regarded as the conformal counterpart of the standard discussion of linearised (physical) Einstein field equations around flat spacetime. The inversion representation of the Minkowski spacetime is a compelling choice not only for its simplicity, but also because it is related to the i^0-cylinder representation of the Minkowski spacetime (see for instance <cit.>) which has d_μναβ=0, R = 0 with a non-trivial trace-free Ricci tensor Φ_μν≠ 0. While an analysis on the i^0-cylinder background would be of great interest, the sources in the equations for the fields other than δ d_μναβ (see Appendix <ref>) become cumbersome when Φ_μν≠ 0; this will be pursued in future work. §.§ The inversion conformal representation of the Minkowski spacetime The inversion representation of the Minkowski spacetime described in the preceding paragraph is a standard conformal representation detailed in <cit.>, which we now summarise. In what follows (ℝ^4, ) will denote the (physical) Minkowski spacetime. Let x̃^μ̃= (t̃,x̃^ĩ), represent physical Cartesian coordinates. The associated coordinate basis vectors and covectors are denoted by ∂_μ̃ and 𝐝x̃^μ̃, respectively. The components of an arbitrary abstract tensor S_ab in the physical Cartesian coordinate basis are denoted by S_μ̃ν̃. The Minkowski metric reads = η_μ̃ν̃𝐝x̃^μ̃⊗𝐝x̃^ν̃, where η̃_μ̃ν̃=diag(-1,1,1,1). Defining the physical radial coordinate via ρ̃^2= δ_ĩj̃x̃^ĩx̃^j̃ where δ_ĩj̃=diag(1,1,1) and considering an arbitrary choice of coordinates on 𝕊^2 the physical Minkowski metric can be written as =-𝐝t̃⊗𝐝t̃ +𝐝ρ̃⊗𝐝ρ̃+ρ̃^2 σ, with t̃∈(-∞, ∞), ρ̃∈ [0,∞) where σ denotes the standard metric on 𝕊^2. We now introduce the unphysical Cartesian coordinates x^μ=(t,x^i), and denote the associated vector and covector basis with ∂_μ and 𝐝x^μ, respectively. As before, the components of an arbitrary tensor S_ab in the unphysical Cartesian coordinate basis will be denoted as S_μν. The relationship between the physical and unphysical Cartesian coordinates is given by: x^μ = δ_μ̃^μ x̃^μ̃/X̃^2, X̃^2 ≡η̃_μ̃ν̃x̃^μ̃x̃^ν̃, x̃^μ̃=δ^μ̃_μ x^μ/X^2, X^2=η_μνx^μx^ν. where δ_μ̃^μ=diag(1,1,1,1), X^2=1/X̃^2 and η_μν=diag(-1,1,1,1). This coordinate transformation is valid in the complement of the lightcone at the origin in the physical Minkowski spacetime where X̃^2 > 0. The notational reason for having a tilde over the physical coordinate indices is to distinguish the physical and unphysical coordinate bases denoted by ∂_μ and ∂_μ̃. The latter requires the use of δ_μ̃^μ in the expressions (<ref>) to keep the tilded and untilded indices balanced. This notation is inspired by that of the dual foliation formalism of <cit.>. From the relation between the physical and the (unphysical) inversion coordinate bases one can construct the Jacobians J_μ̃^μ:= ∂ x^μ/∂x̃^μ̃ = X̃^-2(δ_μ̃^μ - 2 x^μx̃_μ̃), J_μ^μ̃:= ∂x̃^μ̃/∂ x^μ= X^-2 (δ^μ̃_μ-2x̃^μ̃x_μ) To identify a suitable conformal metric, it is enough to compute η_μν𝐝x^μ⊗𝐝x^ν = η_μν J_μ̃^μJ_ν̃^ν𝐝x̃^μ̃⊗𝐝x̃^ν̃. Introducing η=η_μν𝐝x^μ⊗𝐝x^ν, we write this compactly as: η=Ξ^2 , with Ξ =X^2. This demonstrates that the inversion (unphysical) Minkowski spacetime can be recast as a conformal transformation of the physical Minkowski spacetime. Although, in most of the upcoming discussion, all tensor components will be expressed in just one coordinate basis (the unphysical one), notice that, the relation between the components of a tensor S_ab in the physical and the unphysical bases is then given by S_μ̃ν̃= Ξ^2(δ_μ̃^μ - 2x^μx̃_μ̃) (δ_ν̃^ν -2x^νx̃_ν̃)S_μν. To complete the discussion, one can construct an unphysical spherical polar coordinate system. Upon introducing ρ^2=δ_ijx^ix^j, a calculation shows that the unphysical (conformal) metric η and conformal factor Ξ read η=-𝐝t⊗𝐝t +𝐝ρ⊗𝐝ρ+ρ^2 σ, Ξ=ρ^2 -t^2, with t∈(-∞,∞) and ρ∈ [0,∞). Notice that spatial infinity i^0 of the physical Minkowski spacetime (ℝ^4, ) is mapped to the origin (t=0,ρ=0) in (ℝ^4,η). Also, future and past null infinity ℐ^± of the physical Minkowski spacetime are mapped to the lightcone passing through the origin. In other words, introducing the unphysical retarded and advanced times u:=t-ρ and v:=t+ρ, future/past null infinity ℐ^± is located at v=0 and u=0 respectively. To round up the discussion between the relation the physical and unphysical coordinates, here we record that t=t̃/ρ̃^2-t̃^2, ρ = ρ̃/ρ̃^2-t̃^2. §.§ Linearised equations around the Minkowski-inversion background §.§.§ The background solution We now fix the background solution ϕ to be the Minkowski inversion background discussed in the previous subsection, <ref>. This yields the following expressions for the background fields g_μν= η_μν, Ξ= ρ^2-t^2, s= 2, T_μν=0, T_μνα=0. the latter implies that the curvature R_μναβ=0 vanishes which, in terms of its irreducible decomposition implies that Φ_μν=0, R=0, d_μναβ=0. Since one has that R=F, this fixes the background conformal gauge source function. Nonetheless, the remaining gauge source functions encoded in F^μ and δ F need not vanish and will (along with matter perturbation quantities) be left unspecified. This gives the following equations □δ g _μν = - 4 δΦ _μν + 2 δΦ ^α_αg_μν - g_μν _αF^α + 2 _(μF_ν) + 12δ F _μν □δΞ = 4 δ s - sδ g ^μ_μ + F^μ_μΞ - 16δ F □δ s = δ T^μν_μ_ν - 16sδ F - 16_μδ F ^μ □δΦ_μν = -2 δ T_(μ^α_ν)_α - _αδ T_μ^α_ν + 16_{μ_ν}δ F □δ d_μναβ = 2 _[μδ T_|αβ|ν] +2 _[αδ T_|μν|β] + 2 _β[ν_|σδ T_α|^σ_μ] + 2 _α[μ_|σδ T_β|^σ_ν]. The Lorenz gauge source functions F^μ are allowed to depend on the variables δϕ as they appear only with first derivatives in equations (<ref>). However, the conformal gauge source function δ F is only allowed to depend on the coordinates due to the second derivatives of δ F in the equation (<ref>). Although for simplicity we have fixed the notation in subsection <ref> so that x^μ denotes the unphysical Cartesian system of coordinates, in fact, equations (<ref>) are not bound to these coordinates, the only assumption used was that the background Riemann curvature R^μ_αβν vanishes. In other words, in deriving equation (<ref>), the vanishing of the (background) Christoffel symbols Γ^α_μν has not been assumed, consequently, formally identical equations to (<ref>) will hold in any coordinate system. Nonetheless, the unphysical Cartesian system x^μ will be assumed in the discussion of subsection <ref> so that one may apply standard techniques such as expressing the solutions in terms of Greens functions and multipolar expansion approaches. §.§.§ The matter relations The matter equations depend on the particular matter model in question, however, since the background matter terms are assumed to vanish, the direct linearisation of the general relations, combined with the symmetries of T_abc and T_ab described in section <ref>, yield a set of formally identical expressions that the perturbations must satisfy: δ T_μ^μ=0, _νδ T_μ^ν=0, δ T_αβμ= δ T_[αβ]μ, δ T_[αβμ]=0, _αδ T_μν^α=0. Also, one has the relations: δ T_αβγ := _[αδ T_β]γ + 3 δ T_γ[β_α]Ξ -_γ[αδ T_β]λ^λ, _αδ T_μ^α_ν =- 12Ξ□δ T_μν -4 sδ T_μν -2 _αδ T_μν ^αΞ + ^αΞ _(μδ T_ν) α. §.§.§ Propagation of the generalised Lorentz gauge Tracing equation (<ref>) and using equations (<ref>) shows that □δΦ_μ^μ=0. Recall that the linearisation of the conformal gauge constraint, translates in the present case, to the condition δΦ_μ^μ=0. This, in particular, simplifies equation (<ref>): □δ g _μν = - 4 δΦ _μν - g_μν _αF^α + _μF_ν + _νF_μ + 12δ F _μν . The condition (<ref>) is trivially propagated by equation (<ref>). Namely, if initial data is given such that δΦ_μ^μ=0 and _n δΦ_μ^μ=0 on Σ , where _n:=n^μ_μ and n^μ denotes the normal to a spacelike hypersurface Σ. Then, by existence and uniqueness of solutions to the flat-wave equation (<ref>), one has δΦ_μ^μ=0 on 𝒰⊂𝒟^+(Σ). where 𝒰 is an open set and 𝒟^+(Σ) denotes the future domain of dependence of Σ. This result can be understood as the propagation of the conformal constraint in the linear setting. To show that generalised Lorenz gauge condition (<ref>) propagates one needs to use the contracted Bianchi identity. In the CEFE language this is encoded in equation (<ref>). Hence, for completeness and future reference, we linearise the CEFEs as defined in equations (<ref>) and (<ref>) and record the result in Remark <ref>. Using equation equation (<ref>) to express (<ref>) using the trace-free Ricci tensor and linearising around a flat background gives _μδ s = - δΦ _μν ^ν + 12 ^2 δ T_μν ^ν -124δ F _μ, _μδΦ _αν - _νδΦ _αμ = δ T_μνα - δ d_αβμν ^β + 112_α [μ _ν] δ F, ^μδ d_μναβ = δ T_αβν, _μ _νδΞ = Γ[q]^λ_μν_λ +sq_μν + (δ s - 124δ F)_μνδΦ_μν + 12δ T_μν, δ R_μναβ= δ d_μναβ + 2δΦ _[ν | β_α| μ] + 2δΦ _[μ | α_β| ν] + 16δ F _[μ| α_β |ν] , where Γ[q]^α_μν := 12g^αβ( _μ q_νβ + _ν q_μβ - _β q_μν) , δ R_μναβ := 2 _[α _|[ν q_μ ]|β] . where the expressions have been written using q_μν instead of δ g_μν to avoid long expressions. Recall that δ g_μν is simply the trace-reversed version of q_μν. Contracting equation (<ref>), gives _νδΦ_μ^ν= _μδΦ_ν^ν + 18_μδ F and using equation (<ref>) one obtains _νδΦ_μ^ν= 1/8_μδ F. The divergence-fixed condition (<ref>) is also propagated by the wave equations (<ref>). To see this, notice that applying ∇^μ to equation (<ref>), using (<ref>), and after trivially commuting the flat-covariant derivative one obtains □ (^μδΦ_μν - 18_νδ F)=0. Hence, if initial data is given on Σ such that ^μδΦ_μν=18_νδ F and _n ( ^μδΦ_μν -18_νδ F) =0 then condition (<ref>) is satisfied in 𝒰⊂𝒟^+(Σ). To show propagation of the generalised Lorenz gauge (<ref>), one proceeds analogously, taking a divergence of equation (<ref>) and using equations (<ref>) and (<ref>) gives the following equation ^μ□δ g_μν = □ F_ν which can be rewritten as □ (^μδ g_μν -F_ν) = 0. Hence, if one gives initial data on Σ such that ^μδ g_μν -F_ν=0 and _n(^μδ g_μν -F_ν)=0 then by virtue of equation (<ref>) one has that (<ref>), namely ^μδ g_μν =F_ν, is satisfied on 𝒟^+(Σ). In other words, the generalised Lorenz gauge propagates. This discussion is summarised in the following The linearisation of the wave-CEFEs around the inversion-Minkowski unphysical spacetime is given by □δ g_μν = -4 δΦ _μν - g_μν _αF^α + 2 _(μF_ν ) + 12δ F _μν □δΞ = 4 δ s - sδ g ^μ_μ + F^μ_μΞ - 16δ F □δ s = δ T^μν_μ_ν - 16sδ F - 16_μδ F ^μ □δΦ_μν = -2 δ T_(μ^α_ν)_α - _αδ T_μ^α_ν + 16_{μ_ν}δ F □δ d_μναβ = 2 _[μδ T_|αβ|ν] + 2 _[αδ T_|μν|β] + 2 _β[ν_|σδ T_α|^σ_μ] + 2 _α[μ_|σδ T_β|^σ_ν]. where the matter sources satisfy the relations in equation (<ref>). The conditions δΦ_μ^μ=0, and ^μδΦ_μν=1/8_μδ F, along with the generalised Lorenz gauge condition ^μδ g_μν=F_μ, propagate. Observe that if δ F=0 is set then δΦ_μν is a TT-tensor (transverse and tracefree). Furthermore, if the Lorenz gauge condition is chosen, F_μ=0, equation (<ref>) looks formally identical to the textbook linearisation Einstein equations with an geometric-artificial matter term δΦ_μν. The initial data for the wave equations (<ref>) is not free as it needs to satisfy equations (<ref>) on Σ. The propagation of the (first order) CEFEs by the wave-CEFEs has been proven at the non-linear level in <cit.> and the result at the linear level follows from linearisation of the subsidiary system obtained in <cit.>. Also, a procedure to obtain initial data for the conformal wave CEFEs at the non-linear level has been outlined in <cit.>: one starts by solving the conformal Einstein constraint equations on Σ which constitute the spatial parts of the zero-quantities (<ref>). Then, the time derivatives of the evolved fields on Σ can be read from the zero-quantities using the solution to the conformal Einstein constraints. An analogous procedure can be performed for the linear case to obtain initial data for the wave equations (<ref>). Observe that from equations (<ref>) and (<ref>) one only needs to consider their trace-free parts as the traces give the wave equations (<ref>) and (<ref>), respectively. §.§.§ Scri-fixing gauge A difficulty with the standard CEFEs concerns the fact that in general, the conformal boundary is not fixed with respect to the coordinates. Although there exist a generalisation of the CEFEs, the extended CEFEs (see for instance <cit.>) that allows to have an explicit expression the conformal factor, this approach is based on gauge adapted to a congruence of conformal geodesics, called the conformal Gaussian gauge. The latter requires the use of more general type of connections known as Weyl connections and it is in general difficult to write explicitly the line element of physically relevant solutions in the coordinates adapted to the conformal Gaussian gauge. Here, we give an alternative simpler approach based on exploiting the gauge source functions in the wave formulation of the standard CEFEs. In the linear case, the key is to find a gauge choice such that equation (<ref>) is homogeneous. This amounts to choosing the Lorenz gauge source functions such that F^μ satisfies F^μ_μ = - 4 δ s + sδ g_μ^μ + 1/6δ F. Thus, if trivial initial data is given to equation (<ref>) on the initial hypersurface then the trivial solution δΞ=0 is obtained in the development. Hence, Ξ= and that the location of the conformal boundary of the perturbed linearised solution coincides with that of the background spacetime. Observe that to solve equation (<ref>) one needs _μ≠ 0 and although this condition does not hold at i^0, this is not a problem for foliations that end at a cut 𝒞 of ℐ (e.g. the hyperboloidal and null foliations) —see Figure <ref>. In the non-linear case one can proceed in a similar way. The non-linear version of the wave equation for the conformal factor reads: Ξ = - 16Ξ F - ℋ^μ∇_μΞ + 4 s where := g^μν∂_μ∂_ν and x^μ is a fiduciary coordinate system —see Appendix <ref>. One can follow the same approach as in the linear case and think of Ξ as a given function of the coordinates and solve for the gauge source functions. Although this approach is of limited use for the Cauchy problem as ∇_μΞ vanishes at i^0, this is not an issue for foliations which end at a cut 𝒞 of ℐ for which ∇_μΞ≠ 0. As a concrete example and to make contact with the hyperboloidal framework of <cit.> consider an unphysical coordinate system x^μ=(τ, r, ϑ^A) with A=1,2, related to physical coordinates x̃^μ̃ =(t̃, r̃, ϑ^A) according to the standard hyperboloidal prescription t̃= τ + H(r̃) and r̃= r/Ω (r) where H and Ω are known as the height and compression functions. If one sets Ξ= Ω(r) then equation (<ref>) fixes one of the components of the coordinate gauge source functions ℋ^μ as: ℋ^r = - Ω”/Ω'g^rr + 4s/Ω' - Ω/6Ω' F. where Ω' := dΩ/dr. If the slice is hyperboloidal then Ω' ≠ 0 at ℐ. In <cit.> a similar gauge-fixing is developed, however in the previous work the evolution equations are formally singular while in the CEFE approach of this paper the equations are formally regular. Also, the general strategy put forward here is not bound to the hyperboloidal and asymptotically flat set-up as a similar scri-fixing procedure could be adapted to study spacetimes with de-Sitter (and anti-de-Sitter) asymptotics using CEFEs similar to the case of <cit.> and <cit.> where the gauge was fixed using, instead, a congruence of conformal geodesics. Recall that g_ab=Ξ^2g̃_ab, hence for the linear perturbations one has: δ g_μν=Ξ^2δg̃_μν + 2Ξg̃_μνδΞ . Using the above described gauge to set δΞ=0, then equation (<ref>) reduces to δ g_μν=Ξ^2 δg̃_μν. However, it should be stressed that δg̃_μν≠δg̃_μ̃ν̃. Namely, δg̃_μν denotes the components of the physical metric perturbation δg̃_ab in the unphysical Cartesian coordinate basis ∂_μ. Using equation (<ref>) one sees that the expression for the physical metric perturbation in the physical Cartesian coordinate basis ∂_μ̃ is given by δg̃_μ̃ν̃ = (δ_μ̃^μ -2x^μx̃_μ̃) (δ_ν̃^ν -2x^νx̃_ν̃) δ g_μν . §.§ General solutions to the linearised equations §.§.§ The vacuum equations In this subsection an analysis of the linearisation of the wave CEFEs in vacuum is given (later, we extend the discussion to the case where matter is included and with a more general gauge choice). To start the discussion in the simplest possible set up, consider the vacuum case with vanishing gauge source functions F_μ=δ F=0 so that the equations read □δ g_{μν} = -4 δΦ _μν, □δΞ = 4 δ s - sδ g^μ_μ, □δ g^μ_μ = 0 , □δ s =0, □δΦ_μν =0 , □δ d_μναβ =0 , subject to the constraints imposed by equations (<ref>) with vanishing matter terms. Note that we have split the metric perturbation into its trace δ g_μ^μ and its trace-free part δ g_{μν}. In this manner, one can identify the variables that satisfy homogeneous equations. §.§.§ Solutions to the homogeneous equations The solutions of homogeneous wave equations in flat spacetime are widely known and understood, but since the initial data are subject to the initial constraints (<ref>), it is perhaps appropriate to briefly discuss how one might write the solutions explicitly in terms of the initial data. For a field δ_H satisfying a homogeneous wave equation □δ_H=0, the solution may be written in the form <cit.>: δ_H(x) = - ∫_Σ d Σ^'_λ[ δ_H(x^') ∂^λ D(x,x^') - D(x,x^') ∂^λδ_H(x^') ] , where d Σ^'_λ = (1/3!)ϵ_λαβγ dx^'α∧ dx^'β∧ dx^'γ is the surface element on Σ, the underline denotes evaluation of a quantity on Σ, and the quantity D(x,x^'):=G^+(x,x^')-G^-(x,x^') is the difference between the retarded (-) and advanced (+) Green's functions, defined as G^±(x,x^') := - δ(x^0-x^' 0±|x⃗-x⃗^'|)/4π |x⃗-x⃗^'| , and satisfying the inhomogeneous equation □ G^±(x,x^') = -δ^4(x-x^'). That (<ref>) is a solution of (<ref>-<ref>) can be seen by noting that D(x,x^'), being the difference of two Green's functions, is a solution of the homogeneous wave equation. It is straightforward to show that D(x,x^')=0 if x^0=x^0', and one can also show <cit.> that D(x,x^') satisfies the properties: -. ∫_Σ d Σ^'_τ[ _H(x^') ∂^τ D(x,x^') ] |_x ∈Σ = _H(x ∈Σ) , . ∂^2 D(x,x^')/∂Δ t^2|_Δ t=0 = 0 . where Δ t:=x^0-x^' 0. Equation (<ref>) follows from the fact that for a given |x⃗-x⃗^'|, D(x,x^') is by construction an odd function in Δ t. Given (<ref>), one can verify that the coefficients in (<ref>) do in fact coincide with the initial data (though note that (<ref>) only depends on the time derivatives of the fields). Of course, as indicated earlier, the initial data for the fields must satisfy the vacuum version of (<ref>). Given the simplicity of the vacuum wave equations and their resemblance to wave equations in ordinary Minkowski space it is tempting to write the solutions in terms of plane waves. While one can certainly obtain solutions to the wave equations in this manner, a difficulty arises from the fact that even in the vacuum case, the constraints (<ref>) are nontrivial, since the background expression for Ξ in the inversion coordinates is explicitly coordinate dependent. As a result, solutions satisfying the constraints do not have a clean mode separation in a Cartesian Fourier expansion (though perhaps an alternative mode decomposition may be appropriate). §.§.§ Solutions to the inhomogeneous equations and including matter For completeness, we discuss the solutions of equations (<ref>) and (<ref>). One may begin by assuming that one has in hand initial data satisfying the constraints (<ref>). We note that the structure of the vacuum equations has a hierarchy: one can first solve for δ s, δΦ_μν, δ d_μναβ, and δ g^μ_μ, then use the result to solve for δ g_{μν} and δΞ. Schematically, one may then write the inhomogeneous wave equations for the latter two in the following form (where S is a source that depends on the background field expressions and δ s, δΦ_μν, and δ g^μ_μ): □δ_I(x) = S(x), which yields a particular solution (with x^0=t, x^' 0=t^'): δ_I_0(x) = δ_H_0(x) - ∫_t_0^t dt^'∫ d^3x⃗^'[ G^-(x,x^') S(x^') ] , where δ_H_0(x) is a solution to the homogeneous equation with initial conditions chosen so that the particular solution δ_I_0(x) has trivial initial conditions δ_I_0(x)=0 and ∂_t δ_I_0(x)=0 on Σ; this can in principle be done by evaluating the integral term and its derivative on Σ to obtain -δ_H_0(x^') and -∂_t δ_H_0(x^'). Finally, to obtain the solution corresponding to the prescribed initial data, one can then add to δ_I_0(x) a homogeneous solution of the form in equation (<ref>). Since we are interested in the initial value problem, we have chosen the retarded Green's function G^-(x,x^') in (<ref>). This is (as the reader might be aware) because G^-(x,x^') is only nontrivial for x^0 > x^' 0, so that for a given point x, the field contributions from the integral in (<ref>) depend on the values of the source in the past of x (specifically over the past light cone of x). We note that the procedure described for the inhomogeneous equation can be straightforwardly extended to the full set of non-vacuum equations (<ref>), subject to the constraints (<ref>) on the initial data. As in the vacuum case, one has a hierarchy in which one can first specify the matter sources, then solve for the variables δ s, δΦ_μν, δ d_μναβ, and δ g_μν, and finally solve for the conformal perturbation δΞ using the previously obtained results. Of course, the preceding discussion glosses over the problem of solving the matter equations, however such analysis is matter-model dependent. Hence in the present analysis they are simply regarded as given sources in the equations. §.§ The far-field approximation and quadrupole-like formulae As emphasised before, an appealing property of the wave formulation of the CEFEs is that the metric sector of the equations looks as the standard non-conformal Einstein field equations with some artificial-geometric matter term. This suggests that some of the standard techniques and approximation methods can be applied to the linearised wave CEFEs such as solving them in the far-field regime and obtaining quadrupole-like formulae. §.§.§ The far-field approximation To derive the far-field approximation, we focus our attention not to the homogeneous part of the solution to equation (<ref>) but to the part generated by the sources. For simplicity, we omit nontrivial homogeneous solutions and δ_H_0(x) in the particular solution (which corresponds to an appropriate choice of initial data), so that the solution consists only of the integral in equation (<ref>). Upon evaluating the time integral, one obtains: δ= -1/4π∫_Σ(t-|x⃗-x⃗^'|,x⃗^')/|x⃗-x⃗^'|d^3x⃗^'. This is of course just the standard expression one can find in standard textbooks—see <cit.>. To obtain a far-field expression in the unphysical set-up we start by recalling that the origin in the inversion (unphysical) Minkowski spacetime corresponds to spatial infinity i^0 for the physical Minkowski spacetime so the far-field region in physical Minkowski spacetime corresponds to a neighbourhood of the origin in the inversion Minkowski spacetime. Let ' and be a points in the physical Minkowski spacetime with physical Cartesian coordinates (0, x̃^' i) and (0, x̃^i) respectively. Expressed in unphysical Cartesian coordinates, these points correspond to (0, x^' i) and (0,x^i). Hence, the distance r between ' and can be expressed through the vector r⃗:=x⃗-x⃗^'=x⃗̃⃗ -x⃗̃⃗^'. In terms of the physical coordinates, imposing the far-field approximation means |x⃗̃⃗|>>|x⃗̃⃗^'|. Consequently, r:=|r⃗| = |x⃗̃⃗-x⃗̃⃗^'| ≃ |x⃗̃⃗| =1/|x⃗|= 1/ρ. Therefore, in the far-field approximation one can write δ≃ -ρ/4π∫_ℝ^3 (t-r,x⃗^')d^3x⃗^'. In particular, for the case where δ is either δΦ_μν, δ g_μν or δ d_αβμν one can derive quadrupole-like formulae. To do so, it is necessary to compute the divergence of the source terms appearing in equations (<ref>), (<ref>) and (<ref>). Let's define 𝒮_μν :=-4 δΦ _μν - g_μν _αF^α + _μF_ν + _νF_μ + 12δ F _μν S_μν :=-2 δ T_(μ^α_ν)_α - _αδ T_μ^α_ν + 1/6_{μ_ν}δ F, S_μναβ := 2 _[μδ T _|αβ|ν] + 2 _[αδ T_|μν|β] + 2 _β[ν_|σδ T_α|^σ_μ] + 2 _α[μ_|σδ T_β|^σ_ν]. Recall that the fields encoded in ϕ satisfy the CEFEs, hence the background conformal factor satisfies Z_ab=0 as defined in equation (<ref>), which for the flat background case reduces to _μ _ν = s_μν. A direct calculation using the latter expression and the matter relations (<ref>) shows that ^ν𝒮_μν=□F_μ, ^ν S_μν= 18□_νδ F, ^λ S_λασβ = □δ T_σβα. The first two equations simply encode equations (<ref>) and (<ref>) in a divergence-like format. The third equation in (<ref>) shows that equation (<ref>) propagates. For the scalar variables δ s and δΞ, the leading order source terms can be evaluated directly. In the case of rank-2 tensors, a reason for reducing the sources to quadrupole form is to make the field dependent on a single (the time-time) component of the source tensor. §.§.§ A quadrupole-like formula for δΦ_μν and δ g_μν Here, we derive quadrupole-like formulae for δΦ_μν and δ g_μν, which we discuss in tandem. Since the source term 𝒮_μν contains δΦ_μν [cf. equation (<ref>)] first one solves for δΦ_μν and then for δ g_μν. Let δ Q_μν = δΦ_μν or δ g_μν and ℱ_μ = 18_μδ F or F_μ, and σ_μν = S_μν or 𝒮_μν, respectively. Exploiting that equations (<ref>) and (<ref>) can be collectively written as ^νδ Q_μν= ℱ_μ one has that _0 δ Q_00=^iδ Q_i0 -ℱ_0, _0 δ Q_0i=^jδ Q_ij -ℱ_i, Thus, once δ Q_ij is determined, δ Q_0i can be obtained by formally integrating the second equation in (<ref>). In turn, δ Q_00 is obtained by integrating the first equation in (<ref>). For the particular case of δΦ_μν one could instead use that δΦ_μ^μ=0 to solve algebraically for δΦ_00. Thus, one can reduce the discussion to that of obtaining a quadrupole-like formula for δ Q_ij. Recall that the far-field approximation reads δ Q_ij≃ -ρ/4π∫_Σσ_ij(t-r,x⃗^')d^3x⃗^'. If one were to restrict the calculations to gauge source functions satisfying □F^μ = □_μδ F= 0 (in particular, F^μ= δ F=0) then the integrand would satisfy ^νσ_μν=0 leading to an expression which is formally identical to the quadrupole formula in the non-conformal set-up for the physical metric perturbation —see for instance <cit.>. However, it is instructive to keep the gauge source function terms since it will serve as model for the derivation of the quadrupole-like formula for the rescaled Weyl tensor where the divergence of the source term S_μναβ cannot be set to zero by gauge considerations —see the last equation in (<ref>). Here, we only assume that the gauge source functions are specified. The first two equations (<ref>) in the current notation read ^νσ_μν = □ℱ_μ, which in components read _0σ^00 + _iσ^i0 =□ℱ^0, _0σ^0i + _jσ^ij = □ℱ^i. Integrating _i(σ^ikx^' j) over a region Ω⊂Σ and using Gauss' law gives the following identity ∫_∂Ωσ^ik x^' j ds_i =∫_Ωσ^jkd^3x⃗^' + ∫_Ω x^' j_i σ^ikd^3x⃗^', where we have used _i x^' j = δ_i^j and ds_i is the surface element of ∂Ω. It will be assumed that the matter fields encoded in S_μν and S_μναβ, as defined in equation (<ref>), have compact support in Ω⊂ℝ^3. Recall that □Φ_μν=S_μν, then under assumption <ref> it follows that δΦ_μν has compact support in Ω. Furthermore, choosing the gauge source function F^μ appropriately, one can then assume that that 𝒮_μν [as given in equation (<ref>)] has compact support in Ω. Using assumption <ref> and Remark <ref>, equations (<ref>) and (<ref>) give ∫_Ωσ^jkd^3x⃗^'=-∫_Ωx^'(j□ℱ^k)d^3x⃗^' + d/dt^'∫_Ωx^'(jσ^k)0d^3x⃗^'. Similarly, integrating _k(σ^0kx^' ix^' j) over a region Ω and proceeding as before, making use of Gauss' law one obtains ∫_∂Ωσ^0kx^' ix^' j ds_k =∫_Ω x^' ix^' j_k σ^0kd^3x⃗^' + 2 ∫_Ω x^' (iσ^j)0d^3x⃗^'. Then using Remark <ref> and equations (<ref>) and (<ref>) renders ∫_Ω x^'(iσ^j)0d^3x⃗^' = -1/2∫_Ω x^' ix^' j□ℱ^0 d^3x⃗^' + 1/2d/dt^'∫_Ω x^' ix^' jσ^00d^3x⃗^' Combining equations (<ref>) and (<ref>) one gets ∫_Ωσ^jkd^3x⃗^' = 1/2d^2/dt^'^2∫_Ω x^' i x^' jσ^00d^3x⃗^'-1/2d/dt^'∫_Ω x^' ix^' j□ℱ^0 d^3x⃗^' -∫_Ωx^'(j□ℱ^k)d^3x⃗^' therefore, using the far-field approximation (<ref>) gives δ Q_ij≃ -ρ/8πd^2ℐ_ij(t')/dt'^2|_t'=t-r +ρ/8πd𝒥_ij(t')/dt'|_t'=t-r -ρ/4π𝒦_ij(t')|_t'=t-r where ℐ^ij:= ∫_Ωσ^00x^' ix^' jd^3x⃗^', 𝒥^ij := ∫_Ω x^' ix^' j□ℱ^0d^3x⃗^', 𝒦^ij := ∫_Ω□ℱ^(ix^' j) d^3x⃗^'. As discussed earlier, the gauge source functions could be set to zero, but in certain applications, it can be useful to consider general gauge source functions. Of course, one may wish to implement a scri-fixing gauge for this situation, but such a gauge may be incompatible with the assumption that 𝒮_μν has compact support in Ω. However, the purpose of the present analysis is to provide a template for deriving the quadrupole formula for the Weyl tensor, in which such a scri-fixing gauge can be implemented. The reader might wonder whether quadrupole-like formulae are appropriate for trace-free energy-momentum tensors, which often corresponds to that of radiation. The concern is that in order to implement the far-field approximation, one implicitly assumes a slow-motion approximation, which is inconsistent with radiation propagating at the speed of light. However, geons <cit.> and photon stars <cit.> provide examples of stationary compact sources formed from self-gravitating radiation, which may at the very least provide useful toy models (the extension of our results to the case of nonvanishing trace will be discussed elsewhere). Nevertheless, the primary reason for the preceding analysis is to provide a template for deriving the quadrupole formula for the rescaled Weyl tensor, which can be straightforwardly generalised to the case with trace. This is discussed further in Remark <ref>. §.§.§ A quadrupole-like formula for the rescaled Weyl tensor perturbation We now turn to the case of the rescaled Weyl tensor δ Q_αβμν=δ d_αβμν. Here, the source term S_αβμν is given entirely in terms of matter fields —see equation (<ref>). Expanding in components the divergence equation (<ref>) one has _0 S^0μσν + _k S^kμσν = □δ T^σνμ Considering the case σ=j in equation (<ref>) one has _0 S^0μ j ν + _k S^kμ j ν = □δ T^j νμ Integrating _k ( S^k μ j ν x^' i) over Ω and using Gauss' law gives ∫_∂Ω S^k μ j νx^' i ds_k = ∫_Ω S^iμ jν d^3x⃗^' + ∫_Ω x^' i_k S^k μ j ν d^3x⃗^' Using assumption <ref> the boundary term in the left-hand side of (<ref>) vanishes. Solving for the integral with S^iμ j ν and substituting _k S^k μ j ν using equation (<ref>), gives the following expression (after symmetrising the spatial indices): ∫_Ω S^(i |μ| j) νd^3x⃗^' = - ∫_Ω x^' (i□δ T^j)νμ d^3x⃗^' + d/dt^'∫_Ω x^' (i| S^0μ |j) ν d^3x⃗^' . Now, considering the case σ =0 in equation (<ref>) one has _0 S^0ν 0 μ + _k S^k ν 0 μ = □δ T^0 μν. Integrating _k ( S^0 μ k ν x^' ix^' j) over Ω and using Gauss' law gives ∫_∂Ω S^0 μ k νx^' ix^' j ds_k = 2 ∫_Ω S^0 μ (j |ν| x^' i) d^3x⃗^' + ∫_Ω x^' ix^' j_k S^0 μ k ν d^3x⃗^'. Using assumption <ref> to remove the boundary terms and exploiting the pair-interchange-symmetry of S_μναβ to rewrite _k S^0 μ k ν in using equation (<ref>) renders ∫_Ω S^0 μ (j |ν| x^' i)d^3x⃗^' = -1/2∫_Ω x^' ix^' j□δ T^0 μν d^3x⃗^' + 1/2d/dt^'∫_Ω x^' ix^' j S^0ν 0 μd^3x⃗^'. Together, equations (<ref>) and (<ref>) give ∫_Ω S^(i |μ| j) ν d^3x⃗^' = 1/2d^2/dt^'^2∫_Ω x^' ix^' j S^0ν 0 μd^3x⃗^' -1/2d/dt^'∫_Ω x^' ix^' j□δ T^0 μνd^3x⃗^' - ∫_Ω x^' (i□δ T^j)νμ d^3x⃗^'. To employ equation (<ref>) one needs to perform an electric-magnetic decomposition of the tensors involved in the current discussion. Consider any tensor W_abcd with the symmetries of the Weyl tensor and let n^a be a normalised timelike vector such that n_an^a=-1. Define the associated projector as h_a^b:=g_a^b + n_an^b. Then, the electric part E_ab and magnetic part B_ab of W_abcd are given by E_ab:=W_efgdn^fn^dh_a^eh_b^d, B_ab:=W^*_efgdn^fn^dh_a^eh_b^d, where B_ab=-12ϵ_cd^efW_abef with ϵ_abcd is the (4-dimensional) volume-form of g_ab. In practice (particularly when working in an adapted frame), instead of working directly with B_ab it is simpler to use B_abc:=W_efghn^fh_a^eh_b^gh_c^h, which is related to B_ab via B_ab= - 1/2B_acdϵ_b^cd where ϵ_abc:=ϵ_fabcn^f is the (3-dimensional) volume-form of h_ab —see <cit.> for further discussion on the electric-magnetic decomposition. In the present case, since the background is flat, one can simply take the normal vector to be n^ν= δ_0^ν so that the electric-magnetic split of d_μναβ simply correspond to δ d_ij:= δ d_i0j0, δ d_ijk:=δ d_i0jk. The wave equation for δ d_μναβ, which compactly written reads □δ d_μναβ= S_μναβ, can then be split into the wave equations for d_ij and d_ijk: □δ d_ij= S_ij, □δ d_ijk= S_ijk, where S_ij:= S_i0j0 and S_ijk:= S_i0jk. Using the far-field approximation expression (<ref>) and equation (<ref>) then gives δ d_iμ j ν≃ -ρ/8πd^2I_ijμν(t')/dt'^2|_t'=t-r +ρ/8πdJ_ijμν(t')/dt'|_t'=t-r +ρ/4π K_ijμν(t')|_t'=t-r, where I^ij μν:=∫_Ω y^iy^j δ S^0ν 0 μd^3y⃗, J^ij μν:=∫_Ω y^iy^j □δ T^0 μνd^3y⃗, K^ij μν:= ∫_Ω y^(i□δ T^j)νμ d^3y⃗. In particular, setting μ=0 and ν=0 one gets the quadrupole-like expression for δ d_ij and similarly taking μ=0 and ν = k for δ d_ijk. Proceeding as described before and exploiting the symmetries of S^μναβ (those of the Weyl tensor) and those of δ T^αμν [cf. equation (<ref>)] renders δ d_ij≃ρ/4π K_ij00(t')|_t'=t-r , δ d_ijk≃ρ/4π K_ijk0(t')|_t'=t-r, Recall that the rescaled Cotton tensor T_αμν can be expressed in terms of the derivatives of the unphysical energy momentum tensor. Therefore equation (<ref>) allows one to express the perturbation to the rescaled Weyl tensor in the far-field approximation in terms derivatives of the perturbation to the unphysical energy momentum tensor δ T_μν and background quantities via equation (<ref>). Although the focus of this article has been in the conformal spacetime set-up —and hence restricted to trace-free matter models— an analogous calculation can be performed directly in the physical spacetime, lifting then the trace-free matter restriction, obtaining a quadrupole-like formula for perturbations of the Weyl tensor. Observe that, for the derivation of the wave equation satisfied by the rescaled Weyl tensor, the specific form of the rescaled Cotton tensor (in terms of the unphysical energy-momentum tensor) is never used. It follows that for the physical set-up, one gets a formally identical equation. The wave equation for the Weyl tensor has been derived for instance in <cit.> and <cit.>. Therefore, the analysis of section <ref> would still hold replacing the rescaled Weyl tensor d_abcd with the Weyl tensor C_abcd and the rescaled Cotton tensor T_abc by its physical counterpart T̃_abc which written in terms of the physical energy-momentum reads: T̃_abc:= ∇̃_[aT̃_b]c + 1/3g̃_c[b∇̃_a](λ- T̃). We note that the expression for S_μναβ is independent of the choices for the gauge source function. For this reason, one can choose the scri-fixing gauge independently of the assumption that S_μναβ has compact support in Ω; the quadrupole-like formula we obtain for the rescaled Weyl tensor is therefore compatible with any gauge choice, in particular the scri-fixing gauge introduced earlier. § SUMMARY AND DISCUSSION In this article, we have presented the linearisation of the wave-like hyperbolic reduction of the CEFEs in a GHG gauge for a general background. As a first step toward studying the linear perturbations of spacetimes using the conformal CEFE approach, the equations have been particularised to the case where the background is the inversion (unphysical) Minkowski spacetime. Conceptually, when studying perturbations of the physical Minkowski spacetime, one can in principle use any conformally flat metric so that d_μναβ=0. However having a non-vanishing Φ_μν makes the equations quite cumbersome. Hence, as a first analysis, we have opted to use as a background the inversion Minkowski spacetime for which Φ_μν=R=0. For this background, we discuss the propagation of the gauge (the generalised Lorenz gauge and the linear version of the conformal constraints). The fact that the chosen background is flat permits the use of techniques similar to those of the classical methods in physical spacetime to study gravitational waves. In this manner, we have obtained the conformal CEFE counterpart of the classical linearisation of the (physical) Einstein field equations. Nevertheless, one may wish to consider linearising around non-flat conformal representations of the Minkowski spacetime. A particularly interesting choice is the i^0-cylinder representation of Minkowski spacetime, as this is particularly useful for studying the gravitational field close to the critical sets ℐ^±—the region where null-infinity ℐ and spatial infinity i^0 meet. Although this analysis has been done via the spin-2 equation ∇_A'^Aϕ_ABCD=0 in <cit.> (see also <cit.> for a discussion of the solutions of wave equations in this background) where it has been shown that the (linearisation of rescaled Weyl spinor) spin-2 field develops logarithmic terms, it would be of interest to see how these logarithmic terms manifest in the metric, which is the variable employed in most perturbation schemes in physics (such as the post-Minkowskian expansions). Another interesting class of backgrounds are Petrov type D spacetimes such as Kerr, so that a conformal Teukolsky-like equation may be obtained; however, a different linearisation procedure (such as that of Chandrasekhar<cit.>), may be more appropriate in that case. These avenues will be pursued in future work. More generally, the present work represents a first step into studying linear perturbations of spacetimes of physical interest within the CEFE framework. A particularly useful result of this paper is the development of a scri-fixing strategy using gauge source functions for CEFEs. Our strategy provides an alternative to more abstract gauges based on conformal curves and conformal geodesics <cit.>, one that is particularly well-suited for numerical implementation. Though the strategy is initially developed for the linearised equations (which are expected to be good approximation in the weak field region of asymptotically flat spacetimes of physical interest), the generalisation to the nonlinear case, as discussed in the main text, is straightforward. A minor limitation of this scri-fixing strategy in the asymptotically flat setting is that the initial data must be prescribed on slices that intersect future null infinity (as opposed to spatial infinity), nonetheless our scri-fixing strategy fits well within the hyperboloidal approach to Numerical Relativity. Finally, we have constructed quadrupole-like formulae for the CEFEs linearised around a flat background. While the quadrupole-like formulae for δ g_μν and δΦ_μν require gauge source functions with compact support and a trace-free energy-momentum tensor, the quadrupole-like formula we obtain for the Weyl tensor is independent of gauge choice and is formally identical to the case where the energy-momentum tensor has nonvanishing trace. Since the Weyl tensor yields an unambigious notion of gravitational radiation at future null infinity, our result provides a familiar prescription for computing gravitational waveforms at null infinity generated by weakly gravitating sources in the linear approximation. §.§ Acknowledgements We have profited from conversations with Juan Valiente Kroon and David Hilditch and Alex Vañó Viñuales. We also thank J. Valiente Kroon for sharing a Mathematica notebook where the main calculations of <cit.> were done. EG holds a FCT (Portugal) investigator grant 2020.03845.CEECIND. JF acknowledges support from FCT (Portugal) program UIDB/00099/2020. JF is grateful to the Yukawa Institute for Theoretical Physics, Kyoto University, which hosted a visit during which a part of this work was performed. § EXPLICIT EXPRESSIONS FOR LINEARISED CEFES Here, we provide expressions for the right-hand side of the linearised wave-CEFEs, which are given below (ϕ and schematically representing the respective field variables and gauge sources): □δ g_μν = H^g_(μν)(δϕ, δϕ ; ϕ, , ϕ, ) □δΞ = H^Ξ_(δϕ, δϕ ; ϕ, , ϕ ) □δ s = H^s(δϕ, δϕ ; ϕ, , ϕ, ) □δΦ_μν = H^Φ_(μν)(δϕ, δϕ ; ϕ, , ϕ, , F, δ F ) □δ d_μναβ = H^d_[μν][αβ](δϕ, δϕ ; ϕ, , ϕ, ϕ, ) . To give more concise expressions, the quantities on the right-hand side of the equations above are provided below without explicit (anti)symmetrisation; the appropriate (anti)symmetrisation of indices is indicated in equation (<ref>). This calculation has been performed using the xPert package of the suite xAct in Mathematica <cit.> for metric perturbation theory. H^g_μν := -4 δΦ _μν +8 _(μ^αδ g_ν )α -2 δ g^αβd_(μ |α |ν )β + 16δ g_μν + δ g^α_α (-2 _μν - 16_μν) + 2 _(μ_ν ) + _μν (12δ F + 2 δΦ ^α_α -2 ^αβδ g_αβ - _α^α) H^Ξ_ := - 16 δΞ- 16 δF + 4 δs + (12 ^3 ^μν - ^μν) δg_μν + (124 - s) δg^μ_μ + ^μ _μ H^s := (12)^2 (δΞ - 14δ g^μ_μ) + ^μν (2 δΦ _μν - ^3 δ T_μν + _μν (δΞ + 12δ g^α_α) + 112δ g_μν - sδ g_μν - _μ^αδ g_να) + ^μν (- ^3 δΦ _μν + 12 ^5 δ T_μν - 12 ^2 _μν (6 δΞ + δ g^α_α) + 18 ^4 _μν (10 δΞ + δ g^α_α) + 12 ^2 δ g_μν ( s - 112 ) + ( ^3 _μ^α - 14 ^5 _μ^α ) δ g_να) + 24 ( sδ g^μ_μ + 13 (δ F - 12 δ s - 3 ^μ _μ ) ) + 16 ^μ (3 δ g^να ( ^2 _α_μν -2 _α _μν) - _μδ F) - 16 ( sδ F + _μδΞ ^μ) - ^μ _μν ^ν + (δ T_μν - _μ^αδ g_να) ^μ ^ν + 18δ g_μν ^μ ^ν + _μν (12 ^2 ^μ^ν + 2 ^μ ^νδΞ + (δΞ + 12δ g^α_α) ^μ ^ν) H^Φ_μν := 13δΦ _μν + 12 ^3 ^αδδ d_μανδ - 2 _μ^δ _νδδ g^α_α - 112 _μν (2 δ F + δ g^α_α) - 2 _μ^αδ g^δβ_νδαβ + _μανδ (-2 ^αδδΞ + 12 (3 ^αδδΞ - 4 δΦ ^αδ + ^2 δ T^αδ)) + 124 (δ g^α_α_μν - 12δ g_μν) □ _ + (4 ^αδδ g_α^β - ^δβδ g^α_α + 14 ^3 ( -4 ^αδδ g_α^β + ^δβδ g^α_α) ) _μδνβ - 2 δ T_μ^α_ν _α + ^αδ ( - 2 δ d_μανδ - 2 _μνδ g_αδ - _αδδ g_μν - 2 δΦ _αδ_μν + 2 _α^βδ g_δβ_μν) - 2 _μ^α_ν _αδΞ + ^α (_μαν + _α _μν) + δ g^αδ _α_μδν + _αδ g_νδ ( - ^αδ_μ + 12_μ^αδ + 2 ^α _μ^δ) - ^αδ T_μαν - δΞ ^α_μαν + 2 δ g^αδ_μαν _δ + (- 12_μ^αδ -2 ^α _μ^δ) _δδ g_να + 112 _αδ g_μν ^α + 124_μν( - _αδ g^δ_δ^α + ^α _α + δ g^αδ _δ _α) + δ g^αδ _δ _α _μν + _αδ g^δ_δ ( - 34_μ^α_ν - ^α _μν + _μ _ν^α) - 16 ^α _μδ g_να - ( 14_μ^α_α + ^α _μα) _νδ g^δ_δ + _μ^α (4 δΦ _να + 2 _ν^δδ g_αδ + 16δ g_να + 2 _α^δδ g_νδ + 2 _ν_α) + (12_μ^αδ + 2 ^α _μ^δ) _νδ g_αδ + 112 _μ _νδ g^α_α - 112δ g^α_α _ν _μ + 16 _{ν _μ}δ F H^d_μναβ := 12δ d_μναβ - ^2 _α^δδ d_μνβδ - ^2 _μ^δδ d_νδαβ - ( 12δ F + 4 ^δσδ g_δσ + 112δ g^δ_δ) _μναβ + (-2 _α^δδΞ + 4 δΦ _α^δ - ^2 δ T_α^δ - 16δ g_α^δ + 2 _α^δδ g^σ_σ) _μνβδ - 2 δ d_α^δ_β^σ_μνδσ + (-2 ^δσδ g_αδ + ^2 _α^δδ g_δ^σ - 6 _α^δδ g_δ^σ) _μνβσ - 2_αδβσ ( δ d_μν^δσ + δΞ_μν^δσ) - (2 _μ^δδΞ - 4 δΦ _μ^δ + ^2 δ T_μ^δ + 16δ g_μ^δ - 2 _μ^δδ g^σ_σ) _νδαβ + 4 δ g_μα _δ_β^δ_ν + _μαβ _νδ g^δ_δ - 2(4 δ d_μ^δ_α^σ + ^2 ^δσδ g_μα + 2 δΞ_μ^δ_α^σ) _νδβσ + ( ^2 _μ^δδ g_δ^σ - 6 _μ^δδ g_δ^σ -2 ^δσδ g_μδ) _νσαβ + 2δ g^δσ ( _βδσγ_μνα^γ + _μ^γ_αβ_νδσγ) + 4 δ g^δσ ( _ασβγ_μνδ^γ + _μ^γ_αδ_νγβσ + _μδα^γ_νσβγ) - δ g^δ_δ ( _ασβγ_μν^σγ + 2 _μ^σ_α^γ_νσβ g) - 2 (2 ^δσδΞ + δ T^δσ) _μδασ_νβ + F ^δ _δ_μναβ + ^δσδ g_δ^γ (2^2_μγασ_νβ + 2 ^2 _μσαγ_νβ) + 2 _αδ T_μνβ + 2 _μναδ _β^δ - _μαν _βδ g^δ_δ + _νβ (-2 ( ^2 ^δσδ d_μδασ + 2 ^δ_αδμ) + (4 _α^δ_μ + _μα^δ + _μ^δ_α) _δδ g^σ_σ) - _μβ_α^δ_δ _νδ g^σ_σ + 2 _μδ T_αβν - δ g^δ_δ ( _α_μνβ + _μ_αβν) + 2 _μδαβ _ν^δ + 4 _(α^δ_μ ) ( _βδ g_δν + _νδ g_βδ - _δδ g_βν) + 4 ^δσ_μ_να _σδ g_βδ + 2 _μβ_α^δσ ( _δδ g_νσ + _νδ g_δσ - _σδ g_νδ) + 4 _[δ_|μνβ| σ] ^σδ g_α^δ + _μα (4 _δδ T_β^δ_ν - 4 δ g^δσ _σ_βδν - 2 δ g^δ_δ _σ_β^σ_ν) - 2 _αδ g^δσ _σ_μνβδ - 2 _μδ g^δσ _σ_νδαβ + 8 _[σ_δ] ναβ ^σδ g_μ^δ - 2 ( _[α_|μνβ| σ] + _[μ_|ν| σ]αβ ) ^σδ g^δ_δ + δ g^δσ _σ _δ_μναβ § REDUCED WAVE EQUATIONS In this appendix, we extend the analysis leading up to (<ref>) to the other wave equations listed in (<ref>) for the sake of completeness. In particular, we wish to recast (<ref>) explicitly as a system of second order hyperbolic equations. This non-linear system of wave equations was originally derived in <cit.> using slightly different set of variables and a different reduced wave operator. First observe that in general, the geometric wave operator acting on a tensor will give rise to derivatives of the Christoffel symbols. Since the metric is a variable of the system, this is problematic for hyperbolicity. In particular, for a covector w_a one has □ w_μ= w_μ - w^ν∇ _αΓ_νμ^α -2 Γ_νμα∇ ^αw^ν - Γ _ν∇ ^νw_μ - Γ^α_μ^βΓ_ναβ w^ν - Γ_νμ^αΓ _α w^ν. In this appendix, indices are raised and lowered with the metric g_μν. Observe that the second term in the right-hand side of equation (<ref>) represents second derivatives of the metric. However, one can replace these derivatives of the Christoffel symbols by noticing the identity g^μα∇ _αΓ ^β_νμ = - R_ν^β+Γ^βμαΓ _μνα - Γ^β_νμΓ ^μ + ∇ _νΓ^β. Exploiting the identity (<ref>) a direct calculation gives □ w_μ = w_μ + 1/4 R w_μ + 2 Φ _μν w^ν - ℒ_Γ w_μ -2 Γ_νμα∇ ^αw^ν -2 Γ^α_μ^βΓ_ναβ w^ν where ℒ_Γ is the Lie-derivative along Γ^a. Using the definition of the conformal and the GHG-constraints one can rewrite the last expression as □ w_μ = w_μ + 1/4 C w_μ - ℒ_C w_μ + 1/4 F w_μ + ℒ_ℋ w_μ + 𝒬(w)_μ where ℒ_C and ℒ_ℋ are the Lie derivative along C^a and ℋ^a respectively and 𝒬(w)_μ := 2 Φ _μν w^ν -2 Γ_νμα∇ ^αw^ν -2 Γ^α_μ^βΓ_ναβ w^ν One can generalise the latter calculation for tensor of type (0,n) as follows □ w_μ_1 ...μ_n = w_μ_1 ...μ_n + n/4 C w_μ - ℒ_C w_μ_1 ...μ_n + n/4 F w_μ_1 ...μ_n + ℒ_ℋ w_μ_1 ...μ_n + 𝒬(w)_μ_1 ...μ_n where 𝒬(w)_μ_1 ...μ_n := 2 Φ _μ_1ν w^ν_μ_2...μ_n -2 Γ_νμ_1α∇ ^αw^ν_μ_2...μ_n -2 Γ^α_μ_1^βΓ_ναβ w^ν_μ_2...μ_n + ...+ + 2 Φ _μ_nν w_μ_1...ν_n-1^ν -2 Γ_νμ_nα∇ ^αw_μ_1...μ_n-1^ν -2 Γ^α_μ_n^βΓ_ναβ w_μ_1...μ_n-1^ν. Then, by imposing the conformal and GHG-constraints are satisfied so that C=0 and C^a=0 one effectively has effectively removed the problematic terms for hyperbolicity: □ w_μ_1 ...μ_n = w_μ_1 ...μ_n + n/4 F w_μ_1 ...μ_n + ℒ_ℋ w_μ_1 ...μ_n + 𝒬(w)_μ_1 ...μ_n Applying the latter rule on each of the fields appearing on the geometric wave equations one obtains a set of hyperbolic non-linear wave equations which read as follows. For the components of the metric: g_μν = - 4Φ_μν - 12F g_μν - 2 ∇ _(μℋ_ν) - g^σδg^αβ (Γ_νδβΓ_σμα + 2Γ_δνβΓ_(μν) α ). For the components of the trace-free Ricci tensor: Φ_μν = - 16Φ _μν F -ℒ_ℋΦ_μν - 𝒬(Φ)_μν + 16∇ _{μ∇ _ν}F + 4 Φ _μ^αΦ _να - Φ _αβΦ ^αβ g_μν -2 ΞΦ ^αβ d_μανβ + 12Ξ ^3 T^βα d_μβνα - Ξ∇ _αT_ν^α_μ - 2T_(μ|α|ν)∇ ^αΞ. For the components of the rescaled Weyl tensor: d_μναβ = -12F d_μναβ -ℒ_ℋd_μναβ -𝒬(d)_μναβ + 2 Ξ d_μ^σ_β^λ d_νσαλ -2 Ξ d_μ^σ_α^λ d_νσβλ -2 Ξ d_μν^σλ d_ασβλ - Ξ^2T_[α^σd_β]σμν - Ξ^2T_[μ^σd_ν]σαβ + Ξ^2T^σλ( d_μσλ[αg_β]ν - d_νσλ[αg_β]μ ) + 2 ∇_[μT_|αβ|ν] +2 ∇_[αT_|μν|β] + 2 g_β[ν∇_|σT_α|^σ_μ] + 2 g_α[μ∇_|σT_β|^σ_ν]. For the Friedrich scalar: s = - 16 F s - ℒ_ℋ s - 16 g_μν∇ ^μΞ∇ ^νF + (F12)^2 Ξ + ΞΦ _μνΦ ^μν + 14Ξ^5 T_μν T^μν - Ξ ^3 T^μνΦ _μν + Ξ T_μν∇ ^μΞ∇ ^νΞ. For the conformal factor: Ξ = - 16Ξ F - ℒ_ℋΞ + 4 s . In vacuum, the hyperbolicity of the wave equations (<ref>) is clear. However, for the case with matter T_ab=T_ab(τ, ∇τ), one could at first instance question their hyperbolicity due to the presence of first derivatives of the rescaled Cotton tensor T_abc which encode second derivatives of the energy-momentum tensor T_ab —hence the equations contain two (or more) derivatives of the matter fields τ. Nonetheless, one can still ensure hyperbolicity constructing wave equations for τ and ∇τ so that T_abc is expressed in terms of evolved fields only. For instance, in the case of the conformally invariant scalar field T_ab=T_ab(ϕ, ∇ϕ) one needs to construct wave equations for ϕ and a reduction variable φ=∇ϕ —see <cit.>. Since this is a case-dependent analysis and this has been done in <cit.> for a number of matter models, further discussion is omitted. In <cit.> the reduced wave operator is defined so that the lower order contributions (along with terms involving the gauge source functions) are absorbed into the definition of the operator ▪ in such a way that the reduced equations look formally identical to the geometric ones. Here the standard reduced wave operator :=g^αβ∂_α∂_β used in most discussions of generalised harmonic gauge in Numerical Relativity was employed instead. The initial data for the reduced wave equations (<ref>) have to satisfy Z_μν|_Σ=0, Z_μ|_Σ=0, δ_μνσ|_Σ=0, λ_μνσ|_Σ=0, Z|_Σ=0. where Σ⊂ℳ is a spacelike hypersurface on which the initial data is prescribed. It should also be noticed that the GHG-constraint C^μ and the conformal constraint C are not independent, in fact a calculation shows C=∇_μ C^μ. Propagation of the gauge and a full discussion of the propagation of the constraints [i.e. propagation of the zero-quantities (<ref>)] has carefully been done in <cit.> and will not be reproduced here. The aim of revisiting the derivation of the reduced wave equations (<ref>) is simply to provide context and the non-linear analogue of the linearised equations derived in Section <ref>. unsrt 10 HilNur16 C Denson Hill and Pawel Nurowski. How the green light was given for gravitational wave search, 2016. BieGarYun17 Lydia Bieri, David Garfinkle, and Nicolas Yunes. Gravitational waves and their mathematics. 2017. Zen08 Anil Zenginoglu. Hyperboloidal evolution with the Einstein equations. Class. Quant. Grav., 25:195025, 2008. VanHusHil14 Alex Vañó-Viñuales, Sascha Husa, and David Hilditch. Spherical symmetry as a test case for unconstrained hyperboloidal evolution. Class. Quant. Grav., 32(17):175010, 2015. Van15 Alex Vañó-Viñuales. Free evolution of the hyperboloidal initial value problem in spherical symmetry. PhD thesis, U. Iles Balears, Palma, 2015. VanHus17 Alex Vañó-Viñuales and Sascha Husa. Spherical symmetry as a test case for unconstrained hyperboloidal evolution II: gauge conditions. Class. Quant. Grav., 35(4):045014, 2018. HilHarBug16 David Hilditch, Enno Harms, Marcus Bugner, Hannes Rüter, and Bernd Brügmann. The evolution of hyperboloidal data with the dual foliation formalism: Mathematical analysis and wave equation tests. Class. Quant. Grav., 35(5):055003, 2018. GasHil18 Edgar Gasperín and David Hilditch. The Weak Null Condition in Free-evolution Schemes for Numerical Relativity: Dual Foliation GHG with Constraint Damping. Class. Quant. Grav., 36(19):195016, 2019. DuaFenGasHil22 Miguel Duarte, Justin C Feng, Edgar Gasperín, and David Hilditch. Regularizing dual-frame generalized harmonic gauge at null infinity. Classical and Quantum Gravity, 40(2):025011, dec 2022. Fri81 H. Friedrich. On the Regular and the Asymptotic Characteristic Initial Value Problem for Einstein's Vacuum Field Equations. Proc. R. Soc. Lond. A, 375(1761):169–184, March 1981. Val16 Juan-Antonio Valiente-Kroon. Conformal Methods in General Relativity. Cambridge University Press, Cambridge, 2016. Fra04 Jörg Frauendiener. Conformal infinity. Living Rev. Relativity, 7(1), 2004. Fri95 H. Friedrich. Einstein equations and conformal structure - Existence of anti de Sitter type space-times. J. Geom. Phys., 17:125–184, 1995. LueVal12 Christian Lübbe and Juan Antonio Valiente Kroon. The extended conformal einstein field equations with matter: The einstein–maxwell field. Journal of Geometry and Physics, 62(6):1548–1570, jun 2012. Fri02 Helmut Friedrich. Spin-2 fields on minkowski space near spacelike and null infinity. Classical and Quantum Gravity, 20(1):101–117, dec 2002. LueVal09 C. Lübbe and J. A. Valiente Kroon. On de Sitter-like and Minkowski-like spacetimes. 26:145012, 2009. GasVal17 Edgar Gasperin and Juan A. Valiente Kroon. Perturbations of the asymptotic region of the schwarzschild–de sitter spacetime. Annales Henri Poincaré, pages 1–73, 2017. DouFra16 Georgios Doulis and Jörg Frauendiener. Global simulations of minkowski spacetime including spacelike infinity. Phys. Rev. D, 95:024035, Jan 2017. Hub99 Peter Hübner. A scheme to numerically evolve data for the conformal Einstein equation. Class. Quantum Grav., 16:2823–2843, 1999. Hub01 Peter Hübner. From now to timelike infinity on a finite grid. Class. Quantum Grav., 18:1871–1884, 2001. Hus02b Sascha Husa. Problems and successes in the numerical approach to the conformal field equations. volume 604 of Lecture Notes in Physics, pages 239–260. Springer, 2002. Val03a J. A. Valiente Kroon. Polyhomogeneous expansions close to null and spatial infinity. In J. Frauendiener and H. Friedrich, editors, The Conformal Structure of Spacetimes: Geometry, Numerics, Analysis, Lecture Notes in Physics, page 135. Springer, 2002. BeyDouFra13 Florian Beyer, George Doulis, Jörg Frauendiener, and Ben Whale. The spin-2 equation on minkowski background. In Springer Proceedings in Mathematics and Statistics, pages 465–468. Springer Berlin Heidelberg, sep 2013. Pae13 T.-T. Paetz. Conformally covariant systems of wave equations and their equivalence to Einstein's field equations. Ann. Henri Poincaré, 16:2059, 2013. CarHurVal Diego A. Carranza, Adem E. Hursit, and Juan A. Valiente Kroon. Conformal wave equations for the einstein-tracefree matter system. General Relativity and Gravitation, 51(7), jul 2019. Fri81a H. Friedrich. On the regular and the asymptotic characteristic initial value problem for Einstein's vacuum field equations. Proc. R. Soc., 375:169, 1981. Fri81b H. Friedrich. The asymptotic characteristic initial value problem for Einstein's vacuum field equations as an initial value problem for a first-order quasilinear symmetric hyperbolic system. Proc. R. Soc., 378:401, 1981. Cho08 Yvonne Choquet-Bruhat. General Relativity and the Einstein Equations. Oxford University Press, 12 2008. Fri96 H. Friedrich. Hyperbolic reductions for Einstein's equations. Class. Quantum Gravit., 13:1451–1469, 1996. Fri85 H. Friedrich. On the hyperbolicity of Einstein's and other gauge field equations. Comm. Math. Phys., 100:525–543, 1985. LinSchKid05 Lee Lindblom, Mark A. Scheel, Lawrence E. Kidder, Robert Owen, and Oliver Rinne. A new generalized harmonic evolution system. Class. Quant. Grav., 23:S447–S462, 2006. Wal84 Robert M. Wald. General relativity. The University of Chicago Press, Chicago, 1984. Rainho_master_thesis Inês Rainho. Linearized general relativity on hyperboloidal slices. Master Thesis. https://blackholes.tecnico.ulisboa.pt/gritting/theses.html#section-5, 2022. PenRin84 R. Penrose and W. Rindler. Spinors and space-time. Volume 1. Two-spinor calculus and relativistic fields. Cambridge University Press, 1984. PenRin86 R. Penrose and W. Rindler. Spinors and space-time. Volume 2. Spinor and twistor methods in space-time geometry. Cambridge University Press, 1986. GasVal20 Edgar Gasperin and Juan Antonio Valiente Valiente Kroon. Zero rest-mass fields and the Newman-Penrose constants on flat space. J. Math. Phys., 61(12):122503, 2020. GasVal21a E Gasperín and J A Valiente Kroon. Staticity and regularity for zero rest-mass fields near spatial infinity on flat spacetime. Classical and Quantum Gravity, 39(1):015014, dec 2021. MinMacVal22 Marica Minucci, Rodrigo Panosso Macedo, and Juan Antonio Valiente Kroon. The maxwell-scalar field system near spatial infinity, 2022. ValAli22 Mariem Magdy Ali Mohamed and Juan A. Valiente Kroon. Asymptotic charges for spin-1 and spin-2 fields at the critical sets of null infinity. Journal of Mathematical Physics, 63(5):052502, may 2022. DuaFenGasHil23 Miguel Duarte, Justin Feng, Edgar Gasperín, and David Hilditch. The good-bad-ugly system near spatial infinity on flat spacetime. Classical and Quantum Gravity, 40(5):055002, feb 2023. Ste91 J. Stewart. Advanced general relativity. Cambridge University Press, 1991. Hil15 David Hilditch. Dual Foliation Formulations of General Relativity. arXiv:1509.02071, 2015. MinVal23 Marica Minucci and Juan Antonio Valiente Kroon. On the non-linear stability of the cosmological region of the schwarzschild-de sitter spacetime, 2023. BarutElectrodynamics A.O. Barut. Electrodynamics and Classical Theory of Fields & Particles. Dover Books on Physics Series. Dover Publications, 1980. Mag07a Michele Maggiore. Gravitational Waves. Vol. 1: Theory and Experiments. Oxford University Press, Oxford, 2007. Wheeler1955geons John Archibald Wheeler. Geons. Phys. Rev., 97:511–536, Jan 1955. BrillHartle1964geon Dieter R. Brill and James B. Hartle. Method of the self-consistent field in general relativity and its application to the gravitational geon. Phys. Rev., 135:B271–B278, Jul 1964. AndersonBrill1997geon Paul R. Anderson and Dieter R. Brill. Gravitational geons revisited. Phys. Rev. D, 56:4824–4833, Oct 1997. Sorkin:1981wd Rafael D. Sorkin, Robert M. Wald, and Zhen Jiu Zhang. Entropy of self-gravitating radiation. Gen. Rel. Grav., 13:1127–1146, 1981. Schmidt:1999tr Heinz-Jurgen Schmidt and Felix Homann. Photon stars. Gen. Rel. Grav., 32:919–931, 2000. mitra2010likely Abhas Mitra and Norman K Glendenning. Likely formation of general relativistic radiation pressure supported stars or ‘eternally collapsing objects’. Monthly Notices of the Royal Astronomical Society: Letters, 404(1):L50–L54, 2010. Kim:2016jfh Hyeong-Chan Kim. Classifying self-gravitating radiations. Phys. Rev. D, 95(4):044021, 2017. Hol22 Jan W. van Holten. Curvature dynamics in general relativity, 2022. Bie14 Lydia Bieri and David Garfinkle. Perturbative and gauge invariant treatment of gravitational wave memory. Physical Review D, 89(8), apr 2014. Cha83a S. Chandrasekhar. The Mathematical Theory of Black Holes. Oxford University Press, Oxford, England, 1983. xAct_web José M. Martín-García. xAct: tensor computer algebra. <http://www.xact.es/>.
http://arxiv.org/abs/2303.07261v1
20230313164137
Ab initio electron-lattice downfolding: potential energy landscapes, anharmonicity, and molecular dynamics in charge density wave materials
[ "Arne Schobert", "Jan Berges", "Erik G. C. P. van Loon", "Michael A. Sentef", "Sergey Brener", "Mariana Rossi", "Tim O. Wehling" ]
cond-mat.str-el
[ "cond-mat.str-el", "cond-mat.stat-mech", "physics.chem-ph", "physics.comp-ph", "quant-ph" ]
tim.wehling@uni-hamburg.de The interplay of electronic and nuclear degrees of freedom presents an outstanding problem in condensed matter physics and chemistry. Computational challenges arise especially for large systems, long time scales, in nonequilibrium, or in systems with strong correlations. In this work, we show how downfolding approaches facilitate complexity reduction on the electronic side and thereby boost the simulation of electronic properties and nuclear motion—in particular molecular dynamics (MD) simulations. Three different downfolding strategies based on constraining, unscreening, and combinations thereof are benchmarked against full density functional calculations for selected charge density wave (CDW) systems, namely 1H-TaS2, 1T-TiSe2, 1H-NbS2, and a one-dimensional carbon chain. We find that the downfolded models can reproduce potential energy surfaces on supercells accurately and facilitate computational speedup in MD simulations by about five orders of magnitude in comparison to purely ab initio calculations. For monolayer 1H-TaS2 we report classical replica exchange and quantum path integral MD simulations, revealing the impact of thermal and quantum fluctuations on the CDW transition. Ab initio electron-lattice downfolding: potential energy landscapes, anharmonicity, and molecular dynamics in charge density wave materials Tim O. Wehling March 30, 2023 =========================================================================================================================================== § INTRODUCTION The coupling of electronic and nuclear degrees of freedom is an extremely complex problem of relevance to multiple branches of the natural sciences, ranging from quantum materials in and out of thermal equilibrium <cit.> to chemical reaction dynamics <cit.>. Long-standing problems include the simulation of coupled electronic and nuclear degrees of freedom for large systems and large time scales, in excited states of matter or systems with strong electronic correlations. A central contributor to these challenges is the complexity of first-principles treatments of the electronic subsystem usually required to address real materials. Charge density wave (CDW) materials exemplify these challenges. The bidirectional coupling between electrons and nuclei results in a phase transition, where the atoms of the CDW material acquire a periodic displacement from a high-temperature symmetric structure <cit.>. Understanding the characteristics of the CDW phase transitions, the emergence of collective CDW excitations, the control of CDW states, and excitation induced dynamics of CDW systems <cit.> requires typically simulations on supercells involving several hundred or thousand atoms, where eV-scale electronic processes intertwine with collective mode dynamics at the meV scale. CDW systems thus define a formidable spatio-temporal multiscale problem. Solutions to this problem can be attempted with variational techniques <cit.>, which neglect certain anharmonic effects like the anharmonic phonon decay, or by trying to circumvent the multi-scale problem by scale-separation <cit.>. Corresponding complexity reduction strategies have been developed in distinct fields: multi-scale coarse-grained models, machine-learning models <cit.>, or (density functional) tight binding potentials <cit.> have been put forward. In these methods, models are defined by fitting semiempirical or “machine learned” (neural networks, Gaussian processes, others) based parameter functions to reference data often taken from density-functional theory (DFT) <cit.> calculations. In the field of strongly correlated electrons, one also deals with minimal models, which typically focus on low-energy degrees of freedom: The electronic system is divided into high- and low-energy sectors. Then, the high-energy states are integrated out via field theoretical or perturbative means, leaving an effective low-energy model <cit.>. Methods for the derivation of model parameters include the constrained random phase approximation (cRPA) <cit.>, constrained density functional perturbation theory (cDFPT) <cit.>, and the constrained functional renormalization group <cit.>. The field theoretical integrating out of certain electronic states is often called “downfolding”. In this work, we demonstrate how downfolding approaches for complexity reduction on the electronic side boost the simulation of coupled electronic and nuclear degrees of freedom—in particular molecular dynamics (MD) simulations. The idea is to map the first-principles solid-state Hamiltonian onto minimal quantum lattice models, where “minimal” refers to the dimension of the single-particle Hilbert space. Three different downfolding strategies based on constraining, unscreening, and combinations thereof, are compared and demonstrated along example cases from the domain of CDW materials. We start by introducing the first-principles electron-nuclear Hamiltonian and the minimal quantum lattice models together with the three downfolding schemes in Section <ref>. Potential energy surfaces resulting from the downfolded models are benchmarked against DFT for exemplary CDW systems in Section <ref>. MD simulations based on a downfolded model are presented in Section <ref>, where the CDW transition of 1H-TaS2 is studied as a function of temperature, and the computational performance gain from downfolding is analyzed. § FROM FIRST-PRINCIPLES TO MINIMAL LATTICE MODELS The general Hamiltonian of interacting electrons and nuclei in the position representation and atomic units, where in particular m e = e = 1, reads H FP = -∑_i Δ_i/2 - ∑_k Δ_k/2 M_k + ∑_i < j1/|r⃗_i - r⃗_j| + ∑_k < lZ_k Z_l/|R⃗_k - R⃗_l| - ∑_i kZ_k/|r⃗_i - R⃗_k|, where r⃗_i and R⃗_k are electronic and nuclear positions, Δ_i and Δ_k are the corresponding Laplace operators, and Z_k and M_k are atomic numbers and nuclear masses. This Hamiltonian is also called “first-principles (FP) Hamiltonian”, since only fundamental laws (i.e., the Schrödinger equation, Coulomb potential, etc.) and fundamental constants (elementary charges etc.) enter. It accounts for full atomic scale and chemical details. Numerical treatments leading directly from this Hamiltonian to physical results are called “ab initio”, cf. Fig. <ref> (left). In principle, DFT provides us with a tool to calculate the total (free) energy and forces given fixed atomic positions R⃗_k as needed for MD simulations in the Born-Oppenheimer approximation <cit.>. However, since DFT calculations with large supercells are prohibitively expensive, it is desirable to obtain these energies and forces in a cheaper way, while remaining close to the quantum mechanical accuracy of ab initio simulations. Here, our goal is to use a reduced low-energy electronic Hilbert space for this purpose, with only a few orbitals per unit cell, cf. Fig. <ref> (right). We thus aim to work with a lattice model H = H el + H n + H el-n, which consists of the low-energy electronic subsystem H el = H^0 el + H^1 el+ H DC with one-body H^0 el= ∑_k⃗ nϵ^0_k⃗ n c_k⃗ n c_k⃗ n, Coulomb interaction H^1 el = 1/2 N∑ U_q⃗k⃗ m n k⃗' m' n' c_k⃗ + q⃗ m c_k⃗' n' c_k⃗' + q⃗ m' c_k⃗ n, and double counting (H DC) parts, the nuclear subsystem H n = -∑_k Δ_k/2 M_k+V^0(u⃗_1,…,u⃗_N n), and a coupling between the electronic and nuclear degrees of freedom H el-n = ∑_q⃗k⃗ m n V_q⃗k⃗ m n(u⃗_1,…,u⃗_N n) c_k⃗ + q⃗ m c_k⃗ n . The electronic subspace is spanned by a set of low-energy single particle states |k⃗ n⟩, with k⃗ the crystal momentum, and n summarizing further quantum numbers (band index, spin). c_k⃗ n (c_k⃗ n) are the corresponding electronic creation (annihilation) operators. N is the number of k⃗ points summed over. The nuclear degrees of freedom are expressed in terms of displacements (u⃗_1, …, u⃗_N n) ≡u⃗=R⃗-R⃗_0 from a relaxed reference structure R⃗_0. H el describes the low-energy electronic subsystem in the non-distorted configuration (u⃗=0) with the effective electronic dispersion ϵ^0_k⃗ n and an effective Coulomb interaction U. In this work, ϵ^0_k⃗ n is always taken from the DFT Kohn-Sham eigenvalues of the undistorted reference system. Whenever U≠ 0, a term H DC has to be added to avoid double counting (DC) of the Coulomb interaction already contained in the Kohn-Sham eigenvalues (see Appendix <ref>). V^0 plays the role of an effective interaction between the nuclei, or equivalently a partially screened deformation energy, which accounts for the Coulomb interaction between the nuclei and the interaction between the nuclei and the high-energy electrons not accounted for in H el. In this work, we expand V^0 to second order in the atomic displacements u⃗, H def =V^0=-∑_i ℱ^0_i u_i + 1/2∑_i j u_i C_i j u_j, where ℱ⃗^0 is a force vector and C a force constant matrix. The coupling between the displacements and the low-energy electronic system from Eq. (<ref>) is expanded to first order in the displacements u⃗: H el-n = u⃗∑_q⃗k⃗ m nd⃗_q⃗k⃗ m n c_k⃗ + q⃗ m c_k⃗ n. Here, d⃗_q⃗k⃗ m n=∇⃗_u⃗ V_q⃗k⃗ m n(u⃗), and u⃗·d⃗_q⃗k⃗ m n plays the role of a displacement-induced potential acting on the low-energy electrons. MD simulations are a major motivation for constructing the low-energy electronic model. These simulations are here performed at various temperatures, using an electronic model that is established based on a single DFT and density functional perturbation theory (DFPT) calculation. The effective free energy of the system at given nuclear coordinates R⃗ = R⃗_0 + u⃗ is F(u⃗)=-kTlog Z(u⃗). Here, the partition function Z(u⃗)=_ elexp(-β H) traces out the electronic degrees of freedom but not the nuclei. Thus, F(u⃗) plays the role of a potential energy surface, which governs the dynamics of the nuclei in Born-Oppenheimer approximation. Forces acting on the nuclei are then ℱ⃗=-∇⃗_u⃗ F(u⃗) and can be conveniently obtained using the Hellman-Feynman theorem (see Appendix <ref>): ℱ⃗ = -∑_q⃗k⃗ m nd⃗_q⃗k⃗ m n⟨ c_k⃗ + q⃗ m c_k⃗ n⟩. C, U, and d⃗ entering the model Hamiltonian H are not bare but (partially) screened quantities. The (partial) screening has to account for electronic processes not contained explicitly in H. Here, we consider three different schemes to determine C, U, and d⃗: Model I strictly follows the idea of the constrained theories <cit.>. In these theories, the high-energy electronic degrees of freedom are integrated out to derive the low-energy model. The parameters entering the low-energy Hamiltonian are therefore “partially screened” by the high-energy electrons. In particular, we use cRPA for the Coulomb interaction U and cDFPT for the displacement-induced potential d⃗ and for the force constant matrix C. Model II again applies U from cRPA. Now, however, d⃗ and C are based on the unscreening of the respective DFPT quantities using U inspired by Ref. <cit.>. Model III considers a non-interacting low-energy system, U=0. d⃗ is taken from DFPT. C is obtained from unscreening DFPT. This approach is inspired by Ref. <cit.>. In all models, the force vector ℱ⃗^0 entering H_ def in Eq. (<ref>) is chosen to guarantee that F / u_i |_u⃗ = 0 = 0, i.e., vanishing forces also in the models for the reference structure R⃗_0. The term -ℱ⃗^0 u⃗, thus, plays the role of a “force double counting correction” similar to Refs. <cit.>. Since the downfolding is done on the primitive unit cell for u⃗ = 0, and we are interested in the potential energy surface for displacements on supercells, we have to map the model parameters ϵ^0, C, U, and d⃗ from the unit cell to the supercell. For displacements with the supercell periodicity, we can set q⃗ = 0 in Eq. (<ref>) and—within the random phase approximation (RPA)—also in Eq. (<ref>) and drop the corresponding subscripts. We have implemented this mapping for arbitrary commensurate supercells defined by their primitive lattice vectors A⃗_i = ∑_j N_i ja⃗_j with integer N_i j <cit.>. It relies on localized representations in the basis of Wannier functions and atomic displacements <cit.>, for which the mapping is essentially a relabeling of basis and lattice vectors. §.§ Unscreening in models II and III The central idea of models II and III is to choose C entering H_ def such that ^2 F / u_i u_j |_u⃗=0=C DFT_i j, where the latter are the DFT force constants, accessible via DFPT. In model II we additionally require that the screened deformation-induced potential and accordingly the screened electron-phonon vertex at the level of the static RPA matches the corresponding DFPT quantity. The unscreening procedure is represented diagrammatically: The Green's function resulting from the undistorted Kohn-Sham dispersion ϵ^0_k⃗ n is shown as a black arrow line, G→[baseline=(0,-0.1)] [el] (-1, 0) to (0, 0);. We use a wavy line to denote the Coulomb interaction U→[baseline=(0,-0.1)] [decorate,decoration=snake] (-1.5,0) – (-1,0.); obtained from cRPA. The deformation-induced potential obtained from DFPT, which is by definition fully screened, is represented as a black dot, d⃗DFT=d⃗III→[baseline=(0,-0.1)] [] (0.0,0) circle (3pt);. §.§.§ Model II We define the unscreened deformation-induced potential d⃗II→[baseline=(0,-0.1)] [red] (0.0,0) circle (3pt); (red dot) entering model II via Eq. (<ref>) as [red] (0.0,0) circle (3pt); = [black] (0.0,0) circle (3pt); - [baseline=(0,-0.1)] [decorate,decoration=snake] (-1.5,0) – (-1,0.) ; [el] (-1, 0) to[out=-70, in=-110] (0, 0); [el] (0, 0) to[out=+110, in=+70] (-1, 0); [] (0.0,0) circle (3pt); , which can be written in shorthand notation as d II = d - U d, or explicitly as d⃗II_k⃗ m n = d⃗_k⃗ m n - 1/N∑_k⃗' m' n' αβ φ_k⃗α mφ_k⃗β n U_αβφ_k⃗' α m'φ_k⃗' β n'f(ϵ_k⃗' m') - f(ϵ_k⃗' n')/ϵ_k⃗' m' - ϵ_k⃗' n'd⃗_k⃗' m' n'. Here, ϵ_k⃗ n, φ_k⃗β n are the eigenvalue and -vector of band n from the undistorted Wannier Hamiltonian, and U_αβ is the cRPA Coulomb interaction in the orbital basis. The definition in Eq. (<ref>) implies that the static RPA screening of the deformation-induced potential in model II indeed matches the DFPT input, since [black] (0.0,0) circle (3pt); = [red] (0.0,0) circle (3pt); + [baseline=(0,-0.1)] [decorate,decoration=snake] (-1.5,0) – (-1,0.) ; [el] (-1, 0) to[out=-70, in=-110] (0, 0); [el] (0, 0) to[out=+110, in=+70] (-1, 0); [] (0.0,0) circle (3pt); = [red] (0.0,0) circle (3pt); + [baseline=(0,-0.1)] [decorate,decoration=snake] (-1.5,0) – (-1,0.) ; [el] (-1, 0) to[out=-70, in=-110] (0, 0); [el] (0, 0) to[out=+110, in=+70] (-1, 0); [red] (0.0,0) circle (3pt); + [baseline=(0,-0.1)] [decorate,decoration=snake] (-3,0) – (-2.5,0.) ; [el] (-2.5, 0) to[out=-70, in=-110] (-1.5, 0); [el] (-1.5, 0) to[out=+110, in=+70] (-2.5, 0); [decorate,decoration=snake] (-1.5,0) – (-1,0.) ; [el] (-1, 0) to[out=-70, in=-110] (0, 0); [el] (0, 0) to[out=+110, in=+70] (-1, 0); [red] (0.0,0) circle (3pt); +… The force constant matrix C = C DFT - Δ C RPA entering model II is obtained by unscreening the DFPT fully screened force constants C DFT on the RPA level, i.e., we subtract the second-order response in RPA of the electronic system to the atomic displacements, as given by the bubble diagram Δ C RPA = [baseline=-0.6ex] [el] (1, 0) to[out=-70, in=-110] (2, 0); [el] (2, 0) to[out=+110, in=+70] (1, 0); [] (1, 0) circle (3pt); [red] (2, 0) circle (3pt); . §.§.§ Model III Again, we construct the total free energy to be exact in second order. As in model II, we have to subtract the unwanted second order, C = C DFT - Δ C III. The change in the interatomic force constants for this non-interacting model is given by the bubble diagram (cf. Appendix <ref>) Δ C III = [baseline=-0.6ex] [el] (1, 0) to[out=-70, in=-110] (2, 0); [el] (2, 0) to[out=+110, in=+70] (1, 0); (1, 0) circle (3pt); (2, 0) circle (3pt); . The unscreening is exact when the DFT force constants, the bubble diagram, and the free energy are evaluated at the same electronic temperature T DFT. This electronic temperature facilitates the treatment of metals within DFT calculations. However, on the model side we have the freedom to evaluate the free energy at a different electronic temperature T_M. Interestingly, the resulting second order is still a very good approximation to the DFT force constants at temperature T_M <cit.>, as it will be demonstrated in this work. This completes the definitions of models I, II, and III, which are also summarized in Table <ref>. In the following, we will explain and demonstrate the downfolding according to models I–III along the case example of monolayer 1H-TaS2. § CDW POTENTIAL ENERGY LANDSCAPES IN 1H-TAS2: DFT VS DOWNFOLDING Monolayer 1H-TaS2 exhibits a 3× 3 CDW <cit.>, where atoms are displaced from their symmetric positions as illustrated in Fig. <ref>a. Coupling between electrons within the low-energy subspace (highlighted in Fig. <ref>b) and the lattice distortions u⃗ is responsible for the 3× 3 CDW instability <cit.>. Hence, we choose these three bands to span the low-energy subspace of electrons in the Hamiltonian H. We present practical calculations using downfolding models I–III and benchmark the resulting potential energy landscapes against full DFT calculations. Details of the DFT calculations are presented in Appendix <ref>. The energy landscapes will be illustrated along the displacement direction of the CDW distortion: u⃗ = α (R⃗CDW - R⃗_0). Here, R⃗_0 is the symmetric relaxed structure, and R⃗CDW is the CDW structure as obtained by DFT. α plays the role of a scalar coordinate, where by construction α=0 yields the symmetric state and α=1 the CDW displacement pattern. Note, however, that the models readily yield the full energy landscape for arbitrary displacements. Model I starts with partially screened force constants C from cDFPT in H def, which exclude screening processes taking place within the low-energy electronic target space highlighted in Fig. <ref>b. The “bare” harmonic potential energy versus displacement curves resulting from H def (dark gray cDFPT parabola) is compared to full DFT total energy calculations (crosses) in Fig. <ref>c. The upward opened cDFPT parabola shows that the CDW lattice instability is induced by the electrons of the target subspace, in accordance with Ref. <cit.>. We account for density-density type Coulomb matrix elements in H el, which we obtain from cRPA, and solve the resulting model Hamiltonian H for the potential energy landscape F(u⃗) in Hartree approximation. See Appendix <ref> for a detailed description of the Hartree calculations. The resulting total (free) energy versus displacement curve is compared to DFT in Fig. <ref>a. Model I generates an anharmonic double-well potential and thus features a CDW instability like DFT. There is, however, no quantitative match between model I and DFT. The harmonic term of the DFT free energy is not reproduced by model I. In comparison to DFT, model I and its subsequent Hartree solution involve two additional approximations, which could be responsible for the deviations to second order: neglecting non density-density type Coulomb terms, and neglecting exchange-correlation effects. Model II suppresses deviations from the DFT potential energy landscape to second order in u⃗ by construction: Since the fully screened deformation energy from DFPT agrees with the DFT energy versus displacement curve (see Fig. <ref>b), as it must be, also the solution of the downfolded model II matches DFT to second order in the displacement (Fig. <ref>b). The overall match between the downfolded model II and DFT is clearly much better than for model I and indeed almost quantitative also at displacements |α|≳ 1, where anharmonic terms are substantial. Also model III, which involves non-interacting electrons coupled to lattice deformations via fully screened DFPT displacement-induced potentials, recovers the DFT potential energy vs displacement curve for the 3 × 3 CDW distortion in 1H-TaS2 almost quantitatively (Fig. <ref>c) and even slightly better than model II. We also applied downfolding model III to monolayer 1T-TiSe2, a one-dimensional carbon chain, and monolayer 1H-NbS2 as examples of further CDW materials. The resulting potential energy landscapes in Fig. <ref> show the agreement between DFT and the downfolded model. Hence, model III captures the most important anharmonicities in these cases. §.§ Influence of Wannier orbitals and electronic Hilbert space dimension Since the electronic Hamiltonian [Eq. (<ref>)] is represented via Wannier functions, we have a certain freedom of choice. From a computational standpoint, we are aiming for a maximal reduction of the dimension of the single-particle Hilbert space, while maintaining a reasonable level of accuracy. Thus, the natural question arises: How many and which Wannier orbitals to choose to create the single-particle Hilbert space? For 1H-TaS2, we compare a “minimal” and a “maximal” model involving, respectively, three and eleven Wannier orbitals per unit cell: In the case of three orbitals, there are three d-type orbitals on the Ta atom (d_z^2, d_x^2-y^2, d_xy), and in the case of eleven orbitals, there are five d-type orbitals on the Ta atom (d_z^2, d_xz, d_yz, d_x^2-y^2, d_xy) and three p-type orbitals on both S atoms (p_x,p_y,p_z). Note, that these are the Hilbert space dimensions on the primitive unit cell. On the 3×3 supercell calculations, the dimensions are 27 and 99 respectively. We compare the energy-displacement curves resulting from model III for both Hilbert space sizes to DFT in Fig. <ref>. While the results are similar in both cases, the eleven orbital model is slightly closer to full DFT than the three orbital model. In the eleven-orbital model, the displacement potentials directly induce changes in the d-p hybridization. We speculate that anharmonicities associated with these rehybridization terms are responsible for the slightly improved accuracy of the eleven band model. §.§ Electronically generated anharmonicities Models I, II, and III are based on the electronic structure at the symmetric equilibrium positions of the atoms, as well as the linear response to displacements that is accessible in DFPT. By construction, models II and III guarantee agreement with the full DFT calculation at small displacements u⃗, up to order u⃗^2 in the energy and up to order u⃗ in the electronic structure. One might wonder if these models, based on linear response, can ever be useful for the description of the distorted phase, which is necessarily stabilized by anharmonicity and terms of order u⃗^3, u⃗^4, and beyond. The close match between the significantly anharmonic DFT potential energy landscapes and models II and III in Figs. <ref>, <ref>, and <ref> at |α|≳ 1 might thus come as a surprise. The reason behind the good match even in the anharmonically dominated region can be understood in the following sense: linear changes in the electronic potential lead to non-linear changes in eigenvalues of the electronic Hamiltonian and therefore in the total energy. Thus, if the low-energy electrons are responsible for the anharmonicity that stabilizes the CDW, then a low-energy electronic model based on DFPT quantities has the possibility to describe this. This hypothesis is further corroborated by the comparison of energy-displacement curves for 1H-TaS2 at different electronic smearings to those of the related system 1H-WS2, in Fig. <ref>. The electronic band structure of WS2 <cit.> is very similar to the one of TaS2 (see Fig. <ref>b) with the key difference that it has one additional valence electron per unit cell. Hence, the half-filled conduction band of TaS2 becomes completely filled in the WS2 case, which renders WS2 semiconducting and quenches the response of the low energy electronic system. Similarly, an increased electronic smearing/temperature quenches the response of the low-energy electronic system. Both WS2 and TaS2 at high smearing, are dynamically stable, which is indicated by the positive second order of the free energy in Fig. <ref>a. This tells us that at least the harmonic term is significantly affected by the occupation of the low-energy subspace. Furthermore, in Fig. <ref>b, we show the corresponding anharmonic part of the free energies. The flat shape of the high smearing (dark red) and the WS2 (gray) curves show that the anharmonicity is strongly reduced compared to the low smearing cases. These observations suggest that the anharmonicities associated with the CDW formation in 1H-TaS2 indeed originate to a large extent from non-linearities in the response of the low-energy electronic system to the external displacement-induced potentials. Anharmonicities associated with the non-linear low-energy electronic response comprise single-particle and Coulomb contributions. We analyze these contributions diagrammatically in the following for the grand canonical potential Ω: Model III has the Coulomb contributions accounted for indirectly via the fully screened DFPT deformation-induced potential and the diagrams contributing to anharmonicities in Ω are of the following types: Ω^ IIIanh = [baseline=-0.6ex] [el] (0, 0) +(30:1) – (0, 0); [el] (0, 0) – +(-30:1); [el] (0, 0) +(-30:1) – +(30:1); (0, 0) circle (3pt); (0, 0) +(+30:1) circle (3pt); (0, 0) +(-30:1) circle (3pt); + [baseline=-0.6ex] [el] (0, -0.5) – (1, -0.5); [el] (1, -0.5) – (1, 0.5); [el] (1, 0.5) – (0, 0.5); [el] (0, 0.5) – (0, -0.5); (0, -0.5) circle (3pt); (0, 0.5) circle (3pt); (1, -0.5) circle (3pt); (1, 0.5) circle (3pt); + … Model II has explicit Coulomb interaction entering and the diagrammatic content is determined by the approximation used to treat the Coulomb interaction in model II. When solving model II in self-consistent Hartree approximation, we generate terms screening the deformation-induced potential according to Eq. (<ref>). Thus, the anharmonic contributions to the grand potential in model II, Ω^ IIanh, contain those diagrams also present in model III but also further ones. For example, at order u⃗^4, model II contains a diagram of the form [rotate=90,scale=1.5] (-60:0.3) circle (2pt) ; (-120:0.3) circle (2pt) ; ((60:0.3)+(0,0.4)) circle (2pt) ; ((120:0.3)+(0,0.4)) circle (2pt) ; (-60:0.3) edge[draw,el] (-120:0.3); (-120:0.3) edge[draw,el] (0,0) ; (0,0) edge[draw,el] (-60:0.3) ; ((60:0.3)+(0,0.4)) edge[draw,el] ((120:0.3)+(0,0.4)) ; ((120:0.3)+(0,0.4)) edge[draw,el] (0,0.4) ; (0,0.4) edge[draw,el] ((60:0.3)+(0,0.4)); [decorate,decoration=snake] (0,0) – (0,0.4); , which is not present in model III. Both the Green's function (not shown here) and total energy or grand canonical potential in models II and III agree at small displacements (by construction) and disagree at higher orders in u⃗, and their difference scales with the strength of the Coulomb interaction. Fundamentally, the Green's function of the exact DFT solution contains interaction-mediated anharmonic response to displacements, just like model II does. At the same time, in our current implementation model II only contains Hartree-like diagrams of this kind and lacks other diagram topologies present in the exact DFT solution. These additional diagrams can lead to substantial error cancellation. Thus, it is hard to make general arguments about which model to prefer beyond order u⃗^2, given the opaqueness of the underlying DFT exchange-correlation functional. We speculate that cancellations similar to those occurring in second order <cit.> in u⃗ could be also effective in higher orders. In our numerical studies, we find that the total energy curves of model II and III are relatively close for the systems studied here. § DOWNFOLDING-BASED MOLECULAR DYNAMICS So far we have seen that the downfolded models can reproduce total free energies from DFT. In the following Section <ref>, we assess the computational speed of these models, which ultimately paves the way to enhanced sampling simulations based on MD. As a demonstration of this enhancement, we perform the downfolding-based MD for the case example of monolayer 1H-TaS2 in Section <ref>. §.§ Benchmark of model III against DFT: force and free energy calculations To demonstrate the performance gain of model III, we benchmark the calculation of forces and free energies against DFT. For this benchmark, we perform structural relaxations of 1H-TaS2 starting from random displacements |u_i| < 0.01 Bohr—to mimic the conditions of a MD simulation step—on different supercells. Durations are averaged over five steps, excluding the first step starting from the initial guess for the density in the DFT case. Calculations are performed on identical machines, using equivalent computational parameters (cf. Appendix <ref>). The results are shown in Fig. <ref>. More precisely, we benchmark two implementations of model III: Calculations on finite k⃗ meshes, as shown in the previous Section <ref>, currently require a lot of memory to store the deformation-induced potential in the real-space (d⃗_R⃗, R⃗') and reciprocal-space (d⃗_q⃗ = 0, k⃗) representations, which limits the system to similar sizes as achievable in DFT (Fig. <ref>a). Thus, in this section, we instead use a sparse representation, which uses significantly less memory (Fig. <ref>b), reaching linear scaling with the system size (cf. Ref. <cit.>), but is currently restricted to k⃗ = 0, appropriate for large supercells. It also increases the time needed to initialize the program (Fig. <ref>c, d), which however does not influence the MD simulations. Comparing to the same DFT program we use to obtain the parameters for the downfolded model, i.e., the plane-wave code Quantum ESPRESSO <cit.>, we find a speedup of about five orders of magnitude in the downfolding approach for the relevant systems (Fig. <ref>e, f). Note that our implementation is based on NumPy and SciPy <cit.> and that optimizations both on the ab initio and on the model side are possible. The computational advantage from the non-interacting model III over DFT is easily explained: While DFT relies on the self-consistent solution of the Kohn-Sham system, model III only needs a single matrix diagonalization to solve the Schrödinger equation. Most importantly, through downfolding, the matrix in model III only covers the low-energy subspace of the electronic structure, as opposed to DFT, whose matrix accounts for low- and high energy bands. In fact, most of the time is spent on setting up the Hamiltonian matrix and evaluating the forces [Eq. (<ref>)]. To guarantee that the former is Hermitian and to make the use of sparse matrices more efficient, we have symmetrized d⃗_R⃗, R⃗' αβ = d⃗_R⃗ - R⃗', -R⃗' βα and neglected matrix elements smaller than 1 % of the maximum, the effect of which on the free-energy landscape is negligible. §.§ Enhanced sampling simulations based on downfolded model III We now perform enhanced sampling simulations based on MD with the downfolding scheme defined by model III. To this end, we implemented a Python-based tight-binding solver <cit.>, which delivers displacement field dependent forces and total free energies to the i-PI (path integral) MD engine <cit.>. As stated in the previous section, we find a speedup of about five orders of magnitude in the downfolding approach. Thus, the downfolding approaches make larger system sizes and longer time scales well accessible. While for instance Ref. <cit.> simulates the dynamics of 3 × 3 supercells of 1H-NbS2 with AIMD for time scales of about 6 to 12 ps, the downfolding-based MD allows us to address much larger 18 × 18 supercells for time scales of about 500 ps using a similar amount of CPU core hours. For monolayer 1H-TaS2, we performed classical (and path integral) replica exchange MD simulations (see Appendix <ref>) on the 18 × 18 supercells using 26 replicas (and 10 beads) spanning a temperature range from 50 to 200 K in the canonical (NVT) ensemble. In each MD step ν we record the position vectors of all nuclei R⃗_l(ν,T) for all temperatures T. Defining the structure factor S(q⃗)=1/N|∑_l=1^N e^-iq⃗·R⃗_l|^2 for a given atomic configuration R⃗_l, we obtain the temperature-dependent MD ensemble averaged structure factors ⟨ S(q⃗)⟩_T. We confine the summation to the positions of the tantalum atoms and normalize the structure factor such that S(q⃗=0)=1. The resultant structure factor maps on the first Brillouin zone of 1H-TaS2 are shown in Fig. <ref> for temperatures T=50,81,96,200 K [We show those q⃗-vectors compatible with the periodic boundary conditions on the 18× 18 unit cell.]. The upper row corresponds to classical MD simulations. At 50 K, we find peaks in the structure factor at q⃗=2/3 ΓM, which are characteristic of the 3 × 3 CDW. These peaks broaden and become reduced in intensity upon increasing temperature. Fig. <ref> shows the temperature dependence of ⟨ S(q⃗=2/3 ΓM)⟩_T in more detail. We see the aforementioned temperature-induced reduction in ⟨ S(q⃗=2/3 ΓM)⟩_T with an inflection point around TCL≈ 96 K. We take this inflection point as the finite system size approximation to the phase transition temperature that would be expected for an infinitely large simulation cell. While a 3 × 3 CDW has been observed in monolayer 1H-TaS2 <cit.>, the exact transition temperature is not known in this system. For the three-dimensional bulk of 2H-TaS2 CDW, transition temperatures on the order of Texp≈ 75 K have been reported <cit.>. Our classical finite system size estimate exceeds these temperatures by about 25 %. One possible origin of this deviation can be quantum fluctuations in nuclear degrees of freedom. Therefore, we performed path integral MD (PIMD) replica exchange simulations to assess the influence of nuclear quantum effects on the CDW formation. The PIMD structure factor maps in the middle row of Fig. <ref> behave qualitatively similar to the classical counterpart. Their ratio is quantitatively illustrated in the lowest row. The overall area of the Brillouin zone turns from blue to white by heating up the system. Thus, as expected, the classical and quantum simulations agree at high temperatures. However, the CDW fingerprints (q⃗=2/3 ΓM and q⃗=M) clearly increase in intensity and survive at higher temperatures in the classical case. This difference between classical and quantum simulations can be inspected in more detail in Fig. <ref>. While the qualitative shape of the PIMD curve (dark blue) is similar to the classical MD (light blue) simulation, we find an effective shift of the curve and an inflection point at TPI≈ 82 K. Thus, quantum effects can significantly reduce the estimated CDW transition temperature as compared to the classical estimate and lead to a closer match with experiment. From these demonstrator calculations it becomes clear that the downfolding-based MD developed in this work opens the gate for precise computational studies of CDW (thermo)dynamics, which were inaccessible in the domain of ab initio MD hitherto. § CONCLUSIONS We presented three downfolding schemes to describe low-energy physics of electron-lattice coupled systems—in particular CDWs—on a similar level of accuracy as full ab initio DFT: model I is based on constrained theories and models II and III are based on unscreening, where model II features explicit Coulomb interactions and model III is effectively non-interacting. The central goal of these downfolding schemes is to reduce the complexity of first-principles electronic structure calculations. This is achieved by mapping the general solid-state Hamiltonian onto minimal quantum lattice models with only a few localized Wannier orbitals per unit cell. The solution of these models is significantly faster than DFT. For model III, we found a speedup of about five orders for the example case of monolayer 1H-TaS2. Despite this enormous speedup and an complexity reduction, we demonstrated a quantitative recovery of DFT potential energy surfaces in downfolded models II and III. As a demonstration, we performed classical and path integral MD simulations using model III of the 1H-TaS2 CDW systems. The downfolding-based speedup opens the gate for enhanced sampling techniques and path integral simulations of nuclear quantum effects on the CDW transition. This makes downfolding models the method of choice for precise computational studies of dynamics and thermodynamics in CDW systems, which were hitherto largely inaccessible to ab initio MD. While we focussed, here, on Born-Oppenheimer MD, the Hamiltonians resulting from downfolding models I–III are generic and likely applicable also when dealing with non-adiabatic phenomena, electron-lattice coupled dynamics in excited electronic states, and situations where strong electron-electron correlations are at play. Due to the explicit account of Coulomb interactions in models I and II, these schemes offer themselves for treatments of situations where electronic interaction effects beyond semilocal DFT are to be included in studies of coupled electron-nuclear dynamics. Future applications of the downfolding schemes developed here might reach to the physics of (nonequilibrium) phase transitions involving CDW order <cit.> or the interplay of correlations and (dis)ordering <cit.> as well as driven quantum systems <cit.>. The authors would like to thank Jean-Baptiste Morée for discussions of the RESPACK software package and Bálint Aradi for technical advice. We gratefully acknowledge support from the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) through RTG 2247 (QM^3, Project No. 286518848) (AS, TW), FOR 5249 (QUAST, Project No. 449872909) (TW), EXC 2056 (Cluster of Excellence “CUI: Advanced Imaging of Matter”, Project No. 390715994) (TW, SB), EXC 2077 (University Allowance, University of Bremen, Project No. 390741603) (JB), SFB 951 (Project No. 182087777) (MR), and SE 2558/2 (Emmy Noether program) (MAS). JB gratefully acknowledges the support received from the “U Bremen Excellence Chair Program” and from all those involved in the project, especially Lucio Colombi Ciacchi and Nicola Marzari. EvL acknowledges support from the Swedish Research Council (VR) under grant 2022-03090 and from the Crafoord Foundation. We also acknowledge the computing time granted by the Resource Allocation Board and provided on the supercomputer Lise and Emmy at NHR@ZIB and NHR@Göttingen as part of the NHR infrastructure. § FREE ENERGY CALCULATIONS OF THE DOWNFOLDED MODELS IN HARTREE APPROXIMATION The Coulomb interaction in models I and II renders the electronic Hamiltonian interacting and requires approximate treatments. Here, we solve the interacting Hamiltonian in Hartree approximation, which is the simplest mean-field approximation and as such requires a self-consistency loop. For the Coulomb interaction, we assume here a density-density type interaction H^1el = 1/2 N∑_q⃗k⃗k⃗' αβ U^q⃗_αβ c_k⃗ + q⃗α c_k⃗' β c_k⃗' + q⃗β c_k⃗α with U^q⃗_αβ being cRPA density-density matrix elements evaluated at momentum transfer q⃗. The Hartree decoupling of Eq. (<ref>) reads H^1el = 1/N∑_k⃗k⃗' αβ U^q⃗=⃗0⃗_αβ( c_k⃗α c_k⃗α⟨ c_k⃗' β c_k⃗' β⟩. . -1/2⟨ c_k⃗α c_k⃗α⟩⟨ c_k⃗' β c_k⃗' β⟩). Since the DFT input parameters of models I and II already contain Coulomb contributions, we have to avoid double counting. The hopping terms t^0_k⃗αβ stem from the Kohn-Sham eigenvalues of the undistorted structure, which contain (among others) a Hartree term. Here, we choose HDC to compensate for the Hartree term of the undistorted structure: HDC = - 1/N∑_k⃗k⃗' αβ U^q⃗=⃗0⃗_αβ( c_k⃗α c_k⃗α⟨ c_k⃗' β c_k⃗' β⟩_0. . -1/2⟨ c_k⃗α c_k⃗α⟩_0 ⟨ c_k⃗' β c_k⃗' β⟩_0), where ⟨…⟩_0 denotes expectation values obtained for the undistorted structure. We introduce the Hartree potentials U_α and U^0_α for the distorted and undistorted structures, respectively, U_α = ∑_β U^q⃗ = 0_αβ n_β and U^0_α = ∑_β U^q⃗ = 0_αβ n^0_β, where n^(0)_β=1/N∑_k⃗' β⟨ c_k⃗' β c_k⃗' β⟩_(0) denotes local orbital occupations. Then, the electronic mean-field Hamiltonian written in the Wannier orbital basis of the supercell reads Hel+Hel-n = ∑_k⃗αβ( t^0_k⃗αβ + u⃗d⃗_k⃗αk⃗β + (U_α - U^0_α) δ_αβ) c_k⃗α c_k⃗β - 1/2∑_αβ U^q⃗ = 0_αβ ( n_α n_β - n^0_α n^0_β). This Hamiltonian is solved self-consistently. The converged electronic dispersion ϵ_k⃗ n and occupations n_α are used to determine the free energy: F el = 2/N_k k_BT ∑_n k⃗ln( f [ -(ϵ_k⃗ n - μ) /kT ] ) + μ N el - 1/2∑_αβ U^q⃗ = 0_αβ ( n_α n_β - n^0_α n^0_β). The Coulomb matrix U^q⃗_αβ contains one divergent eigenvalue for q⃗→ 0, which is associated with the homogeneous charging of the system. Since we are working at fixed system charge, we exclude the divergent contribution of U^q⃗_αβ. In practice we perform the eigenvector decomposition of Eq. (15) from Ref. <cit.> and exclude the contribution from the leading eigenvector. § PERTURBATION EXPANSION OF GRAND POTENTIAL AND FREE ENERGY Changes of the grand potential of non-interacting electrons due to atomic displacements can be straightforwardly evaluated using diagrammatic perturbation theory <cit.>: Ω = Ω|_0 + ∑_i Ω^(1)_i |_0 u_i + 1/2∑_i jΩ^(2)_i j|_0 u_i u_j + … ≡Ω|_0 + [baseline=-0.6ex] at (0.5, 0) +; at (2.5, 0) + …,; [el] (0, 0) arc(-90:270:0.3); [el] (1, 0) to[out=-70, in=-110] (2, 0); [el] (2, 0) to[out=+110, in=+70] (1, 0); (0, 0) circle (3pt); (1, 0) circle (3pt); (2, 0) circle (3pt); Without loss of generality, we consider q⃗ = 0 in Eq. (<ref>) and drop the corresponding subscript. In first order, we then have Ω⃗^(1) = k T/N∑_k⃗ n νd⃗_k⃗ n n1/ω_ν - ϵ_k⃗ n + μ = 1/N∑_k⃗ nd⃗_k⃗ n n f(ϵ_k⃗ n - μ), with the Matsubara frequency ω_ν = (2 ν + 1) π k T. In second order, we have Ω^(2) = k T/N∑_k⃗ m n νd⃗_k⃗ m n^ T1/ω_ν - ϵ_k⃗ m + μ1/ω_ν - ϵ_k⃗ n + μd⃗_k⃗ n m^T = 1/N∑_k⃗ m nd⃗_k⃗ m n^ Tf(ϵ_k⃗ m - μ) - f(ϵ_k⃗ n - μ)/ϵ_k⃗ m - ϵ_k⃗ nd⃗_k⃗ n m^T. We deliberately have omitted the superscript zero from ϵ_k⃗ n [cf. Eq. (<ref>)] as in our models with linear electron-phonon coupling these formulas also hold for u⃗≠ 0 as long as d⃗ is represented in the electronic eigenbasis. The number of electrons N el is typically conserved in DFT and MD calculations, so we are instead interested in the canonical ensemble and the free energy F(N el) = Ω(μ(N el)) + μ(N el) N el. Its first derivative with respect to displacements is F_i^(1) = F/ u_i = ∂Ω/∂ u_i + [ ∂Ω/∂μ + N el] μ/ u_i=Ω_i^(1), since ∂Ω / ∂μ = -N el. In other words, the expression for the forces [cf. Eq. (<ref>)] is the same in the canonical and the grand-canonical ensemble. For the unscreening of the force constants (cf. Section <ref>), we also need access to the second derivative of the free energy at constant electron density, F_i j^(2) = F_i^(1)/ u_j = ∂Ω_i^(1)/∂ u_j + ∂Ω_i^(1)/∂μμ/ u_j. Expectedly, the first term on the right is Ω^(2)_i j from Eq. (<ref>). Here, the second term does not vanish, at least not for monochromatic perturbations with q⃗ = 0 <cit.>. The change of the chemical potential upon atomic displacements follows from the electron conservation, 0 != N el/u⃗ = 1/N/u⃗∑_k⃗ n f(ϵ_k⃗ n - μ) = -1/N∑_k⃗ n[ d⃗_k⃗ n n - μ/u⃗] δ(ϵ_k⃗ n - μ), with δ(ϵ) = - f(ϵ) / ϵ. We have used the Hellmann-Feynman theorem, ϵ_k⃗ n/u⃗ = /u⃗⟨k⃗ n| H^0 el + H^0el-n|k⃗ n⟩ = ⟨k⃗ n|/u⃗ (H^0 el + H^0el-n) |k⃗ n⟩≡d⃗_k⃗ n n. Note that here the matrix element of the deformation-induced potential d⃗_k⃗ n n is represented in the basis of eigenstates |k⃗ n⟩ of the perturbed Hamiltonian. Rearranging Eq. (<ref>) shows that the change of the chemical potential is nothing but the Fermi surface (FS) average of the intraband deformation-induced potential, μ/u⃗ = ∑_k⃗ nd⃗_k⃗ n nδ(ϵ_k⃗ n - μ) /∑_k⃗ nδ(ϵ_k⃗ n - μ) ≡d⃗_k⃗ n nFS. From Eq. (<ref>), we can also readily evaluate ∂Ω⃗^(1)/∂μ = 1/N∑_k⃗ nd⃗_k⃗ n nδ(ϵ_k⃗ n - μ) ≡ρ(μ) d⃗_k⃗ n nFS, where ρ is the electronic density of states per unit cell. Combining Eqs. (<ref>), (<ref>) and (<ref>) yields Δ C_i jIII = Ω^(2)_i j + ρ(μ) d_i k⃗ n nFSd_j k⃗ n nFS. The first term are the force constants in the grand canonical ensemble, i.e., at constant chemical potential. The second term is the correction for going from the grand canonical to the canonical ensemble. § COMPUTATIONAL PARAMETERS DFT All DFT and DFPT calculations are carried out using Quantum ESPRESSO <cit.>. The modification that is required for cDFPT is described in detail in Ref. <cit.>. For the transformation of the electronic energies and electron-phonon couplings to the Wannier basis, we use Wannier90 <cit.> and the EPW code <cit.>. The cRPA Coulomb interaction was calculated using RESPACK <cit.>. In the following, we will list the specific DFT and DFPT parameters for each material individually: 1H-TaS2 Hartwigsen-Goedecker-Hutter (HGH) pseudopotentials <cit.>; 18×18×1 k⃗ mesh and 6×6×1 q⃗ mesh for unit cell; Fermi-Dirac smearing of 5 mRy (Gaussian smearing of 0.1 Ry for Fig. <ref>b, d, f); energy convergence threshold of 10^-15 Ry (10^-8 Ry per unit cell for Fig. <ref>); lattice constant of 3.39 Å. The cRPA Coulomb interaction has been calculated on a 32×32×1 q⃗ mesh taking 80 electronic bands into account. 1H-NbS2 HGH pseudopotentials <cit.>; 18×18×1 k⃗ mesh and 6×6×1 q⃗ mesh for unit cell; Fermi-Dirac smearing of 3 mRy; lattice constant of 3.34 Å. 1H-WS2 HGH pseudopotentials <cit.>; 18×18×1 k⃗ mesh and 6×6×1 q⃗ mesh for unit cell; Fermi-Dirac smearing of 5 mRy; lattice constant of 3.23 Å. 1T-TiSe2 Ultrasoft pseudopotential <cit.> from the SSSP library <cit.>; 18×18×1 k⃗ mesh and 6×6×1 q⃗ mesh for unit cell; Fermi-Dirac smearing of 5 mRy; lattice constant of 3.54 Å. Carbon chain Optimized norm-conserving Vanderbilt pseudopotential (ONCVPSP) <cit.> from the PseudoDojo library <cit.>; 200×1×1 k⃗ mesh and 20×1×1 q⃗ mesh for unit cell; Fermi-Dirac smearing of 5 mRy; lattice constant of 2.59 Å. In all cases, we have applied the Perdew-Burke-Ernzerhof (PBE) functional <cit.>, set the plane-wave cutoff to 100 Ry, and minimized forces and pressure in the periodic directions to below 1 µRy/Bohr and 0.1 kbar. We have used a unit-cell dimension of 15 Å to separate images in the non-periodic directions. § REPLICA EXCHANGE In order to characterize the CDW phase-transition, we employed replica exchange molecular dynamics (REMD) and replica exchange path integral molecular dynamics <cit.> (PI-REMD), as implemented in the i-PI code. For the 18 × 18 1H-TaS2 supercell, we ran NVT simulations of 26 replicas in parallel that differed in the ensemble temperature. We covered a temperature range between 50 and 200 K. In the PI-REMD simulations, each temperature replica was represented by ten imaginary-time replicas (commonly called “beads” in the ring-polymer representation). This amount of beads proved to be converged within 1 meV/atom for the potential and quantum kinetic energy at the lowest temperature of 50 K. We note that due to the high dimensionality of the system, enhanced by the use of many imaginary-time replicas, the PI-REMD simulations with 26 temperature replicas in this range was not efficient in terms of the frequency of replica swaps, while the REMD simulations were.
http://arxiv.org/abs/2303.06733v1
20230312192506
Probing the Origin of Changing-look Quasar Transitions with Chandra
[ "Qian Yang", "Paul J. Green", "Chelsea L. MacLeod", "Richard M. Plotkin", "Scott F. Anderson", "Allyson Bieryla", "Francesca Civano", "Michael Eracleous", "Matthew Graham", "John J. Ruan", "Jessie Runnoe", "Xiurui Zhao" ]
astro-ph.GA
[ "astro-ph.GA", "astro-ph.HE" ]
Qian Yang qian.yang@cfa.harvard.edu 0000-0002-6893-3742]Qian Yang Center for Astrophysics | Harvard & Smithsonian, 60 Garden Street, Cambridge, MA 02138, USA 0000-0002-8179-9445]Paul J. Green Center for Astrophysics | Harvard & Smithsonian, 60 Garden Street, Cambridge, MA 02138, USA 0000-0003-3422-2202]Chelsea L. MacLeod BlackSky, 1505 Westlake Ave N #600, Seattle, WA 98109, USA 0000-0002-7092-0326]Richard. M. Plotkin Physics Department, University of Nevada, Reno, 1664 N. Virginia St., Reno NV 89557, USA Nevada Center for Astrophysics, University of Nevada, Las Vegas, NV 89154, USA 0000-0002-6404-9562]Scott F. Anderson Department of Astronomy, University of Washington, Box 351580, Seattle, WA 98195, USA 0000-0001-6637-5401]Allyson Bieryla Center for Astrophysics | Harvard & Smithsonian, 60 Garden Street, Cambridge, MA 02138, USA 0000-0002-2115-1137]Francesca Civano NASA Goddard Space Flight Center, Greenbelt, MD 20771, USA 0000-0002-3719-940X]Michael Eracleous Department of Astronomy & Astrophysics and Institute for Gravitation and the Cosmos, 525 Davey Laboratory, The Pennsylvania State University, University Park, PA 16802, USA 0000-0002-3168-0139]Matthew Graham Cahill Center for Astronomy and Astrophysics, California Institute of Technology, 1216 E. California Boulevard, Pasadena, CA 91125, USA 0000-0001-8665-5523]John J. Ruan Department of Physics and Astronomy, Bishop's University, 2600 College St., Sherbrooke, QC J1M 1Z7, Canada 0000-0001-8557-2822]Jessie Runnoe Department of Physics and Astronomy, Vanderbilt University, Nashville, TN 37235, USA 0000-0002-7791-3671]Xiurui Zhao Center for Astrophysics | Harvard & Smithsonian, 60 Garden Street, Cambridge, MA 02138, USA Extremely variable quasars can also show strong changes in broad line emission strength, and are known as Changing Look Quasars (CLQs). To study the CLQ transition mechanism, we present a pilot sample of CLQs with X-ray observations both in the bright and faint states. From a sample of quasars with bright state archival SDSS spectra and (Chandra or XMM-Newton) X-ray data, we identified five new CLQs via optical spectroscopic follow-up, and then obtained new target-of-opportunity X-ray observations with Chandra. No strong absorption is detected in either the bright or the faint state X-ray spectra. The intrinsic X-ray flux generally tracks the optical variability, and the X-ray power-law slope becomes harder in the faint state. Large amplitude mid-infrared variability is detected in all five CLQs. The changing-obscuration model is not consistent with the observed X-ray spectra and spectral energy distribution changes seen in these CLQs. It is highly likely that the observed changes are due to the changing accretion rate of the supermassive black hole, so the multiwavelength emission varies accordingly, with promising analogies to the accretion states of X-ray binaries. § INTRODUCTION Active galactic nuclei (AGN) are powered by supermassive black holes (SMBH) accreting gas, producing radiation that spans the entire electromagnetic spectrum <cit.>. The X-ray emission comes from the hot corona <cit.> and possibly a jet <cit.>. In the UV/optical, there is continuum emission from the accretion disk <cit.>, as well as broad and narrow emission lines <cit.>. Dust in the torus is heated by the emission from the accretion disk, and re-emitted as thermal radiation in the infrared <cit.>. Observationally, AGN may be classified based on their multiwavelength characteristics. In the UV/optical, there are type 1 AGN with both broad (≳ 1000   km s^-1) and narrow emission lines (≲ 1000   km s^-1); there are also type 2 AGN with only narrow emission lines <cit.>. In the X-ray regime, there are unobscured AGN with N_ H < 10^22  cm^-2 and obscured AGN with N_ H≥ 10^22  cm^-2 <cit.>. Most type 1 AGN are X-ray unobscured and most type 2 AGN are X-ray obscured <cit.>. The canonical AGN unified model interprets that the different classes of AGN are actually the same class of object viewed at different angles <cit.>. In this model, AGN observed face-on, revealing unobscured emission both from the broad-line region and the narrow-line region, are type 1. When viewed edge-on, the central region and broad emission line region are obscured by the dusty torus, so we observe type 2 AGN with only narrow emission lines and high intrinsic columns of dust and gas. However, there are some rare objects that suggest additional or complementary possibilities to this geometric model. Some type 2 AGN show no broad emission lines but also no detectable obscuration even in X-rays <cit.>. Some of these “naked" type 2 AGN, selected for lack of apparent broad emission lines but with AGN-like optical variability, do show faint broad emission line components in higher signal-to-noise ratio optical spectra <cit.>. Direct evidence that broad lines can strongly dim or even disappear in AGN leaving only narrow lines come from “changing-look AGN" <cit.>. Remarkably, even the higher luminosity quasars can change between different types on timescales of a year or less. Such objects exhibit large amplitude changes in luminosity, accompanied by the dramatic emergence or near disappearance of broad emission-line (BEL) components, dubbed “changing-look quasars" <cit.>. The “Changing-look" phenomena were also found in z>2 quasars with dramatic changes in their emission lines <cit.>. Repeat spectroscopy for large quasar samples continues to uncover this rare and remarkable phenomenon in regimes of luminosity and redshift that now overlap the huge cosmological samples of quasars of the Sloan Digital Sky Survey <cit.>. The discovery of CLQs profoundly affects many areas of astrophysics, including our understanding of quasar duty cycles <cit.> and galaxy evolution <cit.>, through distinct feedback processes in states of high and low accretion rate <cit.>. Rapid swings in SMBH accretion rate may also explain the complex AGN/star-formation connection <cit.>, and help reconcile cosmological simulations with the observed prevalence of ionized intergalactic medium or “AGN proximity zone fossils" <cit.>. This scientific interest explains why CLQs have been ardently sought in the last few years, resulting in at least 80 now known <cit.>. Several explanations for the strong and relatively rapid luminosity and BEL changes have been proposed. The first direct explanation is the changing obscuration due to moving clouds crossing over our line of sight. The term “changing-look" was originally used in X-ray, when objects' X-ray spectra show absorption changing between Compton thick and Compton thin. Absorption changes are a widely accepted explanation for X-ray changing-look events <cit.>. Clouds in the broad-line region (BLR) or torus may plausibly eclipse the much smaller X-ray emission region <cit.>. However, the crossing time for intervening clouds orbiting outside the BLR is too long <cit.> compared to observed CLQ transition timescales. A tidal distruption event (TDE), in which a star is disrupted by and accretes onto a SMBH, is also a mechanism for strong, rapid variability. However, TDEs can only explain a few turn-on CLQ cases <cit.>, and TDE flares are inconsistent with most CLQ lightcurve shapes and bright state durations <cit.>. Large accretion rate changes seem the most likely explanation as suggested by recent work <cit.>. However, for major accretion rate changes, the radial inflow timescales <cit.> are inconsistent with the observed transition timescale of CLQs - from a few months to decades <cit.>. Strong accretion state transitions are also seen in X-ray observations of the Galactic X-ray binaries <cit.>, suggesting analogies between AGN and XRB accretion <cit.>. While typical BH accretion regions cannot yet be spatially resolved, temporal changes in XRB spectral states have gone a long way to unravel the accretion physics in XRBs, and suggest powerful theoretical and observational analogies to AGN and quasars <cit.>. However, mass scaling from XRBs to SMBHs <cit.> suggests timescales (∼10^ 4-7 yr) for quasar accretion state transitions that far exceed a human lifetime. CLQ transition timescales do not scale as expected from XRBs <cit.>. Thus, large spectral state changes in quasars challenge and invigorate debates both about accretion theory and the nature of historical quasar classes <cit.>. Some recent studies suggest that the timescale problem can be qualitatively alleviated when taking the large-scale magnetic field into account <cit.> or considering accretion disk instabilities <cit.>. Comparison of multiwavelength observations before and after a transition is needed to test different models of CLQs. With X-ray spectra in both states, we can detect changes in obscuration or in X-ray spectral power-law slopes. X-ray spectral shape variations were observed in a handful of CL AGN at lower luminosities (Seyfert galaxies), including Mrk 1018 <cit.>, Mrk 590 <cit.>, NGC 1566 <cit.>, and 1ES 1927+65 <cit.>. Hardening of the X-ray-to-UV spectrum of the fading CL AGN Mrk 1018 suggests accretion state transitions similar to XRBs <cit.>. Mrk 1018 also shows evidence that both X-ray photon index and α_ OX, similar to some XRBs, exhibit V-shape correlations in a single AGN <cit.>. In comparison to quasars, however, these AGN tend to have ∼10-100 times lower SMBH masses, high Eddington ratios, and unusual, X-ray bright spectral energy distributions. The first CLQ, SDSS J015957.64+003310.5 (hereafter, J0159), discovered by <cit.> is an X-ray selected AGN, and there are serendipitous X-ray observations: XMM-Newton observation in its bright state and Chandra observation in its faint state. <cit.> analyzed its X-ray spectra and found its X-ray flux dropped by a factor of 7 with no change in absorption. <cit.> analyzed the X-ray data of a CLQ, SDSS J155258+273728 (hereafter, J1552) discovered by <cit.>, and found the absorption in X-ray is moderate and stable, and the X-ray spectrum becomes harder in the bright state, with an Eddington ratio being lower than a few percent. They found that the CL AGN and CLQ with X-ray observations in both states follow a “V"-shaped correlation: above a critical turnover luminosity the X-ray spectra is softer when brighter, and below the critical luminosity the trend is reversed as harder when brighter. <cit.> obtained Chandra X-ray observations of five CLQs, and found consistency with accretion state transitions in prototypical X-ray binary outbursts, as well as a possible V-shaped correlation for the UV-to-X-ray spectral index with an inversion at a critical Eddington ratio of ∼ 10^-2. However, for those five CLQs only ROSAT All-Sky Survey measurements are available for the bright state, yielding upper limits on the bright-state X-ray luminosity (and thus lower limits on α_ OX). <cit.> performed Chandra observations for ten CLQs and further investigated the similarities between AGN and XRBs. However, among these ten CLQs, only two (J2252 and J2333) had archival XMM-Newton X-ray detections in their former bright states; there are again only upper limits on the bright-state X-ray luminosity (and thus lower limits on α_ OX) for the remaining eight CLQs, preventing much analysis of changes in obscuration or X-ray spectral power-law slopes for CLQs. To test the different models of CLQs, probe the structure of AGN, and the accretion processes of SMBHs, we pursue the study of CLQs with X-ray observations in both states. In this work, we present a pilot sample of five new CLQs with X-ray observations in both states. Our sample doubles the size of optical spectroscopic confirmed CLQs[Here for clarity, CLQs are AGN with L_ bol≳ 10^45 erg  s^-1 in the bright state.] with X-ray observations in both states. The five new CLQs are SDSS J020621.67-060952.7 (hereafter, J0206) at z = 0.413, SDSS J022429.10-091851.7 (hereafter J0224) at z = 0.357, SDSS J082905.98+420204.3 (hearafter J0829) at z=0.638, SDSS J122638.66-001114.0 (hearafter J1226) at z=0.642, and SDSS J133806.59-012412.8 (hearafter J1338) at z=0.452. This paper is organized as follows. We present target selection, data, and reduction in Section 2. In Section 3, we describe the data analysis methods, including optical spectral fitting, X-ray spectral analysis, and SED fitting. Results and discussions are in Section 4 and 5, respectively. We summarize the paper in Section 6. Throughout this paper, we adopt a standard ΛCDM cosmology with Ω_Λ=0.7, Ω_m=0.3, and H_0=70 km s^-1 Mpc^-1. § SELECTION, DATA, AND REDUCTION §.§ CLQ Target Selection We selected candidates from the SDSS quasar catalogs <cit.>, applying a redshift limit of z < 0.9 to keep Hβ within the SDSS spectral range. Radio-detected objects were excluded using the FIRST survey <cit.>, since jet-dominated emission in the bright state and its variability would complicate our interpretations. To study CLQs in both states, we required existing archival XMM-Newton or Chandra observations close in time to the SDSS spectroscopic observations. For these X-ray observed quasars, we compiled optical light curves from multiple imaging surveys (see §<ref>), and selected CLQ candidates with a large-amplitude optical variability, specifically |Δ g | > 1 mag and |Δ r | > 0.5 mag (as described in ), comparing the latest available epoch to its bright state. We performed spectroscopic follow-ups using 6-8 m telescopes (§<ref>) as the CLQ candidates dramatically faded in the optical. Once we confirmed with a follow-up optical spectrum a 3σ fading of the broad Hβ flux, we triggered a Chandra X-ray Target of Opportunity (ToO) observation (§<ref>), as well as radio observations with the Karl G. Jansky Very Large Array (VLA) (§<ref>). We summarize the five CLQs observed in Table <ref>. lccccl Changing-look Quasars 1pt Full Name Short Name RA Decl. Redshift SDSS J020621.67-060952.7 J0206 02:06:21.67 -06:09:52.70 0.413 SDSS J022429.10-091851.7 J0224 02:24:29.10 -09:18:51.70 0.357 SDSS J082905.98+420204.3 J0829 08:29:05.98 +42:02:04.30 0.638 SDSS J122638.66-001114.0 J1226 12:26:38.66 -00:11:14.06 0.642 SDSS J133806.59-012412.8 J1338 13:38:06.59 -01:24:12.84 0.452 §.§ Optical Imaging Data We used multiple public available optical imaging surveys, including the SDSS imaging survey <cit.>, the Pan-STARRS1 <cit.>, the Palomar Transient Factory survey <cit.>, and the Zwicky Transient Facility survey <cit.>. We compiled g- and r-band light curves from these surveys, using the point-spread function (PSF) magnitudes. For objects without recent public ZTF photometric data, we performed imaging observations in g and r bands using the 1.2 meter telescope at the Fred Lawrence Whipple Observatory (FLWO) on Mount Hopkins in Arizona. To calibrate the optical data from different surveys onto the same flux scale for light-curve plotting, we applied corrections to account for different filter curves. We convolved each quasar spectrum with the PS1, PTF, ZTF, and FLWO filter curves to obtain synthetic magnitudes, and derived the magnitude offsets, typically ∼ 0.02 (0.09) mag in g (r) band between similar filters from different surveys. We used these offsets to calibrate all optical magnitudes to SDSS filter system magnitudes for the purposes of light-curve plotting. We also used the Catalina Real-time Transient Survey <cit.>. The CRTS photometric data are unfiltered, so we applied a constant offset to match the contemporaneous the r-band light curve described above. We describe photometric data we used for spectral energy distributions (SEDs) in §<ref> and summarize the photometric data in Table <ref>. We corrected the Galactic extinction using the dust reddening map of <cit.> and the reddening law in <cit.>. The typical E(B-V)_ SFD for the five CLQs is 0.02 mag. We computed the extinction coefficients for the surveys we used in this work (see more details in Appendix §<ref>). We adopt a R_V=3.1, which is the traditional value of R_V in the diffuse interstellar medium <cit.>. §.§ Optical Spectroscopic Observations For the bright-state, we use the SDSS spectra, taken by the Sloan Foundation 2.5 m telescope <cit.> at Apache Point Observatory. The spectra are from the SDSS-I/II, with a wavelength coverage of 3800-9100, and the Baryon Oscillation Spectroscopic Survey <cit.> spectrograph of the SDSS-III <cit.>, with a wider wavelength coverage of 3600-10400 <cit.>. The SDSS spectral resolution is 1500 at 3800 and 2500 at 9000. We obtained optical spectroscopic follow-ups for CLQ candidates in the faint states, using the MMT, Gemini, and Magellan telescopes. Observations were carried out over several dates from 2017 to 2020. Table <ref> summarized the spectroscopic observation information, including telescope, grating, and exposure time. The MMT telescope is a 6.5 meter MMT telescope on Mount Hopkins in Arizona. J1338 was observed with the Blue Channel Spectrograph using a grating 300 lines/mm, with a resolution of 6.47 and a wavelength coverage of 5268. For the other four targets, we used the Binospec Spectrograph with a grating 270 lines/mm with a resolution of 1340 and wavelength coverage of 3900-9240. The Gemini Observatory consists of twin 8.1-meter diameter telescopes, Gemini North and Gemini South, which are located at two separate sites on Maunakea in Hawaii and Cerro Pachón in Chile, respectively. We obtained Gemini North observations for J0206 to cover the Hβ and Hα emission lines, simultaneously. We used the Gemini Multi-Object Spectrograph (GMOS-N) with the R400 grating (400 lines/mm), with a resolution of 1918 and wavelength coverage of 416 nm. The 3.5m telescope at the Apache Point Observatory (APO) is located in the Sacramento Mountains in Sunspot in New Mexico, United States. We used the Double Imaging Spectrometer (DIS), which is a medium dispersion spectrograph with separate red and blue channels. In the blue (red) channel, we used the B400 (R300) grating 400 (300) lines/mm with a wavelength coverage of 3660 (4620) . Soon after our initial follow-up MMT observations confirmed J1338 to be a CLQ in the faint state, it re-brightened, as confirmed using the APO 3.5m telescope after our Chandra observations. The Magellan Telescopes are a pair of 6.5 meter telescopes located at Las Campanas Observatory in Chile. We used the Inamori Magellan Areal Camera and Spectrograph (IMACS) on the Baade telescope with a grating 300 lines/mm, with a wavelength coverage of 3650-9740. We used the Magellan Baade telescope to observe J1338 a few months after Chandra observations. The spectra were reduced using standard [IRAF is distributed by the National Optical Astronomy Observatory, which is operated by the Association of Universities for Research in Astronomy (AURA) under cooperative agreement with the National Science Foundation.] routines <cit.>. Since flux calibrations from the follow-up spectra were not always reliable, we normalized the spectra to the earlier SDSS spectrum assuming a constant narrow emission line luminosity (described in §<ref>). All the spectra of the five CLQs are shown in Figure <ref>. The spectra in black are earliest SDSS spectra in the bright states. The spectra in red are our follow-ups in the faint state. For some of them, there are intermediate spectra (green and orange) observed by SDSS or our follow-ups. cccccccl Spectroscopic Observations 1pt Name MJD Date Telescope Spectrograph Grating ExpTime State day lines/mm second J0206 56660 2014-01-03 SDSS ⋯ ⋯ ⋯ Bright J0206 58431 2018-11-09 MMT Binospec 270 2000 Faint J0206 58507 2019-01-24 Gemini GMOS-N 400 3000 Faint2 J0224 51908 2000-12-30 SDSS ⋯ ⋯ ⋯ Bright J0224 59145 2020-10-23 MMT Binospec 270 1800 Faint J0829 55513 2010-11-13 SDSS ⋯ ⋯ ⋯ Bright J0829 58866 2020-01-18 MMT Binospec 270 2700 Faint J1226 51990 2001-03-22 SDSS ⋯ ⋯ ⋯ Bright J1226 54153 2007-02-22 SDSS ⋯ ⋯ ⋯ Intermediate J1226 58574 2019-04-01 MMT Binospec 270 3200 Faint J1338 52427 2002-06-02 SDSS ⋯ ⋯ ⋯ Bright J1338 57818 2017-03-06 MMT Blue Channel 300 1800 Faint J1338 57891 2017-05-18 APO 3.5m DIS Blue 400 (Red 300) 900 Intermediate J1338 58162 2018-02-13 Magellan IMACS 300 1800 Intermediate2 Date is in format of year-month-day. ExpTime stands for “Exposure Time". §.§ X-ray Observations We used archival X-ray observations close in time to the optical spectra from the Chandra Source Catalog <cit.> or the XMM-Newton serendipitous survey <cit.>. For X-ray observed CLQ candidates confirmed as CLQs by optical follow-up spectra, we obtained Chandra ToO observations. Our Chandra observations were triggered shortly after our optical spectroscopic follow-ups. The targets were observed using the Advanced CCD Imaging Spectrometer (ACIS) detector <cit.>. The X-ray observations are listed in Table <ref>. Four of the CLQ candidates were thereby observed in X-rays in both bright and faint states. However, J1338 is a special case. In March 2017 (MJD 57818), we obtained an optical spectrum of the XMM-Newton source and CLQ candidate J1338, for which analysis showed that the Hβ broad line had vanished at ≥ 3σ significance with respect to the earlier SDSS spectrum. Shortly afterward, we began monitoring the source with the 1.2m at FLWO, which confirmed the object to be in the faint state according to the g-band magnitude. We triggered the Chandra observation in mid-April, but it was observed by Chandra about 3 weeks later, during which we saw an unexpected ∼1 mag brightening in the g-band. The resulting Chandra spectrum showed a bright unobscured, normal AGN power law slope, as expected after its re-brightening. Just after the Chandra observation, we obtained an optical spectrum with the 3.5m at Apache Point Observatory in June that showed significant broad Hβ emission line flux (spectrum plotted in orange in Figure <ref>). The light curve of J1338 indicates a transition from faint to bright state of about 40 days, very rapid even for a CLQ. For Chandra data reduction, we used the software version 4.14 <cit.> and CALDB version 4.9.6. We used the reprocessing script, which automates the recommended data processing steps in . For archival XMM-Newton data reduction, we used the Science Analysis Software <cit.> version 20.0.0 following standard procedures. The XMM-Newton data is from three X-ray CCD cameras, including two MOS cameras (MOS1 and MOS2) and one pn camera. ccccccclcc X-ray Observations 1pt Name Telescope ObsID PI MJD Date Exposure Net Counts Group Epoch day kilosecond J0206 XMM 677670138 Pierre 55945 2012-01-19 10.7 20.23/18.22/18.22 1 J0206 XMM 677670139 Pierre 55945 2012-01-19 14.3 24.63/29.77/18.83 1 J0206 XMM 747190632 Pierre 56691 2014-02-03 24.3 170.54/157.70/300.24 2 J0206 XMM 742430201 Mantz 56837 2014-06-29 30.8 640.84, 623.45, 436.19 3 1 J0206 Chandra 16575 Mantz 57197 2015-06-24 4.991 36.88 4 J0206 Chandra 20457 Green 58483 2018-12-31 19.84 345.86 5 2 J0206 Chandra 22027 Green 58483 2018-12-31 19.84 315.39 5 2 J0224 XMM 655343850 Finoguenov 55582 2011-01-21 2.7 48.72, 58.51, 219.87 1 1 J0224 Chandra 23662 Green 59279 2021-03-06 24.95 357.87 2 2 J0224 Chandra 24978 Green 59280 2021-03-07 23.96 389.57 2 2 J0829 XMM 724791301 Dennerl 56573 2013-10-08 26.2 128.53, 149.15, 175.94 1 1 J0829 XMM 724791332 Dennerl 56574 2013-10-09 8.7 89.97, 89.88, 115.24 1 1 J0829 XMM 724791333 Dennerl 56574 2013-10-09 8.7 46.86, 44.57, 46.28 1 1 J0829 Chandra 22550 Green 58967 2020-04-28 17.72 77.17 2 2 J0829 Chandra 23234 Green 58972 2020-05-03 29.4 124.99 2 2 J1226 Chandra 4865 Richards 53047 2004-02-12 4.899 145.68 1 1 J1226 Chandra 21412 Green 58606 2019-05-03 16.84 141.47 2 2 J1226 Chandra 22204 Green 58607 2019-05-04 17.83 134.38 2 2 J1226 Chandra 22205 Green 58608 2019-05-05 11.91 86.96 2 2 J1338 XMM 502060101 Lamastra 54292 2007-07-11 17.6 68.44, 87.38, 224.18 1 1 J1338 Chandra 19474 Green 57881 2017-05-08 32.64 924.96 2 2 ObsID stands for “Observation ID". Net counts for XMM-Newton (XMM) are for cameras MOS1, MOS2, and pn, respectively. §.§ Radio Observations If CLQ dim states represent a radiatively inefficient accretion (RIAF) state, they should re-activate a compact radio jet, as seen in low luminosity AGN <cit.>. We triggered radio observations using the VLA for four of the five CLQs, omitting J1338, since it had returned rapidly to the bright state. The VLA consists of 27 independent antennas, each of which has a dish diameter of 25 meters <cit.>. The VLA observations were performed within one day of the Chandra X-ray observations. Each VLA observation lasted two hours, except for J1226 which lasted one hour. This yielded 87 min on source (38 min for J1226). Observations were taken in C-band with 2×2 GHz basebands centered at 5.25 and 7.2 GHz for the near-equatorial sources J0206, J0224, and J1226 (to minimize interference from satellites within the Clarke Belt), and centered at 5.0 and 7.0 GHz for J0829. We set the flux density scale and performed bandpass calibrations using 3C 147 (for J0206 and J0224) or 3C 286 (for J0829 and J1226), and we cycled to a nearby phase calibrator to solve for the complex gain solutions (see Table <ref> for the phase calibrator and array configuration used for each observation). VLA data were processed using the Common Astronomy Software Applications v6.1.2.7 <cit.> and calibrated using the VLA calibration pipeline 6.1.2, following standard procedures. The data were imaged using tclean, adopting two Taylor terms to model the spectral dependence of sources in the field, and adopting Briggs weighting with a robust value for each source as noted in Table <ref>. We detected radio emission at the known optical position of each target, and flux densities were measured using imfit by fitting a two-dimensional Gaussian to each source. We found that J0224 and J1226 are consistent with point sources, and J0206 and J0829 are extended (3.0 arcsec×0.5 arcsec and 6.8 arcsec×4.5 arcsec, respectively, after deconvolution with the synthesized beam). The signal-to-noise of the radio detections is not large enough to obtain meaningful in-band constraints on the radio spectral indices of our targets. We summarize the radio observations in Table <ref>. cccccccccc Radio Observations 1pt Name Project Config Phase Cal MJD Date robust f_peak logL_ 5GHz log(R) μJy bm^-1 erg s^-1 J0206 18B-393 C J0239-0234 58483 2018-12-31 0.0 47.1±5.4 39.01 -4.79 J0224 SM0081 A J0239-0234 59279 2021-03-06 0.0 50.1±4.5 38.90 -5.03 J0829 SL0102 C J0818+4222 58968 2020-04-29 1.0 13.8±2.8 38.86 -5.25 J1226 SK0063 B J1224+0330 58609 2019-05-06 0.5 28.4±5.2 39.18 -5.15 f_peak is reported at 6.2 GHz for J0206, J0224, and J1226, and 6.0 GHz for J0829. R is the radio loudness, R = L_ 5GHz/L_2500. §.§ Infrared Data The Wide-field Infrared Survey Explorer <cit.> mapped the all-sky in 2010 in four bands centered at mid-infrared (MIR) wavelengths of 3.4, 4.6, 12, and 22 μm (W1, W2, W3, and W4). WISE scans the sky every half a year in W1 and W2 bands. We used unWISE <cit.> light curves force-photometered for sources in the DESI Legacy Imaging Surveys <cit.>. We also compiled available near-infrared (NIR) data, including the UKIRT Infrared Deep Sky Survey <cit.> in YJHK bands, the UKIRT Hemisphere Survey <cit.> in J band, and the VISTA Hemisphere Survey <cit.> in YJHK_s bands. § DATA ANALYSIS §.§ Optical Spectral Fitting We fit the optical spectra following the quasar spectral fitting code, [ is a general-purpose IDL code for quasar spectral fits <cit.>.], from <cit.>. The spectra are fit in the rest-frame of the quasar after correcting for Galactic reddening, again using the dust map of <cit.> and the extinction curve from <cit.>. decomposes different components in the quasar spectrum, including power-law continuum, emission multiplets, and major broad and narrow emission lines. uses empirical UV emission templates from the literature <cit.> covering from 1000 to 3500, and an optical template (3686-7484) from <cit.>. is designed for quasar spectral fitting, where the host galaxy emission is not prominent, so no host galaxy components were included initially. For our CLQs in the faint states when the AGN continuum is dim, the host galaxy emission becomes more obvious. Therefore, we enhanced the code to take into account host galaxy stellar emission using the simple stellar population models <cit.> with the <cit.> initial mass function. We allow for two host components, one for the young (<300 Myr) stellar population and one for old (>300 Myr) stellar populations. We use 30 templates from <cit.>, covering the metallicities of Z = 0.004, 0.02 and 0.05, and the ages of 0.005, 0.025, 0.10, 0.29, 0.64, 0.90, 1.4, 2.5, 5, and 11 Gyr. Following <cit.>, we choose a few continuum windows and fit the continuum components described above together. The emission lines are fit after subtracting the fitted continuum model. Three broad and one narrow Gaussian components are used for the Hβ and Hα emission. As the extent of the narrow emission line region in quasars is typically 10 kpc or larger <cit.> the narrow line flux is expected to remain constant on multi-year timescales. We use the first SDSS epoch as the reference spectrum and re-scale the other spectra to the first SDSS epoch according to the flux of the narrow , and then re-fit the spectra as described above. To quantify the measurement uncertainties, we used a Monte Carlo approach, by adding a random Gaussian deviate to the flux at each pixel, with the Gaussian σ equal to the spectral error at that pixel. We compute the values and their uncertainties using the median value and the semi-amplitude of the range enclosing the 16th and 84th percentiles of the distribution from 100 trials. Figure <ref> shows an example of the optical spectral fitting to J0224 in the bright state (left panels) and faint state (right panels). The top panels show the continuum decomposition. In the bright state, the continuum is dominated by the AGN power-law continuum. Weak host stellar emission is also detected. In the faint state, the AGN continuum emission dimmed dramatically, thus the continuum becomes dominated by the host stellar emission. The middle two panels shows the spectral fitting in the Hβ window. There is obvious broad Hβ emission in the bright state; but it becomes invisible in the faint state. The bottom two panels are in the Hα window. The broad Hα emission became much weaker, but remains visible in the faint state. To evaluate the variability of broad Hβ emission, we calculate the flux deviation between the bright and faint state spectra in the Hβ window (4750–4940) following <cit.> and <cit.> as N_σ(λ) = (f_ bright - f_ faint) / √(σ_ bright^2 + σ_ faint^2), where f is the flux density in unit of erg s^-1 cm^-2 ^-1 and σ is its uncertainty. Following the procedures in <cit.> and <cit.>, we subtract the continuum model, re-bin the spectrum to 2/pixel in the rest frame, and smooth the spectrum with a window of 32. We characterize the significance of the Hβ change as the maximum flux deviation of the line relative to the continuum at 4750 as follows, N_σ( Hβ) = N_σ (4750-4940 ) - N_σ (4750 ). To estimate the black hole mass, M_ BH, for each of our CLQs, we utilize the single-epoch virial black hole mass method, using the bright-state spectrum with its prominent broad emission lines. In this approach, the M_ BH is estimated using the measured width of a broad Balmer emission line, as well as a empirical radius–luminosity relation for the BLR based on reverberation mapping results of low-redshift AGN. We use the relation (Equation 6) in <cit.> as follows, M_ BH = 10^6.91 ± 0.02[ FWHM(Hβ)/ 1000 km s^-1]^2 ×[ L( Hβ)/ 10^42 erg s^-1]^0.5 M_⊙, where FWHM(Hβ) and L( Hβ) are the full width at half maximum (FWHM; i.e., the width) and luminosity of the broad Hβ emission. The Eddington luminosity is calculated as L_ Edd = 1.26 × 10^38 M_ BH, in units of erg s^-1. cccccccc Optical Spectroscopic Properties 1pt Name N_σ( Hβ) log(L_ Hβ, 1) log(L_ Hβ, 2) log(λ L_ 5100) FWHM_ Hβ log(M_ BH/M_⊙) log(M_ BH, ref/M_⊙) erg s^-1 erg s^-1 erg s^-1 km h^-1 J0206 3.59 42.35±0.02 41.84±0.12 44.03±0.01 9715.0±515.1 8.90±0.05 8.95±0.04 J0224 5.85 42.50±0.01 42.01±0.02 44.38±0.01 5106.7±286.3 8.51±0.05 8.74±0.05 J0829 3.91 42.67±0.05 42.20±0.04 44.32±0.02 3907.8±798.0 8.25±0.17 8.54±0.13 J1226 4.41 43.07±0.07 42.38±0.03 44.60±0.02 2869.6±623.6 8.13±0.15 8.17±0.12 J1338 2.76 42.51±0.08 42.44±0.13 44.30±0.05 4355.7±692.5 8.34±0.13 8.60±0.15 N_σ( Hβ) is the significance of the change in Hβ broad line emission between the bright and faint states. L_ Hβ, 1 and L_ Hβ, 2 are the broad Hβ line luminosities in the bright and faint state, respectively. L_ 5100 is listed for the bright state only, as that is what we use to calculate M_ BH. M_ BH, ref are the values derived by <cit.>, shown for comprison. cccrrrrrrrrr X-ray Spectral Analysis 1pt Name Telescope Epoch χ^2_ dof_ χ^2_ red N_H, intrin Γ_X Norm log(F_ 0.5-7keV) log(ν L_ 2 keV) log(L_ 2-10 keV) 10^22  cm^-2 10^-5 erg s^-1 cm^-2 erg s^-1 erg s^-1 J0206 XMM-Newton 1 132.387 85 1.56 0.063_-0.013^+0.014 1.744_-0.057^+0.059 10.125_-0.582^+0.625 -12.580_-0.016^+0.015 43.786_-0.011^+0.011 44.079_-0.020^+0.019 J0206 Chandra 2 22.653 29 0.78 0.000_-0.000^+0.065 1.673_-0.082^+0.087 7.198_-0.631^+0.789 -12.676_-0.019^+0.019 43.658_-0.021^+0.020 43.979_-0.028^+0.027 J0224 XMM-Newton 1 80.196 45 1.78 0.035_-0.021^+0.025 2.344_-0.159^+0.172 20.614_-2.222^+2.651 -12.494_-0.041^+0.041 43.808_-0.034^+0.033 43.885_-0.060^+0.058 J0224 Chandra 2 54.727 35 1.56 0.000_-0.000^+0.030 1.708_-0.087^+0.088 7.202_-0.678^+0.726 -12.669_-0.017^+0.017 43.534_-0.022^+0.021 43.841_-0.027^+0.025 J0829 XMM-Newton 1 273.537 170 1.61 0.088_-0.028^+0.030 1.899_-0.083^+0.086 9.673_-0.878^+0.982 -12.807_-0.021^+0.021 44.050_-0.015^+0.015 44.285_-0.025^+0.024 J0829 Chandra 2 45.523 27 1.69 0.000_-0.000^+0.371 1.715_-0.122^+0.224 3.238_-0.546^+1.299 -13.163_-0.031^+0.031 43.628_-0.044^+0.043 43.932_-0.039^+0.038 J1226 Chandra 1 5.104 8 0.64 0.000_-0.000^+0.223 2.192_-0.185^+0.190 13.021_-2.055^+2.371 -12.795_-0.047^+0.047 44.099_-0.042^+0.041 44.228_-0.071^+0.070 J1226 Chandra 2 61.520 46 1.34 0.000_-0.000^+0.033 1.662_-0.105^+0.106 4.633_-0.577^+0.651 -12.970_-0.024^+0.024 43.803_-0.032^+0.032 44.128_-0.029^+0.029 J1338 XMM-Newton 1 79.536 65 1.22 0.107_-0.032^+0.038 2.246_-0.149^+0.163 10.380_-1.291^+1.561 -12.837_-0.035^+0.034 43.722_-0.026^+0.025 43.833_-0.048^+0.046 J1338 Chandra 2 42.382 35 1.21 0.000_-0.000^+0.043 2.038_-0.072^+0.073 14.548_-1.008^+1.046 -12.564_-0.016^+0.015 43.929_-0.017^+0.016 44.112_-0.026^+0.025 N_H, intrin is the best-fit intrinsic absorption column density at the quasar redshift in unit of 10^22  cm^-2. §.§ X-ray Spectral Analysis For X-ray spectral analysis and fitting, we used the software <cit.> in version 12.12.0. We grouped X-ray spectra observed with the same telescope within one week and performed spectral analysis together, indicated by the column “Group" in Table <ref>. In , the spectra are grouped using the task , so that each spectral bin contains 20, 15, 10, 5, 3 or 1 counts, when the total net counts, N_ net, N_ net≥300, 225≤N_ net <300, 100≤N_ net <225, 50≤N_ net <100, 30≤N_ net <50, or 10≤N_ net <30, respectively. We used χ^2 statistic for high-count spectra and C statistic <cit.> when the counts in each spectral bin are less than 20. The intrinsic AGN X-ray spectrum is typically a power law within the Chandra and XMM-Newton energy range. The observed X-ray spectrum is a result of the intrinsic spectrum reduced by line-of-sight absorption, mainly from the intrinsic absorption at the quasar redshift and the Galactic absorption from the Milky Way. Therefore, we used the model in as follows, phabs * zphabs * zpower, where is the Galactic absorption, models the intrinsic absorption with the redshift fixed to the source redshift, and is a simple photon power law redshifted to the source redshift. We used the task in to obtain the Galactic absorption column density, N_H, derived from the HI map <cit.>. The typical Galactic N_H for our CLQs are 2×10^20  cm^-2. §.§ SED Fitting Since we are interested in the Eddington ratio in different states for these accreting SMBH, we calculate the bolometric luminosity, L_ bol, by fitting to the SEDs. We use the software <cit.> version v2022.1. implements a modern UV-to-IR AGN module, SKIRTOR <cit.>, which is a clumpy torus model. Host galaxy stellar emission is also considered in using stellar populations in <cit.>. To fit X-ray and other wavelengths simultaneously, uses the UV to X-ray slope, i.e., α_ OX. We use a definition of α_ OX following literature <cit.> as, α_ OX = 0.3838  log(L_ 2500 / L_ 2 keV), where L_ 2500 and L_ 2 keV are the AGN intrinsic luminosity per frequency (in units of erg s^-1 Hz ^-1) at 2500 (UV) and 2 keV (X-ray), respectively. Since we have X-ray measurements as described in §<ref>, we fixed the X-ray photon indices, Γ_ X and normalizations (fluxes), to the value measured from the X-ray spectra. To explore a wide range of SED shapes and possible variability of α_ OX, we allow for a large deviation |Δα_ OX|_ max=0.6 from the expected AGN values of α_ OX = 0.137  log(L_ 2500) - 2.638 <cit.> used by . Galactic extinction correction is not implemented in . For optical, NIR, and MIR data, we corrected the Galactic extinction for each band as described in §<ref>. § RESULTS §.§ Optical Results We obtained follow-up optical spectroscopy for five new CLQs, summarized in Table <ref>. The optical spectra are shown in Figure <ref>. The optical spectroscopic observations demonstrate that the quasar continuum emission dimmed significantly, along with the broad Balmer emission. In all the five CLQs, broad Hβ disappeared, as well as Hγ. In three CLQs, J0224, J1226, and J1338, there is visible broad Hδ emission in the bright states, which disappeared in the faint state as well. For two CLQs at lower redshift, thus with coverage of Hα emission, J0206 and J0224, the broad Hα becomes weaker in the faint states, but still remains visible (see the spectral fitting to J0224 in Figure <ref>). For the other three CLQs at higher redshift, thus with coverage of , the broad emission decreases, but remains visible as well. Hα and vary slower than Hβ, possibly due to larger radius of gas emitting Hα and . This phenomenon is consistent with previous spectroscopic follow-up of CLQs <cit.>. We calculate the significance of Hβ change, defined in Equation <ref>. Four of the five CLQs vary at ≳ 4σ level; and one CLQ J1338, the first one observed in 2017 which rapidly brightened again, shows a decrease of broad Hβ slightly below the 3σ level. <cit.> and <cit.> used a criterion for CLQ behavior as having a change of broad Hβ flux at N_σ( Hβ) ≥ 3. <cit.> indicated that better criteria to declare identification of a bona fide CLQ should be based on intrinsic properties measured with adequate significance i.e., the fractional change in both continuum luminosity and broad Hβ line luminosity should be larger than 30%. In practice, nearly all CLQs that satisfy the N_σ( Hβ) ≥ 3 criterion also satisfy the other two criteria. In Table <ref>, we summarize some of the relevant the spectral fitting measurements. The broad Hβ line luminosity L_ H β changes more than 30% between the bright and faint states for the four CLQs with N_σ( Hβ) ≥ 3σ. crrrrrcr Changing-obscuration Model 1pt Name χ^2 dof χ^2_ red χ^2_ abs dof_ abs χ^2_ red, obsc N_H, obsc 10^22  cm^-2 J0206 22.653 29 0.78 50.394 31 1.63 0.417_-0.086^+0.099 J0224 54.727 35 1.56 107.572 37 2.91 1.154_-0.112^+0.122 J0829 45.523 27 1.69 253.722 29 8.75 2.605_-0.290^+0.289 J1226 61.520 46 1.34 114.350 48 2.38 1.173_-0.165^+0.164 χ^2_ red,obsc, the reduced χ^2 values of the changing-obscuration model, is larger than χ^2_red of the independent best-fit model from Table <ref>. Using the bright state spectra, with their prominent broad Hβ emission, we find the virial M_ BH based on Equation <ref> for these CLQs are 10^8-9 M_⊙ (see individual results in Table <ref>). Our M_ BH measurements are consistent with the results in <cit.>, though slightly lower (0.04-0.29 dex), since we accounted for the host galaxy contribution, thus yielding a lower AGN continuum emission. Figure <ref> shows the multiwavelength light curves of the five new CLQs, from top to bottom panels, in X-ray, optical g and r bands, and MIR W1 and W2 bands. In the optical, the photometric data has been calibrated to the SDSS filter magnitude (as described in §<ref>). The multiwavelength light curves show highly consistent variability trends across the different wavebands. J1226 faded all the way from 1999 to 2021 in all wavelengths from X-ray to MIR. Across more than two decades, its variability shows a slow, steady decline. Until recently, the ZTF imaging observations in 2022 shows signs of re-ignition in this CLQ. The other CLQs are different from J1226, with shorter timescale variability. Recent ZTF photometric data shows signs of re-brightening in all of the five CLQs. The Chandra observation of J1338 is brighter than its previous X-ray observation (described in §<ref>). It brightened by 0.7 mag in g band and 0.3 mag in r band within two months from our MMT observation to the Chandra observation, according to our photometric monitoring using the 1.2m FLWO telescope. The r-band photometry close to the Chandra observation is actually 0.1 mag brighter than the one close to the XMM-Newton observation. In the Magellan spectrum, 11 months after the MMT observation, the broad Hβ reappeared. Therefore, we believe that the Chandra X-ray observation of J1338 was not performed in its faint state. §.§ X-ray Analysis Results Since the primary physical puzzles concern the SMBH accretion rate and intrinsic absorption, X-ray observations are the ideal probes. We firstly fit the X-ray spectra in both states independently. Figure <ref> shows the X-ray spectral fitting results for the five CLQs in Epoch 1 (left panels) and Epoch 2 (right panel), with the model described in §<ref>. Within one panel, the observations taken for the same object with the same telescope within one week are fit together. The different colors/symbols are data from different observations (or cameras). We summarize the X-ray fitting results in Table <ref>. No strong intrinsic absorption is detected in either bright or faint states for these quasars. The faint-state X-ray spectra are fit well with zero intrinsic column density, N_H, intrin, with 1σ upper limits smaller than or comparable with the N_H, intrin values in the bright-state X-ray spectra. The non-absorption result is consistent with previous studies on X-ray studies of CLQs <cit.>, as well as in CL AGN such as Mrk 590 <cit.> and Mrk 1018 <cit.>. Instead, we detected changes in the power-law continuum, both in photon index and flux. Apart from J1338, which re-brightened rapidly, in the other four CLQs, the intrinsic fluxes in Epoch 2 are lower than those in Epoch 1. As shown in Figure <ref>, their X-ray emission generally tracks the optical variability. The photon indices are harder in the faint state, consistent with the trend in ensemble AGN <cit.>. As X-ray data is sensitive to absorption, we use the X-ray spectra to test the changing-obscuration model. Assuming varying absorption is the cause of the changes, we fix the AGN power-law continuum parameters in the faint state to the measurements obtained in the bright state, with only quasar intrinsic column density as a free parameter. Figure <ref> shows the results for the four CLQs observed in the faint state by Chandra. The plotted data are from Chandra in the faint state. The dotted black line is the independent best-fit model in the faint state. The dashed red line is the best-fit changing-obscuration model to the faint-state data. The results demonstrate that the changing-obscuration model does not match the observations. The reduced χ^2 value, χ^2_ red, obsc of this changing-obscuration model is larger than the results of the independent best-fit model (summarized in Table <ref>). For these CLQs, the X-ray data are not consistent with a varying absorption scenario. §.§ CLQ SED Variability The CLQs show multiwavelength variability. Figure <ref> illustrates the comparison between the SEDs in the Epoch 1 (black) and Epoch 2 (red). We fit the SEDs with components including AGN (X-ray and UV to IR), host galaxy, and dusty torus (as described in §<ref>). The right bottom panel shows an example of the SED decomposition for J1226 in the bright state. In the four CLQs, J0206, J0224, J0829, and J1226, Epoch 2 is fainter than Epoch 1 throughout the electromagnetic spectrum. We integrate the best-fit SED model to obtain the bolometric luminosity, L_ bol, and use the virial M_ BH obtained from the optical spectra to calculate the Eddington ratio, λ_ Edd. Only for J1338 is the L_ bol higher in Epoch 2 than in Epoch 1. The L_ bol are in range of 10^44.7-45.6 erg s^-1 and the λ_ Edd are in range of from 10^-2.2 to 10^-0.5 (0.6% to ∼30%; summarized in Table <ref>). We also measure the UV luminosity (λ L_2500) and UV to X-ray slope (α_ OX) from the SED fitting. Use of the SED fitting is more accurate for this purpose than simply extrapolating rest frame luminosities from total observed fluxes, because we are interested in changes to the AGN emission, and our SED fitting models the host galaxy and AGN components separately, especially important for the faint states. The entire SED variability shape is not consistent with varying obscuration; while the mid-infrared flux varies significantly, it is at most weakly affected by dust extinction. The extinction coefficient in g band is a factor >15 greater than that in the W1 band, according the extinction law <cit.>, across a range R_V values (see Table <ref>). All five CLQs vary more than 0.5 mag in W1 band, which cannot be caused by changing extinction given the corresponding ∼ 1-2 mag optical variability. Some of the CLQs show larger variability in the W2 band than in the W1 band, also inconsistent with an extinction model. It is more likely the changes in these CLQs are due to changing accretion state of the SMBH, whereby the multiwavelength emission varies accordingly. The accretion rate of the central SMBH decreased, so the whole system dimmed. The AGN emission throughout the entire electromagnetic spectrum – the UV-optical emission from the accretion disk, the X-ray emission from the corona, and the MIR emission from the re-radiation in the dusty torus – decreased as the luminosity from the central engine decreased. As a consequence, the emission in the BLR, photoionized by the UV emission from the accretion disk, fades and even disappears. The SEDs show stronger variabilities in the X-ray, UV optical, and MIR, than in the near-infrared. This is also reasonable in this scenario, because the emission in the NIR is dominated by the host galaxy, which does not vary. If the common model of AGN structure with hotter regions at smaller radii is correct, then densely cadenced multiwavelength photometry throughout a state transition should verify that continuum changes generally propagate with time from shorter to longer wavelengths. cccccc SED Fitting Results 1pt Name State log(L_ bol) log(λ_ Edd) log(λ L_2500) α_ OX erg s^-1 erg s^-1 J0206 1 44.94±0.03 -2.06±0.06 44.02±0.06 1.10±0.03 J0206 2 44.81±0.03 -2.19±0.06 43.80±0.09 1.07±0.03 J0224 1 45.26±0.05 -1.35±0.07 44.63±0.07 1.29±0.03 J0224 2 44.78±0.03 -1.83±0.06 43.93±0.10 1.16±0.04 J0829 1 45.32±0.04 -1.04±0.17 44.60±0.06 1.22±0.02 J0829 2 44.90±0.02 -1.46±0.17 44.11±0.01 1.21±0.02 J1224 1 45.64±0.01 -0.59±0.15 45.03±0.01 1.35±0.03 J1224 2 45.11±0.02 -1.11±0.15 44.33±0.03 1.23±0.02 J1338 1 45.15±0.03 -1.29±0.13 44.51±0.03 1.28±0.02 J1338 2 45.17±0.05 -1.27±0.14 44.44±0.08 1.19±0.03 § DISCUSSION §.§ Fundamental Plane of Black Hole Activity Accretion onto BHs illuminates fascinating physics from the stellar mass BHs in XRBs to the SMBHs. The fundamental plane of black holes shows the correlation of radio luminosity, X-ray luminosity, and black hole mass for hard-state XRBs and their supermassive analogs <cit.>. The theoretical framework behind the fundamental plane typically assumes a black hole fed by a RIAF that is launching a compact, partially self-absorbed synchrotron jet (implying unresolved radio emission with a flat/inverted spectrum; e.g., ). Using the VLA radio observations, we obtain the radio luminosity at 5 GHz in the rest frame, L_ 5GHz, typically ∼10^39 erg s^-1 for the four CLQs (summarized in Table <ref>). In Figure <ref>, we plot the CLQs on the edge-on view of the fundamental plane in <cit.>. The correlation extends over many decades of black hole mass and luminosity, including many different sources, from stellar mass BHs to SMBHs. The CLQs appear to follow the fundamental plane relation. However, there are several caveats to bear in mind that complicate physical interpretations with current data. Foremost, although we detect radio emission from all four CLQ targets in their faint states, we stress that it is unclear if this emission is related to the activation of a compact jet, or if the radio emission is instead a relic from the previous QSO phase. It is also unknown if our targets' radio emission have flat/inverted spectra, and only two of our targets remain unresolved at VLA spatial resolutions (J0224 and J1226). We use different symbols in Figure <ref> to distinguish point source (filled circle) and possible extended (filled diamond) sources. §.§ Analogy between AGN and XRBs Accretion state transitions have been detected in many XRBs. The X-ray power-law continuum slope correlates strongly with Eddington ratio λ_ Edd in individual XRBs as their accretion state varies, such as Swift J1753.5-0127 <cit.>, H1743-322 <cit.>, and GX 339-4 <cit.>. Similar trends are seen (so far) across samples of quasars and Seyferts <cit.>, but have rarely been tracked in individual AGN, much less luminous quasars. Figure <ref> shows the X-ray power-law slope, Γ_ X, vs. the Eddington ratio. The colored dots are our five CLQs; dots of the same color represent the same object in different states. The black filled squares are individual AGN in the sample of <cit.>, and the other black symbols are individual XRBs. Each individual CLQ basically follow the same softer-when-brighter trend, probably due to the changes in the hot corona temperature or opacity <cit.> There is both variability in the UV/optical and X-ray. α_ OX provides a measurement of the ratio of disk to corona emission. Large α_ OX corresponds to strong UV relative to X-ray (i.e., a soft SED). Figure <ref> shows the α_ OX vs. Eddington ratio, λ_ Edd. The gray symbols are CLQ measurements in the faint state <cit.> and (ROSAT) X-ray upper limits in the bright state (so lower limits in α_ OX, shown with upward arrows). The black symbols are three known CLQs with X-ray measurements in both states, including J0159 <cit.>, and J2252 and J2333 <cit.>. There is some evidence that α_ OX varies with λ_ Edd in two branches around a critical Eddington ratio of ∼10^-2 (1%). When λ_ Edd≳ 1%, as is the case for our CLQ observations, α_ OX hardens (decreases) when λ_ Edd decreases. By contrast, when λ_ Edd≲ 1%, α_ OX softens (increases) when λ_ Edd is smaller. While there is evidence to support this trend from ensembles of AGN each observed once, it is key to track the trends among individual AGN observed at different accretion rates because other factors - most importantly SMBH mass and inclination angle - are obviously fixed across epochs for individual AGN. Our CLQs are mostly λ_ Edd≳ 1%, so the individual CLQs vary such that α_ OX increases (softens) with λ_ Edd. J0206, with λ_ Edd slightly lower than 10^-2, also follows this trend. J1338 is an outlier, but as we mentioned it varies quickly, and we did not catch the desired faint state in X-rays. For J0159, with one epoch at λ_ Edd > 10^-2 and another epoch at λ_ Edd < 10^-2, <cit.> reported no detected change in X-ray slope or (albeit with large errors) in α_ OX . In Figure <ref>, the asterisks are predictions for AGN from <cit.>, based on modeling the observed X-ray spectral evolution of the XRB GRO J1655–40 during its accretion state transition and scaling the SED evolution up to AGN SMBH masses. The predicted data from XRBs also show a critical Eddington ratio of about 1%. The analogy of SMBHs and stellar mass black holes encourages a theoretical model to explain the phenomena. Referring to theoretical models of XRBs, <cit.> suggested that at high Eddington ratios, accretion is mediated via a geometrically thin accretion disk <cit.>. As λ_ Edd decreases, there is less UV emission from the thin disk with lower apparent temperature, so α_ OX decreases. When the λ_ Edd is lower than 1%, a jet may launch or the inner region of the thin disk may progressively evaporate into a hot radiatively inefficient accretion flow (RIAF) that is possibly advection-dominated <cit.>. Thus the α_ OX increases again possibly due to the emergence of UV emission from either a jet or an advection-dominated accretion flow (ADAF). For our CLQs, the λ_ Edd is not far below 10^-2, and the radio loudness is ∼10^-5 (see Table <ref>), indicating no powerful jet launch, so our observations are consistent with the model. Multi-epoch observations of CLQs at even lower Eddington ratios are warranted. However, evidence so far indicates that most AGN with λ_ Edd< 1% will not show broad emission lines, so the necessary observations may require following significant intrinsic (not absorption-related) variability in type 2 AGN. Strong variability in “naked type 2" AGN is relatively rare, but worth pursuing; they may on closer inspection be found to have weak broad Hβ emission, and/or broad Hα (e.g., associated with types 1.8 or 1.9) <cit.>. § SUMMARY We present multiwavelength, multi-epoch observations of five new CLQs and analyze the data both in the bright and faint states. Our main conclusions are as follows: * Our optical spectroscopic follow-up confirms CLQ behavior, with continuum emission dramatically dimmed, accompanied by disappearance of broad Balmer emission lines, such as Hβ, Hγ, and Hδ. By selection, their broad Hβ varies at ≳  3σ level. The broad Hα and emission varies less (or much more slowly) than Hβ. * The CLQs vary accordingly in multiwavelength throughout the electromagnetic spectrum, in X-ray, optical, and MIR. * The intrinsic X-ray continuum strength changes together with the optical variability. The X-ray power-law slope changes following a harder-when-fainter trend. No strong absorption is detected in the faint-state X-ray spectra, so that a changing-obscuration model does not match the X-ray observations. * The broader SED variability is also inconsistent with the changing-obscuration model, especially given that large amplitude MIR variability (>0.5 mag) is detected in all five quasars. * It is highly likely that the changes in these CLQs are due to changing accretion state of the SMBH, so the multiwavelength emission varies accordingly. * There are many similarities between AGN and XRBs, indicating similarities in the BH accretion processes in SMBHs and stellar mass black holes. Only a handful of CLQ have been observed in X-rays both before and after the state transition. More such observations are needed for a statistically significant result. Our five CLQs are basically at λ_ Edd≳ 10^-2. More CLQ transitions over a wide range of λ_ Edd will be important for studies of BH accretion processes and AGN structure. We thank Ruancun Li and Malgorzata Sobolewska for useful discussions and suggestions. This research has made use of data obtained from the Chandra Data Archive and the Chandra Source Catalog, and software provided by the Chandra X-ray Center (CXC) in the application packages CIAO and Sherpa. Q.Y. is partially supported for this work by the National Aeronautics and Space Administration through Chandra Award Numbers GO9-20086X and GO0-21084X, issued by the Chandra X-ray Center, which is operated by the Smithsonian Astrophysical Observatory for and on behalf of the National Aeronautics Space Administration under contract NAS8-03060. RMP acknowledges support from the National Science Foundation under grant No. 2206123. This work used observations obtained with XMM-Newton. Based on observations obtained with XMM-Newton, an ESA science mission with instruments and contributions directly funded by ESA Member States and NASA. We acknowledge the use of telescopes, including MMT, Gemini, Magellan, the 3.5m telescope at APO, and the 1.2m telescope at the Fred Lawrence Whipple Observatory, operated by the Smithsonian Institution. Observations reported here were obtained at the MMT Observatory, a joint facility of the Smithsonian Institution and the University of Arizona. Based on observations obtained at the international Gemini Observatory, a program of NSF’s NOIRLab, which is managed by the Association of Universities for Research in Astronomy (AURA) under a cooperative agreement with the National Science Foundation on behalf of the Gemini Observatory partnership: the National Science Foundation (United States), National Research Council (Canada), Agencia Nacional de Investigación y Desarrollo (Chile), Ministerio de Ciencia, Tecnología e Innovación (Argentina), Ministério da Ciência, Tecnologia, Inovações e Comunicações (Brazil), and Korea Astronomy and Space Science Institute (Republic of Korea). This paper includes data gathered with the 6.5 meter Magellan Telescopes located at Las Campanas Observatory, Chile. Based on observations obtained with the Apache Point Observatory 3.5-meter telescope, which is owned and operated by the Astrophysical Research Consortium. We acknowledge the use of SDSS data. Funding for SDSS-III has been provided by the Alfred P. Sloan Foundation, the Participating Institutions, the National Science Foundation, and the U.S. Department of Energy Office of Science. The SDSS-III website is <http://www.sdss3.org/>. SDSS-III is managed by the Astrophysical Research Consortium for the Participating Institutions of the SDSS-III Collaboration including the University of Arizona, the Brazilian Participation Group, Brookhaven National Laboratory, Carnegie Mellon University, University of Florida, the French Participation Group, the German Participation Group, Harvard University, the Instituto de Astrofisica de Canarias, the Michigan State/Notre Dame/JINA Participation Group, Johns Hopkins University, Lawrence Berkeley National Laboratory, Max Planck Institute for Astrophysics, Max Planck Institute for Extraterrestrial Physics, New Mexico State University, New York University, Ohio State University, Pennsylvania State University, University of Portsmouth, Princeton University, the Spanish Participation Group, University of Tokyo, University of Utah, Vanderbilt University, University of Virginia, University of Washington, and Yale University. This research has made use of PS1, WISE, CRTS, and PTF imaging data. The PS1 has been made possible through contributions by the Institute for Astronomy, the University of Hawaii, the Pan-STARRS Project Office, the Max-Planck Society and its participating institutes, the Max Planck Institute for Astronomy, Heidelberg and the Max Planck Institute for Extraterrestrial Physics, Garching, The Johns Hopkins University, Durham University, the University of Edinburgh, Queen's University Belfast, the Harvard-Smithsonian Center for Astrophysics, the Las Cumbres Observatory Global Telescope Network Incorporated, the National Central University of Taiwan, the Space Telescope Science Institute, the National Aeronautics and Space Administration under Grant No. NNX08AR22G issued through the Planetary Science Division of the NASA Science Mission Directorate, the National Science Foundation under Grant No. AST-1238877, the University of Maryland, and Eotvos Lorand University (ELTE). This publication makes use of data products from the Wide-field Infrared Survey Explorer, which is a joint project of the University of California, Los Angeles, and the Jet Propulsion Laboratory/California Institute of Technology, funded by the National Aeronautics and Space Administration. The Catalina Sky Survey (CSS) is funded by the National Aeronautics and Space Administration under Grant No. NNG05GF22G issued through the Science Mission Directorate Near-Earth Objects Observations Program. The CRTS survey is supported by the US National Science Foundation under grants AST-0909182 and AST-1313422. We acknowledge the use of PTF data, and the website is <https://www.ptf.caltech.edu>. We acknowledge the use of ZTF data. Based on observations obtained with the Samuel Oschin Telescope 48-inch and the 60-inch Telescope at the Palomar Observatory as part of the Zwicky Transient Facility project. ZTF is supported by the National Science Foundation under Grant No. AST-2034437 and a collaboration including Caltech, IPAC, the Weizmann Institute for Science, the Oskar Klein Center at Stockholm University, the University of Maryland, Deutsches Elektronen-Synchrotron and Humboldt University, the TANGO Consortium of Taiwan, the University of Wisconsin at Milwaukee, Trinity College Dublin, Lawrence Livermore National Laboratories, and IN2P3, France. Operations are conducted by COO, IPAC, and UW. Chandra, XMM-Newton, MMT (Blue Channel spectrograph, BinoSpec), Magellan:Baade (IMACS), Gemini (GMOS-N), APO 3.5m (DIS), FLWO:1.2m, Sloan, PS1, PTF, CRTS, ZTF, WISE CIAO, SAS, XSPEC, CASA, IRAF, QSOFIT, X-CIGALE § EXTINCTION COEFFICIENT We provide a table of conversion coefficients from E(B-V)_ SFD to extinction in 35 filters for the surveys we used in this work in Table <ref>. We calculated the extinction coefficients following the procedures in <cit.>. The extinction in band b is expressed as, A_b = -2.5 log[ ∫ dλ W_b(λ) S(λ)10^-A(λ)Δ m_1μ m/2.5/∫ dλ W(λ)S(λ)] where W_b(λ) is the filter throughput curve in band b as a function of wavelength λ, S is the source spectrum, and A is the extinction law <cit.>, normalized to A_1 μ m = 1. Δ m_1 μ m is a normalization N=0.78 times the extinction at 1μm according to <cit.>. The source spectrum S is a synthetic stellar spectrum, with T_ eff = 7000K, logZ=-1, and logg=4.5 from <cit.>, extrapolating into the infrared following a blackbody spectrum S(λ) ∝λ^-3. We compute the extinction coefficients A_b / E(B-V), with R_V = 2.1, 3.1, 4.1, and 5.1. cccccc Extinction Coefficient 1pt Survey Band A_b/E(B-V) 3-6 R_V=2.1 R_V=3.1 R_V=4.1 R_V=5.1 SDSS u 5.443 4.247 3.716 3.418 SDSS g 3.852 3.304 3.052 2.907 SDSS r 2.260 2.287 2.298 2.305 SDSS i 1.585 1.697 1.749 1.780 SDSS z 1.211 1.263 1.286 1.300 PS1 g 3.666 3.188 2.967 2.840 PS1 r 2.254 2.278 2.288 2.294 PS1 i 1.569 1.682 1.733 1.763 PS1 z 1.259 1.323 1.352 1.369 PS1 y 1.087 1.104 1.111 1.116 PTF g 3.812 3.280 3.035 2.893 PTF R 2.002 2.087 2.126 2.148 ZTF g 3.748 3.240 3.005 2.870 ZTF r 2.111 2.169 2.195 2.210 ZTF i 1.444 1.542 1.587 1.612 FLWO g 3.758 3.245 3.008 2.871 FLWO r 2.226 2.254 2.266 2.273 FLWO i 1.524 1.631 1.680 1.708 2MASS J 0.778 0.722 0.696 0.681 2MASS H 0.517 0.457 0.430 0.414 2MASS K_s 0.344 0.308 0.292 0.282 UKIRT Z 1.226 1.282 1.308 1.323 UKIRT Y 0.989 0.978 0.973 0.970 UKIRT J 0.765 0.707 0.680 0.664 UKIRT H 0.524 0.464 0.437 0.421 UKIRT K 0.335 0.301 0.285 0.276 VISTA Z 1.247 1.307 1.335 1.352 VISTA Y 1.003 0.996 0.993 0.991 VISTA J 0.763 0.705 0.678 0.662 VISTA H 0.520 0.461 0.433 0.417 VISTA K_s 0.351 0.314 0.298 0.288 WISE W1 0.180 0.176 0.174 0.173 WISE W2 0.112 0.120 0.123 0.125 WISE W3 0.034 0.046 0.052 0.055 WISE W4 0.014 0.022 0.026 0.028 § SED DATA We compiled the multiwavelength photometric data in both states (summarized in Table <ref>). Since we simultanously fit the X-ray to MIR SED, we chose the photometric data closest in time to the X-ray epochs (indicated by the “Epoch" columns in Table <ref>). cccclcc Photometric Data for CLQ SED 1pt Name Epoch Survey/Telescope Band MJD mag uncertainty J0206 1 PS1 g 56631.333 20.125 0.040 J0206 1 PS1 r 56988.307 20.209 0.062 J0206 1 PS1 i 56916.486 19.685 0.038 J0206 1 PS1 z 56644.232 19.047 0.039 J0206 1 PS1 y 56517.627 18.521 0.037 J0206 1 WISE W1 56860.281 14.762 0.019 J0206 1 WISE W2 56860.281 14.046 0.041 J0206 1 WISE W3 55312.068 11.487 0.134 J0206 1 WISE W4 55312.068 8.877 0.775 J0206 2 FLWO g 58481.133 20.816 0.100 J0206 2 FLWO r 58465.266 19.815 0.046 J0206 2 WISE W1 58480.006 15.748 0.051 J0206 2 WISE W2 58480.006 14.855 0.092 J0224 1 PS1 g 55854.412 18.906 0.019 J0224 1 PS1 r 55854.462 18.655 0.015 J0224 1 PS1 i 56209.550 18.489 0.013 J0224 1 PS1 z 55583.258 18.118 0.017 J0224 1 PS1 y 55584.260 18.035 0.050 J0224 1 VHS J 56298.146 16.793 0.009 J0224 1 VHS K_s 56298.136 15.108 0.011 J0224 1 WISE W1 55213.406 13.599 0.009 J0224 1 WISE W2 55213.406 12.771 0.014 J0224 1 WISE W3 55318.732 10.551 0.052 J0224 1 WISE W4 55322.150 7.589 0.220 J0224 2 ZTF g 59138.359 20.058 0.025 J0224 2 ZTF r 59158.345 18.976 0.009 J0224 2 WISE W1 59054.290 14.244 0.013 J0224 2 WISE W2 59054.290 13.546 0.030 J0829 1 PTF r 56724.155 20.166 0.119 J0829 1 UHS J 56066-57784 18.356 0.073 J0829 1 WISE W1 56764.247 15.347 0.114 J0829 1 WISE W2 56764.247 14.168 0.153 J0829 1 WISE W3 55299.743 11.789 0.228 J0829 1 WISE W4 55299.743 9.536 0.929 J0829 2 ZTF g 58891.198 21.285 0.036 J0829 2 ZTF r 58891.290 20.826 0.025 J0829 2 ZTF i 58257.172 19.485 0.108 J0829 2 WISE W1 58778.937 16.046 0.058 J0829 2 WISE W2 58778.937 15.322 0.138 J1226 1 SDSS u 51923 18.936 0.042 J1226 1 SDSS g 51923 18.699 0.021 J1226 1 SDSS r 51923 19.262 0.036 J1226 1 SDSS i 51923 18.822 0.027 J1226 1 SDSS z 51923 19.078 0.094 J1226 1 UKIDSS Y 54398 18.387 0.047 J1226 1 UKIDSS J 54398 17.772 0.054 J1226 1 UKIDSS H 54398 17.135 0.043 J1226 1 UKIDSS K_s 54398 16.148 0.034 J1226 1 WISE W1 55370.140 14.304 0.013 J1226 1 WISE W2 55370.140 13.302 0.020 J1226 1 WISE W3 55370.743 10.519 0.073 J1226 1 WISE W4 55370.743 8.221 0.565 J1226 2 ZTF g 58607.299 20.751 0.061 J1226 2 ZTF r 58583.255 20.674 0.052 J1226 2 ZTF i 58261.189 19.846 0.097 J1226 2 WISE W1 58638.071 15.005 0.024 J1226 2 WISE W2 58638.071 14.315 0.058 J1338 1 SDSS u 52053 19.884 0.041 J1338 1 SDSS g 52053 19.437 0.025 J1338 1 SDSS r 52053 19.032 0.020 J1338 1 SDSS i 52053 18.734 0.018 J1338 1 SDSS z 52053 18.433 0.036 J1338 1 UKIDSS Y 54989 17.700 0.026 J1338 1 UKIDSS J 54989 17.154 0.029 J1338 1 UKIDSS H 54989 16.437 0.017 J1338 1 UKIDSS K_s 54989 15.515 0.014 J1338 1 WISE W1 55211.722 13.818 0.010 J1338 1 WISE W2 55211.722 13.170 0.020 J1338 1 WISE W3 55315.574 10.741 0.069 J1338 1 WISE W4 55387.109 7.400 0.354 J1338 2 FLWO g 57887.197 19.578 0.032 J1338 2 FLWO r 57887.201 19.008 0.026 J1338 2 WISE W1 57765.450 15.033 0.029 J1338 2 WISE W2 57765.450 14.244 0.060 We use photometry in optical, near-infrared, and mid-infrared that is closest to the X-ray observation epochs. We use PSF (AB) magnitudes in the optical, 2 arcsec diameter aperture (Vega) magnitudes in the near-infrared. The WISE data is in Vega magnitude.
http://arxiv.org/abs/2303.09280v2
20230313124432
Topology optimization with physics-informed neural networks: application to noninvasive detection of hidden geometries
[ "Saviz Mowlavi", "Ken Kamrin" ]
cs.CE
[ "cs.CE", "cs.AI", "cs.LG" ]
APS/123-QED mowlavi@merl.com Department of Mechanical Engineering, MIT, Cambridge, MA 02139, USA Mitsubishi Electric Research Laboratories, Cambridge, MA 02139, USA kkamrin@mit.edu Department of Mechanical Engineering, MIT, Cambridge, MA 02139, USA Detecting hidden geometrical structures from surface measurements under electromagnetic, acoustic, or mechanical loading is the goal of noninvasive imaging techniques in medical and industrial applications. Solving the inverse problem can be challenging due to the unknown topology and geometry, the sparsity of the data, and the complexity of the physical laws. Physics-informed neural networks (PINNs) have shown promise as a simple-yet-powerful tool for problem inversion, but they have yet to be applied to general problems with a priori unknown topology. Here, we introduce a topology optimization framework based on PINNs that solves geometry detection problems without prior knowledge of the number or types of shapes. We allow for arbitrary solution topology by representing the geometry using a material density field that approaches binary values thanks to a novel eikonal regularization. We validate our framework by detecting the number, locations, and shapes of hidden voids and inclusions in linear and nonlinear elastic bodies using measurements of outer surface displacement from a single mechanical loading experiment. Our methodology opens a pathway for PINNs to solve various engineering problems targeting geometry optimization. Topology optimization with physics-informed neural networks: application to noninvasive detection of hidden geometries Ken Kamrin March 30, 2023 ======================================================================================================================== Noninvasive detection of hidden geometries is desirable in countless applications including medical imaging and diagnosis <cit.>, nondestructive evaluation of materials <cit.>, and mine detection <cit.>. The goal is to infer the locations, and shapes of structures hidden inside a matrix from surface measurements of the response to an applied load such as a magnetic field <cit.>, an electric current <cit.>, or a mechanical traction <cit.>. Identifying these internal boundaries from the measured data constitutes a challenging inverse problem due to the unknown topology, the large number of parameters required to describe arbitrary geometries <cit.>, the potential sparsity of the data, and the complexity of the underlying physical laws which usually take the form of linear or nonlinear partial differential equations (PDEs) <cit.>. In recent years, physics-informed neural networks (PINNs) have emerged as a robust tool for problem inversion across disciplines and over a range of model complexity <cit.>. PINNs' ability to seamlessly blend measurement data or design objectives with governing PDEs in nontrivial geometries has enabled practitioners to solve easily a range of inverse problems involving identification or design of unknown properties in fields ranging from mechanics to optics and medicine <cit.>. Encouraged by these early successes, we introduce in this paper a general topology optimization (TO) framework to solve noninvasive geometry detection problems using PINNs, leveraging both the measurements and the governing PDEs. Building on the strength of PINNs, our approach is straightforward to implement regardless of the complexity of the physical model, produces accurate results using measurement data from a single experiment, and does not require a training dataset. To the best of our knowledge, the present work marks the first time that PINNs have been applied to problems involving a priori unknown topology and geometry. Classical approaches to solve geometry identification inverse problems tend to be complex as they combine traditional numerical solvers such as the finite-element or boundary-element method, adjoint techniques to evaluate the sensitivity of the error residual with respect to the shape or the topology, and gradient descent-based optimization algorithms to update the geometry at every iteration <cit.>. Furthermore, these techniques call for carefully chosen regularization schemes and do not always yield satisfactory results, especially in the presence of sparse measurements acquired by only one or a few sets of experiments. For example, in the mechanical loading case where voids and inclusions in an elastic body are to be identified from measurements of surface displacement in response to a prescribed traction, past studies limit themselves to simple shapes like squares and circles or fail to find the right number of shapes <cit.>. Attempts to apply PINNs to geometry detection are in their infancy, so far restricted to cases where the number and shape-type of hidden voids or inclusions in an elastic structure are provided in advance <cit.>. Our PINN-based TO framework does not require any prior knowledge on the number and types of shapes. We allow for arbitrary solution topology by representing the geometry using a material density field equal to 0 in one phase and 1 in the other. The material density is parameterized through a neural network, which needs to be regularized in order to push the material density towards 0 or 1 values. Thus, one key ingredient in our framework is a novel eikonal regularization, inspired from fast-marching level-set methods <cit.> and neural signed distance functions <cit.>, that promotes a constant thickness of the interface region where the material density transitions between 0 and 1, leading to well-defined boundaries throughout the domain. This eikonal regularization enters as an additional term in the standard PINN loss, which is then used to train the neural networks underlying the material density and physical quantities to yield a solution to the geometry detection problem. As an illustration, we apply our framework to cases involving an elastic body under mechanical loading, and discover the topology, locations, and shapes of hidden structures for a variety of geometries and materials. § RESULTS §.§ Problem formulation We consider noninvasive geometry detection problems of the following form. Suppose we have a continuous body ℬ containing an unknown number of hidden voids or inclusions, with unknown shapes and at unknown locations within the body. The material properties are assumed to be known and homogeneous within the body and the inclusions. We then apply a certain type of loading (e.g. mechanical, thermal, acoustic, etc) on the body's external boundary ∂ℬ^ext, which produces a response within the body that can be described by a set of n physical quantities (e.g. displacements, stresses, temperature, etc). These physical quantities can be lumped into a vector field ψ : ℬ→ℝ^n and satisfy a known set of governing PDEs. The goal of the inverse problem is to identify the number, locations, and shapes of the voids or inclusions based on measurements along ∂ℬ^ext of some of the physical quantities contained in ψ. As a concrete example, we consider two prototypical plane-strain elasticity inverse problems. In the first case, a square elastic matrix with hidden voids or inclusions is pulled by a uniform traction P_o on two sides (Fig. <ref>a). The goal of the inverse problem is to identify the number, locations, and shapes of the voids or inclusions using discrete measurements of the displacement of the outer boundary of the matrix. In the second case, an elastic layer on top of a hidden rigid substrate is compressed from the top by a uniform pressure P_o, with periodic lateral boundary conditions (Fig. <ref>b). The goal is to identify the shape of the substrate using discrete measurements of the displacement of the top surface. For both cases, the constitutive properties of all materials are assumed to be known. We will consider two different types of constitutive laws: compressible linear elasticity, which characterizes the small deformation of any compressible elastic material, and incompressible nonlinear hyperelasticity, which models the large deformation of rubber-like materials. In the linear elastic case, there exists a unique solution to the inverse problem (see proof in Supplementary Information), making it well-suited to evaluating the accuracy of our TO framework. Following density-based TO methods <cit.>, we avoid any restriction on the number and shapes of hidden structures by parameterizing the geometry of the elastic body ℬ through a discrete-valued material density function ρ : Ω→{0,1}, where Ω is a global domain comprising both ℬ and the hidden voids or inclusions. The material density is defined to be equal to 1 in the elastic body ℬ and 0 in the voids or inclusions. The physical quantities ψ can then be extended to the global domain Ω by introducing an explicit ρ-dependence in their governing PDEs, leading to equations of the form 𝐫(ψ(𝐱),ρ(𝐱)) = 0, 𝐱∈Ω, 𝐛(ψ(𝐱)) = 0, 𝐱∈∂Ω, with known boundary conditions defined solely on the external boundary ∂Ω = ∂ℬ^ext. Note that the residual functions 𝐫 and 𝐛 may contain partial derivatives of ψ and ρ. The inverse problem is now to find the distribution of material density ρ in Ω so that the corresponding solution for ψ matches surface measurements ψ_i^m at discrete locations 𝐱_i ∈∂Ω^m ⊂∂Ω, that is, ψ(𝐱_i) = ψ_i^m, 𝐱_i ∈∂Ω^m. In practice, we might only measure select quantities in ψ at some of the locations, but we do not write so explicitly to avoid overloading the notation. For the linear elasticity problem that we consider as an example, ψ = (𝐮,σ) where 𝐮(𝐱) and σ(𝐱) are displacement and stress fields, respectively, and the governing equations comprise equilibrium relations ∑_j∂σ_ij/∂ x_j = 0 and a constitutive law F(σ, ∇𝐮, ρ) = 0, both defined over Ω. The presence of ρ in the constitutive law specifies different material behaviors for the elastic solid phase and the void or rigid inclusion phase. The applied boundary conditions take the form 𝐮 = 𝐮̅ on ∂Ω_u and σ𝐧 = 𝐭̅ on ∂Ω_t, where ∂Ω_u and ∂Ω_t are partitions of the external boundary with applied displacements and applied tractions, respectively, and 𝐧 is the outward unit normal. In the case of the elastic layer, the outer boundary also comprises a portion ∂Ω_p with periodic boundary conditions on the displacement and traction. Finally, the requirement that the predictions for 𝐮 at the surface match the measurement data is expressed as 𝐮(𝐱_i) = 𝐮_i^m, 𝐱_i ∈∂Ω^m. See Methods for a detailed formulation of the governing equations and boundary conditions for all considered cases. Similar to density-based TO methods <cit.>, we relax the binary constraint on the material density by allowing intermediate values of ρ between 0 and 1. This renders the problem amenable to gradient-based optimization, which underpins the PINN-based TO framework that we introduce in the next section. However, the challenge is to find an appropriate regularization mechanism that drives the optimized material distribution towards 0 and 1 rather than intermediate values devoid of physical meaning. As we will show in the discussion, common strategies employed in TO <cit.> do not yield satisfactory results in our PINN-based framework for geometry detection problems. Thus, we have developed a novel eikonal regularization scheme inspired from level-set methods and signed distance functions, which we will describe after presenting the general framework. §.§ General framework We propose a TO framework based on PINNs for solving noninvasive geometry detection problems (Fig. <ref>). At the core of the framework are several deep neural networks that approximate the physical quantities ψ(𝐱) describing the problem and the material density ρ(𝐱). For the physical quantities, each neural network maps the spatial location 𝐱 = (x_1,x_2) to one of the variables in ψ = (ψ_1, ⋯, ψ_n); this can be expressed as ψ_i = ψ̅_i(𝐱; θ_i) where ψ̅_i is the map defined by the ith neural network and its trainable parameters θ_i (see Methods). For the material distribution, we first define a neural network with trainable parameters θ_ϕ that maps 𝐱 to a scalar variable ϕ = ϕ̅(𝐱; θ_ϕ). A sigmoid function is then applied to ϕ to yield ρ = sigmoid(ϕ/δ) = sigmoid(ϕ̅(𝐱; θ_ϕ)/δ), which we simply write as ρ = ρ̅(𝐱,θ_ϕ). This construction ensures that the material density ρ remains between 0 and 1, and δ is a transition length scale that we will comment on later. We define the phase transition to occur at ρ = 0.5 so that the zero level-set of ϕ delineates the boundary between the two material phases, hence ϕ is hereafter referred to as a level-set function <cit.>. We now seek the parameters θ_ψ = {θ_1, …, θ_n} and θ_ϕ so that the neural network approximations for ψ(𝐱) and ρ(𝐱) satisfy the governing equations (<ref>) and applied boundary conditions (<ref>) while matching the surface measurements (<ref>). This is achieved by constructing a loss function of the form ℒ(θ_ψ, θ_ϕ) = λ_measℒ_meas(θ_ψ) + λ_govℒ_gov(θ_ψ, θ_ϕ) + λ_regℒ_eik(θ_ϕ), where ℒ_meas and ℒ_gov measure the degree to which the neural network approximations do not satisfy the measurements and governing equations, respectively, ℒ_eik is a crucial regularization term that drives ρ towards 0 or 1 values and that we will explain below, and the λ's are scalar weights. The measurement loss takes the form ℒ_meas(θ_ψ) = 1/|∂Ω^m|∑_𝐱_i ∈∂Ω^m |ψ̅(𝐱_i;θ_ψ)-ψ_i^m|^2, where |∂Ω^m| denotes the size of the set ∂Ω^m. A trivial modification of this expression is necessary in the case where only select quantities in ψ are measured. The governing equations loss takes the form ℒ_gov(θ_ψ, θ_ϕ) = 1/|Ω^d|∑_𝐱_i ∈Ω^d |𝐫(ψ̅(𝐱_i;θ_ψ),ρ̅(𝐱_i;θ_ϕ))|^2, where Ω^d is a set of collocation points in Ω, and we use automatic differentiation to calculate in a mesh-free fashion the spatial derivatives contained in 𝐫. We design the architecture of our neural networks in such a way that they inherently satisfy the boundary conditions (see Methods, section “Detailed PINNs formulation”). Finally, the optimal parameters θ_ψ^* and θ_ϕ^* that solve the problem can be obtained by training the neural networks to minimize the loss (<ref>) using stochastic gradient descent-based optimization. The corresponding physical quantities ψ̅(𝐱;θ_ψ^*) will match the discrete surface measurements while satisfying the governing equations of the problem, while the corresponding material density ρ̅(𝐱;θ_ϕ^*) will reveal the number, locations, and shapes of the hidden voids or inclusions. §.§ Material density regularization We now describe the key ingredient that ensures the success of our framework. As mentioned above, the main challenge is to promote the material density ρ(𝐱) to converge towards 0 or 1 away from the material phase boundaries, given by the zero level-set ϕ = 0. Moreover, we desire the thickness of the transition region along these boundaries, where ρ goes from 0 to 1, to be uniform everywhere in order to ensure consistency of physical laws across the interface (e.g. stress jumps). To visualize what happens in the absence of regularization, consider a random instance of the neural network ϕ = ϕ̅(𝐱,θ_ϕ) (Fig. <ref>a, left) and the corresponding material distribution ρ = sigmoid(ϕ/δ) with δ = 0.01 (Fig. <ref>a, center). The sigmoid transformation ensures that ρ never drops below 0 or exceeds 1, leading to large regions corresponding to one phase or the other. However, the thickness of the transition region where ρ goes from 0 to 1 is not everywhere uniform, resulting in large zones where ρ assumes nonphysical values between 0 and 1 (Fig. <ref>a, center). This behavior stems from the non-uniformity of the gradient norm |∇ϕ| along the material boundaries ϕ = 0, with small and large values of |∇ϕ| leading to wide and narrow transition regions, respectively (Fig. <ref>a, right). We propose to regularize the material density by forcing the gradient norm |∇ϕ| to be unity in a narrow band Ω_eik of width w along the material boundaries defined by the zero level-set ϕ = 0. In this way, ϕ becomes a signed distance function to the material boundary in the narrow band, thereby constraining the gradient of ρ to be constant along the interface. To ensure that the narrow band covers the near-entirety of the transition region where ρ goes from 0 to 1, we choose w = 10 δ so that ρ = sigmoid(± w/2δ) = sigmoid(± 5) ≃ 0 or 1 along the edge of the narrow band. To illustrate the effect of such regularization, we consider the previous random instance of the neural network ϕ = ϕ̅(𝐱,θ_ϕ) and enforce the constraint |∇ϕ| = 1 in the narrow band Ω_eik along its zero level-set (Fig. <ref>b, left and right). The zero level-set is kept fixed to facilitate comparison with the unregularized case (Fig. <ref>a). With ϕ now behaving like a signed-distance function in the narrow band, a uniform transition thickness for ρ along all material boundaries is achieved, without large regions of intermediate density values (Fig. <ref>b, center). In practice, we implement this regularization into our PINN-based TO framework by including an `eikonal' loss term ℒ_eik in (<ref>), which takes the form ℒ_eik(θ_ϕ) = 1/|Ω_eik^d|∑_𝐱_i ∈Ω_eik^d(| ∇ϕ (𝐱_i)| - 1 )^2, where Ω_eik^d = {𝐱_i ∈Ω^d : |ϕ(𝐱_i)| < w/2}. The aim of this term is to penalize deviations away from the constraint |∇ϕ| = 1 in the narrow band Ω_eik of width w along the interface defined by the zero level-set ϕ = 0. Because finding the subset of collocation points 𝐱_i in Ω^d belonging to the true narrow band of width w at every step of the training process would be too expensive, we instead relax the domain over which the constraint |∇ϕ| = 1 is active by utilizing the subset Ω_eik^d of collocation points that satisfy |ϕ(𝐱_i)| < w/2. As the constraint |∇ϕ| = 1 is progressively better satisfied during the training process, Ω_eik^d will eventually overlap the true narrow band of width w along the zero level-set of ϕ (Fig. <ref>c). Since the constraint |∇ϕ| = 1 in the narrow band takes the form of an eikonal equation, we call this approach eikonal regularization. We emphasize that in contrast to recent works training neural networks to solve the eikonal equation <cit.>, our eikonal regularization does not force ϕ to vanish on a predefined boundary. Rather, the zero level-set of ϕ evolves freely during the training process in such a way that the corresponding material distribution ρ = sigmoid(ϕ/δ) and physical quantities ψ minimize the total loss (<ref>), eventually revealing the material boundaries delineating the hidden voids or inclusions. §.§ Setup of numerical experiments We evaluate our TO framework on a range of challenging test cases involving different numbers and shapes of hidden structures and various materials (Methods, Tabs. <ref> and <ref>). As a substitute for real experiments, we use the finite-element method (FEM) software Abaqus to compute the deformed shape of the boundary of the elastic structure and generate the measurement data for each case (Methods, section “FEM simulations”). Using this measurement data, we run our TO framework to discover the number, locations, and shapes of the hidden voids or rigid inclusions (for implementation and training details, see Methods, section “Architecture and training details”). We then compare the obtained results with the ground truth — the voids or inclusions originally fed into Abaqus — to assess the efficacy of our framework. §.§ Elastic matrix experiments We first apply our framework to cases involving a linear elastic matrix (Fig. <ref>a) containing voids (cases 1, 3, 8, 10, 15, 17 in Methods, Tab. <ref>). As the various loss components are minimized during training (Fig. <ref>a), the material density ρ evolves and splits in a way that progressively reveals the number, locations, and shapes of the hidden voids (Extended Data Fig. <ref> and https://www.dropbox.com/s/tm26buzgn0w35s1/Movie1.mp4?dl=0Supplementary Movie 1), without advance knowledge of their topology. By the end of the training, the transition regions where the material density goes from 0 to 1 have uniform thickness along all internal boundaries (Fig. <ref>d), thanks to the eikonal regularization that encourages the level-set gradient ∇ϕ to have unit norm in a band along the material boundaries ϕ = 0 (Fig. <ref>b,c). The agreement between the final inferred shapes and the ground truth is remarkable, with our framework able to recover intricate details such as the three lobes and the concave surfaces of the star-shaped void (Fig. <ref>d, second from left), or the exact aspect ratio and location of a thin slit (Fig. <ref>d, third from left). The stress and strain fields of the deformed matrix are also obtained as a byproduct of the solution process (Extended Data Fig. <ref>). The only case that is not completely identified is the U-shaped void (Fig. <ref>d, first from right), a result of the miniscule influence of the inner lobe on the outer surface displacements due to its low level of strain and stress (Extended Data Fig. <ref>). Finally, our framework maintains accurate results when reducing the number of surface measurement points or restricting measurements to a few surfaces (Extended Data Figs. <ref>-<ref>). Next, we consider cases involving linear elastic and rigid inclusions in the linear elastic matrix (cases 4, 5, 6, 11, 12, 13 in Methods, Tab. <ref>). Our framework successfully identifies the inclusions in almost all cases (Fig. <ref>e). Inferred displacements and stresses of the deformed matrix (Extended Data Fig. <ref>) confirm the intuition that voids or soft inclusions soften the matrix while stiff or rigid inclusions harden the matrix. The U-shaped soft and stiff elastic inclusions (Fig. <ref>e, second and third from right) are better detected by the framework than their void or rigid counterparts (Fig. <ref>d, first from right and Fig. <ref>e, first from right), since an elastic inclusion induces some strain and stress on the inner lobe (Extended Data Fig. <ref>). Finally, we consider cases involving a soft, incompressible Neo-Hookean hyperelastic matrix with the same void shapes considered previously (cases 2, 7, 9, 14, 16, 18 in Methods, Tab. <ref>). The geometries are identified equally well (Fig. <ref>f) in this large deformation regime (Extended Data Fig. <ref>) as with linear elastic materials, which illustrates the ability of the framework to cope with nonlinear governing equations without any added complexity in the formulation or the implementation. §.§ Elastic layer experiments We finally apply our framework to the periodic elastic layer (Fig. <ref>b), where a linear elastic material covers a hidden rigid substrate (cases 20, 21, 22 in Methods, Tab. <ref>). Contrary to the matrix problem, this setup only provides access to measurements on the top surface, and the hidden geometry to be discovered is not completely surrounded by the elastic material. Our TO framework is nevertheless able to detect the correct depths and shapes of the hidden substrates (Fig. <ref>). This example demonstrates the versatility of the framework in adapting to various problem setups. § DISCUSSION As with any TO method relying on a material density field to parameterize the geometry, the success of our PINN-based framework hinges on the presence of an appropriate regularization mechanism to penalize intermediate density values. Although we have shown that our novel eikonal regularization leads to consistently accurate results, other regularization approaches have been employed in classical adjoint-based TO methods <cit.>. These include the total variation dimishing (TVD) regularization <cit.> that penalizes the L_1 norm of the density gradient ∇ρ, the explicit penalization regularization <cit.> that penalizes the integral over the domain of ρ (1-ρ), and the Solid Isotropic Material with Penalization (SIMP) approach <cit.> that relates material properties such as the shear modulus and the material density through a power-law with exponent p. The latter is the most popular regularization mechanism in structural optimization <cit.>. However, when implemented in our PINN-based framework for the detection of hidden geometries, these methods yield inferior results to the eikonal regularization (Fig. <ref>). Indeed, we compare all four approaches on a challenging test case involving a linear elastic rectangular matrix pulled from the top and bottom and containing soft inclusions in the shape of the letters M, I, and T (case 19, Tab. <ref>). The measurements consist of the displacement along the outer boundary, similar to the previous square matrix examples. We consider different values of the regularization weight λ_reg (for the eikonal, TVD and explicit penalization regularizations) and the exponent p (for the SIMP regularization), and solve the inverse problem using four random initializations of the neural networks in each case. Not only was the eikonal regularization the only one to find the right shapes, it did so over three orders of magnitude of λ_reg, demonstrating a desirable robustness with respect to λ_reg (Fig. <ref>). Thanks to the flexibility of the PINN framework, adapting our approach to various scenarios involving partial information, three-dimensional geometries, or other types of noninvasive imaging experiments (e.g. using thermal <cit.>, acoustic <cit.>, electric <cit.>, or magnetic <cit.> loading) should be straightforward. As an illustration, we identify a hidden inclusion in a nonlinearly conducting matrix using partially unknown thermal loading (Supplementary Information), mimicking an inaccessible surface. This experiment reveals our method's ability to generate good results without further modifications even when the forward problem is ill-posed, which would require including the unknown boundary condition as an additional optimization variable in a classical adjoint-based approach. In conclusion, we have presented a PINN-based TO framework with a novel eikonal regularization, which we have applied to the noninvasive detection of hidden inclusions. By representing the geometry through a material density field combined with a novel eikonal regularization, our framework is able to discover the number, shapes and locations of hidden structures, without any prior knowledge required regarding the number or the types of shapes to expect. Finally, the idea of parameterizing geometries of arbitrary topologies with a material density field regularized with the eikonal constraint opens a pathway for PINNs to be applied to a wide range of design optimization problems constrained by physical governing equations. These include, for instance, the design of lenses that achieve targeted optical properties <cit.> or the design of structures and metamaterials that exhibit desirable mechanical, acoustic, or thermal properties <cit.>. § METHODS §.§ Governing equations The two plane-strain elasticity inverse problems considered in this study (Fig. <ref>) are defined in a two-dimensional domain Ω⊂ℝ^2 formed by the union of the elastic body ℬ and the voids or inclusions. Denoting with 𝐱 = (x_1,x_2) ∈Ω the planar spatial coordinates, the hidden geometrical layout of voids or inclusions is characterized by a material density ρ(𝐱) equal to 1 in the body ℬ and 0 in the voids or inclusions. §.§.§ Small-deformation linear elasticity We first consider the case where the elastic body and inclusions consist of linear elastic materials, with Young's modulus E and Poisson's ratio ν for the body, and Young's modulus E̅ and Poisson's ratio ν̅ for the inclusions. Voids and rigid inclusions correspond to the limits E̅→ 0 and E̅→∞, respectively. The deformation of the elastic body containing the inclusions is described by a vector field ψ(𝐱) = (𝐮(𝐱), σ(𝐱)), where 𝐮(𝐱) is a planar displacement field with components u_i(𝐱) and σ(𝐱) is a Cauchy stress tensor with components σ_ij(𝐱). Indices i and j will hereafter always range from 1 to 2. The governing PDEs comprise the equilibrium equations ∑_j∂σ_ij/∂ x_j = 0, 𝐱∈Ω, as well as a linear elastic constitutive law F(σ, ∇𝐮, ρ) = 0 that we will express in two different but equivalent ways, depending on whether the inclusions are softer or stiffer than the matrix. For voids and soft inclusions, we consider the constitutive law in stress-strain form, σ = ρ[ λ tr (ϵ) 𝐈 + 2 μ ϵ], (1 - ρ) [ λ̅ tr (ϵ) 𝐈 + 2 μ̅ ϵ], 𝐱∈Ω, where ϵ = (∇𝐮 + ∇𝐮^T)/2 is the infinitesimal strain tensor, tr(ϵ) denotes its trace, λ = E ν/(1+ν)(1-2ν) and μ = E/2(1+ν) are the Lamé constants of the body, and λ̅ = E̅ν̅/(1+ν̅)(1-2ν̅) and μ̅ = E̅/2(1+ν̅) are the Lamé constants of the inclusions. Notice that the case of voids, the stress vanishes in the ρ = 0 regions. For stiff and rigid inclusions, we consider the constitutive law in the inverted strain-stress form ϵ = ρ[ 1+ν/Eσ - ν(1+ν)/E tr (σ) 𝐈] (1-ρ) [ 1+ν̅/E̅σ - ν̅(1+ν̅)/E̅ tr (σ) 𝐈], 𝐱∈Ω, where tr(σ) is the trace of the stress tensor. This relation differs from the three-dimensional one due to the plane strain assumption. Notice that the case of rigid inclusions, the strain vanishes in the ρ = 0 regions. The boundary conditions on ∂Ω and surface displacement measurement locations ∂Ω^m are different in the two problems. For the elastic matrix (Fig. <ref>a), the domain is Ω = [-0.5,0.5] × [-0.5,0.5] and the boundary conditions are σ(𝐱) 𝐧(𝐱) = -P_o 𝐞_1, 𝐱 ∈{-0.5,0.5} ×[-0.5,0.5], σ(𝐱) 𝐧(𝐱) = 0, 𝐱 ∈[-0.5,0.5] ×{-0.5,0.5}. The measurement locations ∂Ω^m are distributed along the entire external boundary ∂Ω. In the case of the M, I, T inclusions (case 19, Tab. <ref>), the boundary conditions (<ref>) are changed to account for the fact that the matrix is pulled from the top and bottom boundaries and covers the domain Ω = [-1,1] × [-0.5,0.5]. For the elastic layer (Fig. <ref>b), the domain is Ω = [0,1] × [-0.5,0] and the boundary conditions are σ(𝐱) 𝐧(𝐱) = -P_o 𝐞_2, 𝐱 ∈[0,1] ×{0}, 𝐮 = 0, 𝐱 ∈[0,1] ×{-0.5}, as well as periodic for the displacement and traction on 𝐱∈{0,1}× [-0.5,0]. The measurement locations ∂Ω^m are distributed along the top surface ∂Ω_t = [0,1] ×{0}. The geometry identification problem that we solve can then be stated as follows. Given surface displacement measurements 𝐮_i^m at locations 𝐱_i ∈∂Ω^m, find the distribution of material density ρ in Ω such that the difference between the predicted and measured surface displacements vanish, that is, 𝐮(𝐱_i) = 𝐮_i^m, 𝐱_i ∈∂Ω^m. The predicted displacement field must satisfy the equilibrium equation (<ref>), the constitutive relation (<ref>) or (<ref>), and the boundary conditions (<ref>) or (<ref>). §.§.§ Large-deformation nonlinear hyperelasticity Next, we consider the case where the elastic body consists of an incompressible Neo-Hookean hyperelastic material with shear modulus μ. We now have to distinguish between the reference (undeformed) and current (deformed) configurations. We denote by 𝐱 = (x_1,x_2) ∈Ω and 𝐲 = (y_1,y_2) ∈Ω^* the coordinates in the reference and deformed configurations, respectively, with Ω^* the deformed image of Ω. The displacement field 𝐮(𝐱) with components u_i(𝐱) moves an initial position 𝐱∈Ω into its current location 𝐲 = 𝐱 + 𝐮(𝐱) ∈Ω^*. In order to formulate the governing equations and boundary conditions in the reference configuration Ω, we need to introduce the first Piola-Kirchhoff stress tensor 𝐒(𝐱) with components S_ij(𝐱). Unlike the Cauchy stress tensor, the first Piola-Kirchhoff stress tensor is defined in Ω and is not symmetric. The deformation of the elastic body is then described by the vector field ψ(𝐱) = (𝐮(𝐱), 𝐒(𝐱),p(𝐱)) defined over Ω, where p(𝐱) is a pressure field that serves to enforce the incompressibility constraint. The equilibrium equations are ∑_j∂ S_ij/∂ x_j = 0, 𝐱∈Ω, where the derivatives in ∇_𝐱 are taken with respect to the reference coordinates 𝐱. We only consider the presence of voids so that the nonlinear constitutive law F(𝐒, ∇_𝐱𝐮, p, ρ) = 0 is simply expressed as 𝐒 = ρ[ -p 𝐅^-T + μ𝐅], 𝐱∈Ω, where 𝐅(𝐱) = 𝐈 + ∇_𝐱𝐮(𝐱) is the deformation gradient tensor. Notice that the stress vanishes in the ρ = 0 regions. Finally, we have the incompressibility constraint ρ[ (𝐅) - 1 ] = 0, 𝐱∈Ω, which turns itself off in the ρ = 0 regions since voids do not deform in a way that preserves volume. We only treat the matrix problem (Fig. <ref>a) in this hyperelastic case. The domain is Ω = [-0.5,0.5] × [-0.5,0.5] and the boundary conditions are 𝐒(𝐱) 𝐧_0(𝐱) = -P_o 𝐞_1, 𝐱 ∈{-0.5,0.5} ×[-0.5,0.5], 𝐒(𝐱) 𝐧_0(𝐱) = 0, 𝐱 ∈[-0.5,0.5] ×{-0.5,0.5}. As in the linear elastic case, the measurement locations ∂Ω^m are distributed along the entire external boundary ∂Ω. The geometry identification problem can then be stated identically as in the linear elastic case. This time, the predicted displacement field must satisfy the equilibrium equation (<ref>), the constitutive relation (<ref>), the incompressibility condition (<ref>), and the boundary conditions (<ref>). §.§.§ Rescaling The various physical quantities involved in the elasticity inverse problem span a wide range of scales; for instance, displacements may be orders of magnitude smaller than the length scale associated with the geometry. Thus, we rescale all physical quantities into nondimensional values of order one, as also done in <cit.>. Lengths are rescaled with the width L of the elastic matrix or elastic layer, tractions and stresses with the magnitude P_o of the applied traction at the boundaries, and displacements with the ratio L P_o / E, where E is the Young's modulus of the elastic material (in the hyperelastic case, we use the equivalent Young's modulus E = 3 μ, where μ is the shear modulus of the hyperelastic material). This rescaling is critical to enable the neural networks underlying our framework to handle elasticity problems across a wide range of material moduli and applied loads. §.§ Solution methodology Here, we describe in detail the application of our TO framework to the solution of the two plane-strain elasticity inverse problems formulated in the introduction. We will treat separately the small-deformation linear elasticity case and the large-deformation hyperelasticity case. §.§.§ Small-deformation linear elasticity Since the problem is described by the physical quantities ψ = (u_1,u_2,σ_11,σ_22,σ_12), we introduce the neural network approximations u_1(𝐱) = u̅_1(𝐱; θ_1), u_2(𝐱) = u̅_2(𝐱; θ_2), σ_11(𝐱) = σ̅_11(𝐱; θ_3), σ_22(𝐱) = σ̅_22(𝐱; θ_4), σ_12(𝐱) = σ̅_12(𝐱; θ_5), ϕ(𝐱) = ϕ̅(𝐱; θ_ϕ). The last equation represents the level-set neural network, which defines the material density as ρ(𝐱) = ρ̅(𝐱;θ_ϕ) = sigmoid(ϕ̅(𝐱;θ_ϕ)/δ). We then formulate the loss function (<ref>) by specializing the loss term expressions presented in results section to the linear elasticity problem. Omitting the θ's for notational simplicity, we obtain ℒ_meas(θ_ψ) = 1/|∂Ω^m|∑_𝐱_i ∈∂Ω^m |𝐮̅(𝐱_i) - 𝐮_i^m|^2, ℒ_gov(θ_ψ, θ_ϕ) = 1/|Ω^d|∑_𝐱_i ∈Ω^d |𝐫_eq(σ̅(𝐱_i))|^2 + 1/|Ω^d|∑_𝐱_i ∈Ω^d |𝐫_cr(𝐮̅(𝐱_i),σ̅(𝐱_i),ρ̅(𝐱_i))|^2, ℒ_eik(θ_ϕ) = 1/|Ω_eik^d|∑_𝐱_i ∈Ω_eik^d(| ∇ϕ̅ (𝐱_i)| - 1 )^2, where 𝐮̅ = (u̅_1,u̅_2) and σ̅ has components σ̅_i,j, i,j=1,2. In (<ref>), the terms 𝐫_eq and 𝐫_cr refer to the residuals of the equilibrium equation (<ref>) and the constitutive relation (<ref>) or (<ref>). The eikonal loss term is problem-independent and therefore identical to (<ref>). We note that instead of defining neural network approximations for the displacements and the stresses, we could define neural network approximations solely for the displacements, that is, ψ = (u_1,u_2). In this case, the loss term (<ref>) would only include the residual of the equilibrium equation (<ref>), in which the stress components would be directly expressed in terms of the displacements and the material distribution using the constitutive relation (<ref>). However, several recent studies <cit.> have shown that the mixed formulation adopted in the present work results in superior accuracy and training performance, which could partly be explained by the fact that only first-order derivatives of the neural network outputs are involved since the displacements and stresses are only differentiated to first oder in (<ref>) and (<ref>). In our case, the mixed formulation holds the additional advantage that it enables us to treat stiff and rigid inclusions using the inverted constitutive relation (<ref>) instead of (<ref>). Finally, the mixed formulation allows us to directly integrate both displacement and traction boundary conditions into the output of the neural network approximations, as we describe in the next paragraph. We design the architecture of the neural networks in such a way that they inherently satisfy the boundary conditions, treating the latter as hard constraints <cit.>. For the elastic matrix, we do this through the transformations u̅_1(𝐱; θ_1) = u̅_1'(𝐱; θ_1), u̅_2(𝐱; θ_2) = u̅_2'(𝐱; θ_2), σ̅_11(𝐱; θ_3) = (x-0.5)(x+0.5) σ̅_11'(𝐱; θ_3) + P_o, σ̅_22(𝐱; θ_4) = (y-0.5)(y+0.5) σ̅_22'(𝐱; θ_4), σ̅_12(𝐱; θ_5) = (x-0.5)(x+0.5) · (y-0.5)(y+0.5) σ̅_12'(𝐱; θ_5), ϕ̅(𝐱; θ_ϕ) = (x-0.5)(x+0.5) · (y-0.5)(y+0.5) ϕ̅'(𝐱; θ_ϕ) + w, where the quantities with a prime denote the raw output of the neural network. In this way, the neural network approximations defined in (<ref>) obey by construction the boundary conditions (<ref>). Further, since we know that the elastic material is present all along the outer surface ∂Ω, we define ϕ̅ so that ϕ = w on ∂Ω, which ensures that ρ = sigmoid(ϕ/δ) ≃ 1 on ∂Ω (recall that w is such that sigmoid(w/2δ) ≃ 1). In the case of the M, I, T inclusions, these transformations are changed to reflect the fact that the matrix is wider and pulled from the top and bottom. For the periodic elastic layer, we introduce the transformations u̅_1(𝐱; θ_1) = (y+0.5) u̅_1'(cos x, sin x, y; θ_1), u̅_2(𝐱; θ_2) = (y+0.5) u̅_2'(cos x, sin x, y; θ_2), σ̅_11(𝐱; θ_3) = σ̅_11'(cos x, sin x, y; θ_3), σ̅_22(𝐱; θ_4) = y σ̅_22'(cos x, sin x, y; θ_4) - P_o, σ̅_12(𝐱; θ_5) = y σ̅_12'(cos x, sin x, y; θ_5), ϕ̅(𝐱; θ_ϕ) = y(y+0.5) ϕ̅'(cos x, sin x, y; θ_ϕ) + w(4y+1), so that the neural network approximations defined in (<ref>) obey by construction the boundary conditions (<ref>) and are periodic along the x direction. Further, since we know that the elastic material is present all along the top surface y = 0 and the rigid substrate is present all along the bottom surface y = -0.5, we define ϕ̅ so that ϕ = w for y = 0 and ϕ = -w for y=-0.5, which ensures that ρ = sigmoid(ϕ/δ) ≃ 1 for y = 0 and ρ≃ 0 for y=-0.5. §.§.§ Large-deformation hyperelasticity The problem is now described by the physical quantities ψ = (u_1,u_2,S_11,S_22,S_12,S_21,p). We therefore introduce the neural network approximations u_1(𝐱) = u̅_1(𝐱; θ_1), u_2(𝐱) = u̅_2(𝐱; θ_2), S_11(𝐱) = S̅_11(𝐱; θ_3), S_22(𝐱) = S̅_22(𝐱; θ_4), S_12(𝐱) = S̅_12(𝐱; θ_5), S_21(𝐱) = S̅_21(𝐱; θ_6), p(𝐱) = p̅(𝐱; θ_7), ϕ(𝐱) = ϕ̅(𝐱; θ_ϕ), and the material distribution is given by ρ(𝐱) = ρ̅(𝐱;θ_ϕ) = sigmoid(ϕ̅(𝐱;θ_ϕ)/δ). We then formulate the loss function (<ref>) by specializing the loss term expressions presented in Section <ref> to the linear elasticity problem, using the governing equations given in Appendix <ref>. Omitting the θ's for notational simplicity, we obtain ℒ_meas(θ_ψ) = 1/|∂Ω^m|∑_𝐱_i ∈∂Ω^m |𝐮̅(𝐱_i) - 𝐮_i^m|^2, ℒ_gov(θ_ψ, θ_ϕ) = 1/|Ω^d|∑_𝐱_i ∈Ω^d |𝐫_eq(𝐒̅(𝐱_i))|^2 + 1/|Ω^d|∑_𝐱_i ∈Ω^d |𝐫_cr(𝐮̅(𝐱_i),𝐒̅(𝐱_i),p̅(𝐱_i),ρ̅(𝐱_i))|^2 + 1/|Ω^d|∑_𝐱_i ∈Ω^d |𝐫_inc(𝐮̅(𝐱_i),ρ̅(𝐱_i))|^2, ℒ_eik(θ_ϕ) = 1/|Ω_eik^d|∑_𝐱_i ∈Ω_eik^d(| ∇ϕ̅ (𝐱_i)| - 1 )^2, where 𝐮̅ = (u̅_1,u̅_2) and 𝐒̅ has components S̅_i,j, i,j=1,2. In (<ref>), the terms 𝐫_eq, 𝐫_cr, and 𝐫_inc refer to the residuals of the equilibrium equation (<ref>), the constitutive relation (<ref>), and the incompressibility constraint (<ref>). The eikonal loss term is problem-independent and therefore identical to (<ref>). As in the linear elasticity case, we design the architecture of the neural networks in such a way that they inherently satisfy the boundary conditions. For the elastic matrix problem, u̅_1(𝐱; θ_1) = u̅_1'(𝐱; θ_1), u̅_2(𝐱; θ_2) = u̅_2'(𝐱; θ_2), S̅_11(𝐱; θ_3) = (x-0.5)(x+0.5) S̅_11'(𝐱; θ_3) + P_o, S̅_22(𝐱; θ_4) = (y-0.5)(y+0.5) S̅_22'(𝐱; θ_4), S̅_12(𝐱; θ_5) = (y-0.5)(y+0.5) S̅_12'(𝐱; θ_5), S̅_21(𝐱; θ_6) = (x-0.5)(x+0.5) S̅_21'(𝐱; θ_6), p̅(𝐱; θ_7) = p̅'(𝐱; θ_7), ϕ̅(𝐱; θ_ϕ) = (x-0.5)(x+0.5) · (y-0.5)(y+0.5) ϕ̅'(𝐱; θ_ϕ) + w, where the quantities with a prime denote the raw output of the neural network. In this way, the neural network approximations defined in (<ref>) obey by construction the boundary conditions of the problem. As before, since we know that the elastic material is present all along the outer surface ∂Ω, we define ϕ̅ so that ϕ = w on ∂Ω, which ensures that ρ = sigmoid(ϕ/δ) ≃ 1 on ∂Ω. §.§ Architecture and training details Here, we provide implementation details regarding the architecture of the deep neural networks, the training procedure and corresponding parameter values. §.§.§ Neural network architecture State variable fields of the form ψ(𝐱) are approximated using deep fully-connected neural networks that map the location 𝐱 to the corresponding value of ψ at that location. This map can be expressed as ψ(𝐱) = ψ̅(𝐱;θ), and is defined by the sequence of operations 𝐳^0 = 𝐱, 𝐳^k = σ(𝐖^k 𝐳^k-1 + 𝐛^k), 1 ≤ k ≤ℓ-1, ψ = 𝐳^ℓ = 𝐖^ℓ𝐳^ℓ-1 + 𝐛^ℓ. The input 𝐱 is propagated through ℓ layers, all of which (except the last) take the form of a linear operation composed with a nonlinear transformation. Each layer outputs a vector 𝐳^k ∈ℝ^q_k, where q_k is the number of `neurons', and is defined by a weight matrix 𝐖^k ∈ℝ^q_k × q_k-1, a bias vector 𝐛^k ∈ℝ^q_k, and a nonlinear activation function σ(·). Finally, the output of the last layer is assigned to ψ. The weight matrices and bias vectors, which parametrize the map from 𝐱 to ψ, form a set of trainable parameters θ = {𝐖^k,𝐛^k}_k=1^ℓ. The choice of the nonlinear activation function σ(·) and the initialization procedure for the trainable parameters θ are both important factors in determining the performance of neural networks. While the tanh function has been a popular candidate in the context of PINNs <cit.>, recent works by Refs. <cit.> have shown that using sinusoidal activation functions can lead to improved training performance by promoting the emergence of small-scale features. In this work, we select the sinusoidal representation network (SIREN) architecture from Ref. <cit.>, which combines the use of the sine as an activation function with a specific way to initialize the trainable parameters θ that ensures that the distribution of the input to each sine activation function remains unchanged over successive layers. Specifically, each component of 𝐖^k is uniformly distributed between - √(6/q_k) and √(6/q_k) where q_k is the number of neurons in layer k, and 𝐛^k = 0, for k=1, …, ℓ. Further, the first layer of the SIREN architecture is 𝐳^1 = σ(ω_0 𝐖^1 𝐳^0 + 𝐛^1) instead of (<ref>), with the extra scalar ω_0 promoting higher-frequency content in the output. §.§.§ Training procedure We construct the total loss function (<ref>) and train the neural networks in TensorFlow 2. The training is performed using ADAM, a first-order gradient-descent-based algorithm with adaptive step size <cit.>. In each case, we repeat the training over four random initializations of the neural networks parameters and report the best results. Three tricks resulted in noticeably improved training performance and consistency: * First, we found that pretraining the level-set neural network ϕ(𝐱) = ϕ̅(𝐱; θ_ϕ) in a standard supervised setting leads to much more consistent results over different initializations of the neural networks. During this pretraining step, carried out before the main optimization step in which all neural networks are trained to minimize the loss (<ref>), we minimize the mean-square error ℒ_sup(θ_ϕ) = 1/|Ω^d|∑_𝐱_i ∈Ω^d |ϕ̅(𝐱_i; θ_ϕ) - ϕ_i |, where Ω^d is the same set of collocation points as in (<ref>), the supervised labels ϕ_i = |𝐱_i| - 0.25 for the elastic matrix, and ϕ_i = y_i + 0.25 for the elastic layer. The material density ρ̅(𝐱;θ_ϕ) = sigmoid(ϕ̅(𝐱;θ_ϕ)/δ) obtained at the end of this pretraining step is one outside a circle of radius 0.25 centered at the origin for the elastic matrix, and it is one above the horizontal line y = -0.25 for the elastic layer. This choice for the supervised labels is justified by the fact that ρ is known to be one along the outer boundary of the domain Ω for the elastic matrix, and it is known to be one (zero) along the top (bottom) boundary of Ω for the elastic layer. * Second, during the main optimization in which all neural networks are trained to minimize the loss (<ref>), we evaluate the loss component ℒ_gov in (<ref>) using a different subset, or mini-batch, of residual points from Ω^d at every iteration. Such a mini-batching approach has been reported to improve the convergence of the PINN training process <cit.>, corroborating our own observations. In our case, we choose to divide the set Ω^d into 10 different mini-batches of size |Ω^d|/10, which are then employed sequentially to evaluate ℒ_gov during each subsequent gradient update θ_ψ^k+1 = θ_ψ^k - α_ψ(k) ∇_θ_ψℒ(θ_ψ^k, θ_ϕ^k), θ_ϕ^k+1 = θ_ϕ^k - α_ϕ(k) ∇_θ_ϕℒ(θ_ψ^k, θ_ϕ^k). An epoch of training, which is defined as one complete pass through the whole set Ω^d, therefore consists of 10 gradient updates. * Third, the initial nominal step size α_ψ governing the learning rate of the physical quantities neural networks is set to be 10 times larger than its counterpart α_ϕ governing the learning rate of the level-set neural network. This results in a separation of time scales between the rate of change of the physical quantities neural networks and that of the level-set neural network, which is motivated by the idea that physical quantities should be given time to adapt to a given geometry before the geometry itself changes. §.§.§ Parameter values The parameter values described below apply to all results presented in this paper. * Neural network architecture. For all cases except the M, I, T inclusions (case 19, Tab. <ref>), we opted for neural networks with 4 hidden layers of 50 neurons each, which we found to be a good compromise between expressivity and training time. For the M, I, T inclusions, we used 6 hidden layers with 100 neurons each. Further, we choose ω_0 = 10 as the scalar appearing in the first layer of the SIREN architecture. * Collocation and measurements points. In the square and rectangle elastic matrix problems, we consider that the boundary displacement is measured along each of the four external boundaries at 100 equally-spaced points, which amounts to |∂Ω^m| = 400. In the elastic layer problem, we consider that the boundary displacement is measured along the top boundary at 100 equally-spaced points, which amounts to |∂Ω^m| = 100. For both geometries except the M, I, T inclusions, the set of collocation points Ω^d consists of 10000 points distributed in Ω with a Latin Hypercube Sampling (LHS) strategy, yielding 10 mini-batches containing 1000 points each. For the M, I, T inclusions, Ω^d consists of 50000 points, yielding 50 mini-batches containing 1000 points each. * Training parameters. The pretraining of the level-set neural network is carried out using the ADAM optimizer with nominal step size 10^-3 over 800 training epochs, employing the whole set Ω^d to compute the gradient of ℒ_sup at each update step. The main optimization, during which all neural networks are trained to minimize the total loss (<ref>), is carried out using the ADAM optimizer. For the matrix cases except the M, I, T inclusions, we use a total of 150k training epochs starting from a nominal step size 10^-4 for the level-set neural network and 10^-3 for the other neural networks. This step size is reduced to 10^-4 for all neural networks at 60k epochs, and again to 10^-5 at 120k epochs. The schedule is the same for the elastic layer cases, with the difference that we use a total of 200k training epochs. For the matrix case with the M, I, T inclusions, we use a total of 50k epochs (note that each epoch contains 5 times as many mini-batches as in the other cases) starting from a nominal step size 10^-4 for the level-set neural network and 10^-3 for the other neural networks. This step size is reduced to 10^-4 for all neural networks at 16k epochs, and again to 10^-5 at 40k epochs. Finally, the scalar weights in the loss (<ref>) are assigned the values λ_meas = 10, λ_gov = 1, and λ_reg = 1 for all cases. We also multiply the second term of ℒ_gov in (<ref>) and (<ref>) with a scalar weight λ_cr = 10. §.§ FEM simulations The FEM simulations that provide the boundary displacement data and the ground truth are performed in the software Abaqus, using its Standard (implicit) solver. The list of all cases considered in provided in Tab. <ref> for the elastic matrix setup (Fig. <ref>a) and in Tab. <ref> for the periodic elastic layer setup (Fig. <ref>b). Every case is meshed using a linear density of 200 elements per unit length along each boundary, corresponding to between 25k to 80k total elements depending on domain size as well as number and shapes of voids or inclusions. We employ bilinear quadrilateral CPE4 plain-strain elements for the cases involving a linear elastic material, and their hybrid constant-pressure counterpart CPE4H for the cases involving a hyperelastic material. We apply a load P_o/E = 0.01 for the cases involving a linear elastic material, and a load P_o/E = 0.173 for the cases involving a hyperelastic material. abbrvnat
http://arxiv.org/abs/2303.07262v1
20230313164226
Second law from the Noether current on null hypersurfaces
[ "Antoine Rignon-Bret" ]
gr-qc
[ "gr-qc" ]
equationsection
http://arxiv.org/abs/2303.07188v1
20230313152933
Horospherical dynamics in invariant subvarieties
[ "John Smillie", "Peter Smillie", "Barak Weiss", "Florent Ygouf" ]
math.DS
[ "math.DS" ]
Transverse single-spin asymmetry of midrapidity π^0 and η mesons in p+Au and p+Al collisions at √(s__NN)= 200 GeV L. Zou March 30, 2023 ================================================================================================================= We consider the horospherical foliation on any invariant subvariety in the moduli space of translation surfaces. This foliation can be described dynamically as the strong unstable foliation for the geodesic flow on the invariant subvariety, and geometrically, it is induced by the canonical splitting of -valued cohomology into its real and imaginary parts. We define a natural volume form on the leaves of this foliation, and define horospherical measures as those measures whose conditional measures on leaves are given by the volume form. We show that the natural measures on invariant subvarieties, and in particular, the Masur-Veech measures on strata, are horospherical. We show that these measures are the unique horospherical measures giving zero mass to the set of surfaces with no horizontal saddle connections, extending work of Lindenstrauss-Mirzakhani and Hamenstädt for principal strata. We describe all the leaf closures for the horospherical foliation. § INTRODUCTION It is an interesting fact that geometric questions about rational polygonal billiards can be addressed by studying the dynamics on moduli spaces of translation surfaces. This is one of many reasons to study the dynamics on moduli spaces of translation surfaces — see the surveys <cit.> for other motivations and a survey of results. We remind the reader that this moduli space is partitioned into strata, which correspond to translation surfaces of a fixed topological type. The group G acts on each stratum. The horocycle flow is given by U {u_s : s ∈}⊂ G, where u_s ( 1 s 0 1 ). The analogy between dynamics on strata and homogeneous dynamics has been fruitful. In the setting of homogeneous dynamics U-actions and G-actions were analyzed in work of Ratner which showed that orbit closures and ergodic invariant probability measures are surprisingly well-behaved. The dynamics of G-actions (and moreover the dynamics of its subgroup P of upper triangular matrices) on strata were analyzed in two papers <cit.> where it was shown that orbit closures and ergodic invariant measures have nice descriptions (see Section <ref> for a precise statement). The G-orbit closures are endowed with a wealth of geometrical structures, among which is the horospherical foliation which plays the role of the strong unstable manifold foliation for the one parameter diagonal subgroup which is called the geodesic flow (see <ref>). In <ref> we will define horospherical measures. Loosely speaking, the horospherical leaves are endowed with affine structures and the horospherical measures are those for which the conditional measures on theses leaves are translation invariant with respect to these affine structures. §.§ Statement of results All measures considered in this paper are Borel regular Radon measures on strata of translation surfaces. Any G-orbit closure ^(1)⊂^(1) supports a unique ergodic G-invariant finite smooth measure; we will refer to this measure as the special flat measure on ^(1). The following are the main results of this paper. The special flat measure on any G-orbit closure is horospherical. We will say that a measure μ is saddle connection free if μ-a.e. surface has no horizontal saddle connections. Up to scaling, the only saddle connection free horospherical measure on a G-orbit closure is the special flat measure. We emphasize that horospherical measures are a a priori not assumed to be finite. It is thus a consequence of Theorem <ref> that horospherical measures are finite under the saddle connection free assumption; it seems likely, but we were not able to prove, that all horospherical ergodic measures are finite. Theorem <ref> was announced without proof in <cit.>. The saddle connection free assumption cannot be removed; for example, the length measure on a periodic horocycle trajectory in a closed G-orbit. In <ref> we will give more interesting examples of invariant subvarieties and horospherical measures on them, which are not the special flat measure. We will also classify (see <ref>) all the horospherical measures on the simplest nontrivial invariant subvarieties, namely the eigenform loci in (1,1). If a surface has a horizontal cylinder then so does any surface on its horospherical leaf. We will say that a leaf of the horospherical foliation is cylinder-free if all surfaces on the leaf have no horizontal cylinders. We say that a measure μ on is cylinder-free if μ-a.e. surface has no horizontal cylinders. In <ref> we give examples of horospherical measures which are not special flat and for which almost every point has a horizontal saddle connection. For these measures it is also the case that almost every point has a cylinder. It seems likely that this is always the case; or in other words, that in Theorem <ref> the condition `saddle connection free' can be weakened to `cylinder-free'. The analogous assertion about orbit closures is true: Any cylinder-free leaf for the horospherical foliation is dense. The proof of Theorem <ref> uses a statement of independent interest (Theorem <ref>), about extending horizontal saddle connections while staying inside invariant suborbifolds. This result was explained to us by Paul Apisa and Alex Wright, and its proof is given in Appendix <ref>. The geodesic flow is the restriction of the G-action to the subgroup A {g_t : t ∈}⊂ G, where g_t ( e^t 0 0 e^-t). From a dynamical perspective, the horospherical foliation is the strong unstable foliation for the geodesic flow. Our arguments yield a simpler proof of the following theorem. The special flat measure is the unique A-invariant horospherical measure on any G-orbit closure. Any leaf for the weak-unstable foliation on any G-orbit closure is dense. §.§ Motivations, prior work, and some ideas from the proofs The work of Eskin, Mirzakhani and Mohammadi gives a very detailed understanding of invariant measures and sets for the G-action and the P-action on strata of translation surfaces. A central remaining open problem is to understand horocycle invariant ergodic measures. As we will see in <ref>, horospherical measures are horocycle-invariant; thus understanding horospherical measures can be seen as a contribution to the problem of understanding general horocycle-invariant measures. A previous measure rigidity result for horospherical measures was obtained in 2008, independently by Lindenstrauss and Mirzakhani <cit.> and by Hamenstädt <cit.>. They were interested in understanding mapping class group invariant measures on the space of measured laminations. By a `duality principle' (see <cit.>) this question is very closely related to the problem of classifying horospherical measures on the principal stratum. Our argument for Theorem <ref> follows <cit.>, which in turn is inspired by ideas of Dani <cit.> and Margulis <cit.> The main ingredients are the mixing of the A-action, the use of dynamical boxes and how they transform under the A-action, and nondivergence results for the U-action (which in the present context were obtained in <cit.>). After the requisite preparations, this argument is given in <ref>. In order to carry out the details of this argument one needs to give a precise description of horospherical measures and the special flat measures, and their decomposition into conditional measures in flow boxes. §.§ Acknowledgements We are grateful to Paul Apisa and Alex Wright for providing the proof of Theorem <ref>. The proof is given in Appendix <ref>. We acknowledge support from grants BSF 2016256, ISF 2019/19 and ISF-NSFC 3739/21. § PRELIMINARIES In this section we introduce our objects of study and set up our notation. There are many approaches to these definitions. In our approach, the linear orbifold structure (or affine orbifold structure) given by period coordinates will be important and we will stress this point of view in what follows. A suitable reference for the theory utilizing this point of view is <cit.>, and unless stated otherwise, our notation, terminology and assumptions are as in <cit.>. See also <cit.>. See <cit.> for a general discussion of affine manifolds. §.§ Strata and period coordinates Let S be a connected, compact orientable surface of genus g, Σ = {ξ_1, …, ξ_k }⊂ S a finite set, a_1, …, a_k non-negative integers with ∑ a_i = 2g-2, and = (a_1, …, a_k) the corresponding stratum of translation surfaces. We let _m=_m(a_1, …, a_k) denote the stratum of marked translation surfaces and π : _m→ the forgetful mapping. It will be useful to assume that singular points are labeled, or equivalently, = _m / (S, Σ), where (S, Σ) is the group of isotopy classes of orientation-preserving homeomorphisms of S fixing Σ, up to an isotopy fixing Σ. We will typically denote elements of by the letter q when we want to consider them as points of , and by the letter M or M_q when we want to consider their underlying topological or geometrical properties as spaces in their own right. To make this distinction clear we will write M_q for the underlying surface associated with a point q ∈. Points in _m will be typically denoted by boldface letters such as . We recall the definition of the map : _m→ H^1(S, Σ; ^2). For an oriented path γ in M_q which is either closed or has endpoints at singularities, let (M_q, γ) ( ∫_γ dx_q, ∫_γ dy_q ), where dx_q and dy_q are the 1-forms on M_q inherited from the the forms dx and dy on the plane. Given ∈_m represented by f: S → M_q, where M_q is a translation surface, we define () f^*((M_q, ·)). The map is also known in the literature as the period map. There is an open cover {𝒰_τ} of _m, indexed by triangulations τ of S with triangles whose vertices are in Σ, such that the restricted maps φ_τ|_𝒰_τ, φ_τ: 𝒰_τ→ H^1(S, Σ; ^2) are homeomorphisms onto their image. The charts φ_τ give an atlas with affine overlap maps and endow ℋ_m with a structure of affine manifold. This atlas of charts {(𝒰_τ, φ_τ)} is known as the period coordinate atlas. The (S,Σ)-action on _m is properly discontinuous and affine, and hence inherits the structure of affine orbifold, and the map π: _m→ is an orbifold covering map. We can associate to any affine manifold a holonomy cover and a developing map. In this case is the holonomy cover and is the developing map of (see <cit.>). The group acts on translation surfaces in and _m by modifying planar charts. It acts on H^1(S, Σ; ^2) via its action on the coefficients ^2. The -action commutes with the (S, Σ)-action, and thus the map π is -equivariant for these actions. The -action on _m is free, since (g) ≠() for any nontrivial g ∈. We have a coordinate splitting of ^2 and we write ^2 = _x⊕_y to distinguish the two summands in this splitting. There is a corresponding splitting of cohomology H^1(S, Σ; ^2) = H^1(S, Σ; _x) ⊕ H^1(S, Σ; _y). We refer to the summands in this splitting as the horizontal space and vertical space respectively. It can also be useful to identify the coefficients with and consider H^1(S, Σ; ). This is the most natural choice when we are considering Abelian differentials. An -structure on a complex vector space V is given by a choice of a real subspace W⊂ V so that V=W⊕𝐢W. If V is equipped with an -structure we say that a complex subspace V'⊂ V is defined over if V'=W'⊕𝐢W' for some real subspace W'⊂ W. We give H^1(S, Σ; ) the -structure corresponding to the real subspace H^1(S, Σ; )=H^1(S, Σ; _x)⊂ H^1(S, Σ; ). In this language 𝐢H^1(S, Σ; )=H^1(S, Σ; _y). If V has an -structure then an -basis for V is a basis for V as a complex vector space consisting of elements of W. We say that a linear equation on V has real coefficients if it is represented by a matrix with real entries when expressed with respect to an -basis. Let V⊂ H^1(S, Σ; ) be a complex vector space. The following are equivalent: * V is invariant under the action of . * V⊂ H^1(S, Σ; ) is defined over . * V is the set of zeros of a collection of linear equations with real coefficients. The universal coefficients theorem identifies H^1(S, Σ; ^2 ) with (H_1(S,Σ;),^2 ). With respect to this identification acts on the left by post-composition. Let a[ 0 -1; 1 0 ], b [ 1 0; 0 0 ], and c aba^-1 = [ 0 0; 0 1 ]. Note that multiplication by a corresponds to multiplication by 𝐢, and multiplication by b and c correspond respectively to projections onto the two summands in (<ref>). We first prove the implication (<ref>) (<ref>). If V is a complex vector space then it is invariant under a, b and c. Since a,b,c generate the ring of 2 × 2 real matrices, V is -invariant. It is clear that (<ref>) implies (<ref>), and we now prove that (<ref>) implies (<ref>). If h:H_1(S,Σ;)→^2 is an element of (H_1(S,Σ;),^2) and L∈, then h maps to L∘ h. In particular h and h' differ by an element of exactly when they have the same kernel. Thus if V is invariant it corresponds to a subspace K⊂ H_1(S,Σ;)→^2. If k_j is a basis for K then V is determined by the equations v· k_j=0 where the dot represents the Kronecker pairing. These equations have real coefficients. We have a restriction map : H^1(S, Σ; ^2) → H^1(S; ^2) (given by restricting a cochain to closed paths). Since is topologically defined, its kernel ( ) is (S, Σ)-invariant. Moreover our convention that singular points are marked implies that the (S, Σ)-action on ( ) is trivial. Define Z = ( )∩ H^1(S, Σ; _x). Since monodromy acts trivially on Z, for any v ∈ Z the constant vector field on H^1(S, Σ; ^2) in direction v pulls back to a well-defined vector field on _m on via the local diffeomorphism dev. Integrating this vector field gives a locally defined real REL flow (corresponding to v) (t, q) ↦_tv(q). For every q ∈ a trajectory is defined for t ∈ I_q, where the domain of definition I_q = I_q(v) is an open interval of which contains 0. This interval is all of if the underlying surface M_q has no horizontal saddle connections. If q ∈, s ∈ and t ∈ I_q then t ∈ I_u_sq, and _tv(u_sq) = u_s _tv(q). The set Z^(q){v ∈ Z: _v(q) is defined} = {v ∈ Z: 1 ∈ I_q(v)}, as well as the sets I_q(v), are explicitly described in <cit.>. §.§ Invariant subvarieties In this subsection, we introduce our notion of invariant subvarieties and irreducible invariant subvarieties. It will be shown in <cit.>, using the work of Eskin-Mirzakhani <cit.> and Eskin-Mirzakhani-Mohammadi <cit.>, that an irreducible invariant subvariety is exactly a -orbit closure while an invariant subvariety is a finite union of such -orbit closures. A d-dimensional linear manifold is a submanifold L of which is a connected component of ^-1(V) where V is a d-dimensional complex subspace of H^1(S,Σ;^2) defined over . Since the developing map is equivariant and (S,Σ) acts linearly on the space H^1(S,Σ;^2 ), it follows that (S,Σ) takes a d-dimensional linear manifold to a d-dimensional linear manifold. If L is a linear manifold corresponding to V_L ⊂ H^1(S,Σ;^2 ), we denote by Γ_L be the subgroup of (S,Σ) that preserves L. Since the developing map is (S,Σ)-equivariant, we get an induced action of Γ_L on V_L. We say that L is an equilinear manifold if furthermore we have (γ|_V_L)= ± 1 for every γ∈Γ_L. A d-dimensional invariant subvariety is a subset ⊂ such that π^-1() is a locally finite union of d-dimensional equilinear manifolds. We will write d = (); in some texts this is referred to as the complex dimension of . The term “invariant" in the definition of invariant subvariety is justified by the following: An invariant subvariety is closed and -invariant. Since V is a closed subset of H^1(S,Σ;^2) it follows that ^-1(V) is a closed subset of . It follows that a linear manifold is a closed subset of . The set π^-1() is closed because it is a locally finite union of closed sets, and this implies that is closed. Since π is -equivariant, it is enough to prove that π^-1() is -invariant. Let L be a linear submanifold contained in π^-1() which maps to V_L under . By definition, V_L is defined over and by Lemma <ref> it is invariant under the action of on H^1(S,Σ;^2 ). Since is -equivariant the action of on preserves ^-1(V_L). Since is connected, the action of on preserves L. Since π^-1() is a union of linear sub-manifolds it follows that it is invariant under . A d-dimensional invariant subvariety is said to be irreducible if it cannot be written as a union of two proper distinct d-dimensional invariant subvarieties. We have the following equivalent characterization: Let be a d-dimensional invariant subvariety. Then is irreducible if and only if for any d-dimensional equilinear manifold L ⊂π^-1(), we have ⋃_γ∈(S,Σ) L ·γ = π^-1(). For the proof of Proposition <ref> we will need the following: If L and L' are distinct d-dimensional linear submanifolds, then π(L)∩π(L') is a meager subset of π(L) and of π(L'). We first show that π^-1(π(L)∩π(L') ) is a countable union of sets of dimension less than d. We have: π^-1(π(L))=⋃_γ∈(S,Σ) L·γ and π^-1(π(L'))=⋃_γ∈(S,Σ) L'·γ. Now consider an intersection (L·γ) ∩ (L'·γ'). We have (L·γ)⊂ V and (L'·γ)⊂ V' for d-dimensional linear subspaces of H^1(S,Σ;^2). If V=V' then L·γ and L'·γ' are topological components of ^-1(V) so they are either disjoint or equal. If L·γ=L'·γ' then L=L'·γ'γ^-1 so π^-1(π(L))=π^-1(π(L')) and π(L)=π(L') contrary to assumption. If V V' then (L·γ) ∩ (L'·γ')⊂^-1(V∩ V'). This is a complex subspace of positive codimension so its inverse image is a nowhere dense subset of the d-dimensional manifolds L·γ and L'·γ'. Thus π^-1(π(L)∩π(L')) is a meager subset of π^-1(π(L)) and π^-1(π(L')). Since π is open and the intersections (L ·γ) ∩ (L' ·γ') are closed, the projection π(L)∩π(L') is a meager subset of π(L) and π(L'). Say that is irreducible and let L be a d-dimensional equilinear manifold in π^-1(). If (<ref>) is false, we can write π^-1() as a countable union of orbits of distinct linear submanifolds L_1,L_2,…, as π^-1()= ⋃_ℓ⋃_γ∈(S,Σ) L_ℓ·γ, where L=L_1 and the list {L_i} contains more than one element. We have = ⋃_ℓπ( L_ℓ). We define A π(L_1) and B ⋃_1<ℓπ(L_ℓ). Since is irreducible, and since we have assumed that (<ref>) fails, we have =B. This implies A⊂ B, and hence π(L_1)=⋃_ℓπ(L_1)∩π(L_ℓ). According to Lemma <ref> π(L_1)∩π(L_ℓ) is a meager subset of π(L_1) so our decomposition of π(L_1) expresses π(L_1) as a meager set and violates the Baire category theorem. We conclude that =A which is what we wanted to show. Now assume that for any d-dimensional equilinear manifold L ⊂π^-1() we have (<ref>). Suppose we have a decomposition =A∪ B where A= ⋃_jπ(L_j) and B=⋃_kπ(L'_k), where both collections {L_i}, {L'_k} are (S, Σ)-invariant and comprised of d-dimensional equilinear manifolds. By (<ref>), π^-1(A) and π^-1(B) are either empty or equal to π^-1(). Thus A and B are not proper subsets of . It follows from Proposition <ref> that if is a d-dimensional irreducible invariant subvariety and L is a d-dimensional equilinear manifold contained in π^-1(), then π(L)=. This motivates the following definition that will be used throughout the text Let be a d-dimensional irreducible invariant subvariety. A lift of is a d-dimensional equilinear manifold L ⊂π^-1(). The following result establishes the link between -orbit closures and invariant subvarieties. In the forthcoming <cit.>, it will be deduced from the results of <cit.>. Irreducible invariant subvarieties and -orbit closures coincide. Furthermore, any invariant subvariety is a finite union of irreducible invariant subvarieties. Standing assumption: all the invariant subvarieties we will consider from now on will be assumed to be irreducible. Let be a d-dimensional invariant subvariety. We conclude this section by constructing a Radon measure supported on which will be uniquely defined up to a multiplicative constant. This will require some standard constructions which are summarized in Appendix <ref> for lack of a suitable reference. Let L be a lift of , let V_L = (L) and let Γ_L be the stabilizer in (S,Σ) of L. Let α be a volume form on L that is obtained as the pullback by of an element of the top degree exterior power of V_L. The group acts smoothly on . Denoting by g^∗ the pull-back operator on differential forms corresponding to the action of g ∈ on , we have ∀ g ∈, g^∗α = (det g)^d α. The volume form α defines a measure on L that we denote by μ_L. Since L is an equilinear manifold, the measure μ_L is Γ_L-invariant. Furthermore, since (S,Σ) acts transitively on the set of irreducible components, it can be arranged that for any γ∈(S,Σ), γ_∗ m_L = m_L ·γ. This means that the sum μ̃_ = ∑_L ⊂π^-1()μ_L, where the sum ranges over the lifts of , is a (S,Σ)-invariant measure on . The measure μ̃_ is a Radon measure, which follows from the fact that the collection of irreducible components is locally finite. Using Proposition <ref>, there is a unique Radon measure μ_ on such that for any f ∈ C_c(), we have ∫_ f dμ̃_ = ∫_( ∫_ f dθ_q ) dμ_(q), where θ_q ∑_∈π^-1( q) N() ·δ_, N() |{γ∈(S, Σ) : = ·γ}| (as in (<ref>)). The measure μ_ is supported on . It follows from Lemma <ref> that it is -invariant. We call it the linear measure on . Notice that this is a slight abuse of language as μ_ is only determined up to a multiplicative constant. §.§ Area one locus, cone construction, and special linear measures Let ∈_m, let q =π(), and let M= M_q be the underlying translation surface. The area of M can be expressed using period coordinates as follows. We define a Hermitian form on H^1(S, Σ ; ) by ( α, β ) = 1/2 𝐢∫_Sα∧β̅. (See <cit.> for a topological interpretation of (<ref>).) The area of M is then given by ((), ()). This is thus a quadratic formula in period coordinates. For the purposes of this paper we will use a related real valued bracket ⟨α, β⟩ involving the pairing of horizontal and vertical classes. Say that on a marked surface M_q we have a 1-form α corresponding to an element of H^1(S, Σ; _x) (a horizontal form) and a 1-form β corresponding to an element of H^1(S, Σ; _y) (a vertical form). Then ⟨α, β⟩ = ∫_Sα∧β and this gives (M_q)=⟨ dx_q, dy_q ⟩ = ∫_S dx_q ∧ dy_q . We denote the subset of surfaces in and of area one by ^(1) and ^(1). More generally, when is an invariant subvariety and L is a lift of , we also denote by ^(1) and L^(1) their intersection with the area-one locus. The latter are G-invariant and invariant under real REL flows (where defined). We recall that there is a rescaling action of _+^∗ on that corresponds to the action of the subgroup of of scalar matrices with positive coefficients. We consider the cone measure m_ on ^(1) defined for any Borel subset A ⊂^(1) by (A) μ_(cone(A)), where cone(A) {t· a : t ∈ (0,1], a ∈ A}. When is the whole stratum , the measure m_ is called the Masur-Veech measure. More generally, we shall call the measure the special flat measure on . If L is a lift of , we can perform the same cone construction with the measure μ_L and we denote by m_L the corresponding measure. Let m̃_ be the pre-image of m_ under π, that is the unique measure on such that for any f ∈ C_c(), ∫_π^-1() f dm̃_ = ∫_(∫_X̃ f dθ_q ) dm_(q) (see Definition <ref>). It is easily verified that m̃_ = ∑_L ⊂π^-1() m_L. §.§ The sup-norm Finsler metric We now recall the sup-norm Finsler metric on . This structure was studied by Avila, Gouëzel and Yoccoz, for proofs and more details see <cit.> and <cit.>. Let · denote the Euclidean norm on ^2. For a translation surface q, denote by Λ_q the collection of saddle connections on M_q and let ℓ_q(σ)= _q(σ) be the length of σ∈Λ_q. For β∈ H^1(M_q,Σ_q; ^2) we set β_q sup_σ∈Λ_qβ(σ)/ℓ_q(σ). We now define a Finsler metric for . Let f: S → M_q be a marking map representing a marked surface ∈. Using period coordinates we can identify the tangent space to at with H^1(S,Σ;^2). Then β_sup_τ∈Λ_β(f(τ))/ℓ_q(f(τ)) is a norm on H^1(S, Σ ; ^2). It satisfies the equivariance property ∀ h ∈(S,Σ), β_ = h^*β_ . h, where . h is represented by the marking map f ∘ h. The map T(_m) →, (,β) ↦β_ is continuous. The Finsler metric defines a distance function[In order to avoid confusion we use `distance function' to refer to what is often called a metric.] on which we call the sup-norm distance and define as follows: dist(_0, _1) inf_γ∫_0^1 γ'(τ)_γ(τ) dτ, where γ ranges over smooth paths γ:[0,1] → with γ(0)=_0 and γ(1) = _1. The topology induced by the sup norm distance on is the one induced by period coordinates, and the resulting metric space is proper and complete. We can use the distance function on to define a distance function on by dist(q_0, q_1) = inf{dist(_0, _1): _i ∈π^-1(q_i), i=0,1}. § HOROSPHERICAL MEASURES Let be an invariant subvariety of dimension n. The goal of this section is to define the horospherical foliation on and the related horospherical measures, which are our object of study in this paper. These objects will be defined via their counterparts for the irreducible components of π^-1(). §.§ Boxes We now define a notion of boxes. They will be used throughout the text and will play two roles: boxes give local coordinates on invariant subvarieties (more precisely, on the irreducible components of their pre-image by π) that are convenient for the study of horospherical measures; additionally, they will be used in a mixing argument in the proof of Theorem <ref>. From now on, we identify H^1(S,Σ,) with H^1(S,Σ,^2) as in <ref>. Let V ⊂ H^1(S,Σ,) be a complex linear subspace defined over . We have V = V_x⊕ V_y, where V_x V ∩ H^1(S, Σ; _x) and V_y V ∩ H^1(S, Σ; _y) are identified by the isomorphism V_x∋ v ↦𝐢 v ∈ V_y. We define V^(1){(x,y) ∈ V: x ∈ V_x, y ∈ V_y, ⟨ x, y ⟩ =1 }, and denote by π_ : V → V_, π_: V → V_ the projections corresponding to the direct sum decomposition (<ref>), and by π'_ the projection from π_^-1 (V_{0}) to the projective space 𝐏(V_). Finally let Ψ:V^(1)→𝐏(V_)× V_, Ψ(q) = (π'_(q),π_(q)). The map Ψ is a local diffeomorphism. Say that (x_0, y_0) ∈ V^(1) is mapped by Ψ to (x̅_0,y_0) in 𝐏(V_)× V_. We will construct a local inverse. Since ⟨ x_0,y_0⟩=1 we can find neighborhoods U_ of x_0 in V_ and U_ of y_0 in V_ so that ⟨ x,y⟩>0 for x∈ U_ and y∈ U_. We define maps ψ̃:U_× U_→ V^(1), ψ̃(x,y)=(x/⟨ x,y⟩,y ) and ψ:U'_× U_→ V^(1), ψ([x],y) ψ̃(x,y), where U'_π'_(U_). The map ψ̃ is smooth and descends in a well-defined way to define ψ. We see that Ψ∘ψ is the identity map, i.e., ψ is a local inverse of Ψ. [Boxes] Let L be a lift of and let V = (L). A box in L is a relatively compact subset ⊂ L^(1) together with a diffeomorphism φ : → such that, in the notations above, * U'_ and U_ are open sets in V_ and 𝐏(V_) respectively. * Ψ∘∘φ = Id. For y ∈ U_, the plaque of y in is the set _y φ(U'_×{y}). The composition in the second item in Definition <ref> makes sense since (L^(1)) ⊂ V^(1), in light of (<ref>). It should be understood as a choice of a suitable parameterization for boxes. Note that the data φ, are implicit in the notion of a box, but in order to avoid excessive notation we simply write . More generally, a box in π^-1() is a box in one of the irreducible components of π^-1(). Such a box will be called regular if for any γ∈(S,Σ) either ·γ∩ = ∅ or γ∈Γ, where Γ is the stabilizer in (S,Σ) of (i.e. the set of γ∈(S,Σ) such that ·γ =). When is regular, the map π induces a homeomorphism / Γ→π(). In particular the image of a regular box by π is an open subset of . Since (S,Σ) acts diagonally on 𝐏(H^1(S,Σ,_)) × H^1(S,Σ,_), the set of boxes is preserved by the action of (S,Σ). Furthermore, a finite intersection of boxes is a box. Thus, by Lemma <ref>, for every ∈π^-1(), there is a regular box in π^-1() containing . There is an asymmetry in the definition of a box; we could equally well define a box using V_ and 𝐏(V_), but we will make no use of that kind of box. §.§ Definition of the horospherical foliation Recall that a smooth map of manifolds is a submersion if its derivative is of full rank at every point. The implicit function theorem implies that the connected components of the fibers of a submersion are the leaves of a foliation. Let L be a lift of and let V be the linear space on which L is modeled. The foliations on L^(1) induced by the submersions π'_∘ : L^(1)→𝐏(V_) and π_∘ : L^(1)→ V_, are called the weak stable and strong unstable foliations. They are denoted respectively by ^s and ^uu. The leaves of ∈ L^(1) are denoted by ^s() and ^uu(). It follows from Lemma <ref> that these foliations are well-defined, and the leaves of these foliations are everywhere transverse. There was an idea to discuss this in the language of orbifold foliations and (G,X)-structures. I guess Peter's contribution in this direction is in the file `(G, X) structures on orbifolds'... but I didn't understand whether Peter wanted us to use that, and if so, how... I used the stuff in 2.3 to remove the need to work with orbifolds. Note that the boxes are only boxes in the nonsingular part of and similarly for the foliation. Please check Recall that for ∈_m, the local group Γ_ for the orbifold structure on is the subgroup of (S, Σ) fixing . We will say that a foliation on _m induces an orbifold foliation on if the monodromy action permutes the leaves, and each local group Γ_ preserves the tangent space to the leaf of ; the leaves of an orbifold foliation are thus orbifolds on their own right. The action of (S, Σ) permutes the leaves of ^uu. For any leaf F, the restriction |_F is a local homeomorphism to an affine subspace of V and with respect to this affine structure, the subgroup Γ_L {γ∈(S, Σ) : L ·γ = L} acts on the leaves of W_L^uu by affine maps. The monodromy preserves the product splitting V=V_⊕ V_ and acts linearly on each factor. Thus the monodromy acts projectively on 𝐏(V_). Since is monodromy equivariant, the leaves of the foliations ^s, ^uu are permuted by the action of (S, Σ). For the second assertion, it is clear from the definitions that maps the leaf F to a set of the form { (x,y_0) ∈ V : x ∈ V_ and ⟨ x, y_0 ⟩ =1} for some fixed y_0 ∈ V_y, and by Lemma <ref>, the map |_F is a local diffeomorphism. The last assertion follows from the (S, Σ)-equivariance of and the fact that (S, Σ) preserves the bracket ⟨·, ·⟩. Lemma <ref> equips the leaves of the foliation W^uu with an affine manifold structure. This structure need not be geodesically complete. Using real Rel deformations, one easily constructs affine geodesics in a leaf ^uu() which contain a surface with a horizontal saddle connection whose length goes to zero as one moves along the leaf. There are additional sources of non-completeness involving surfaces whose horizontal foliation is minimal but not uniquely ergodic, see <cit.>. Furthermore, using <cit.>, one can show that each leaf ^uu() is mapped by the developing map homeomorphically to an explicitly described convex domain in H^1(S, Σ; _), defined by finitely many linear inequalities. It follows from Lemma <ref> that the partition of L^(1) given by the leaves ^uu induces a partition of ^(1). We denote it by W^uu and if q ∈, we denote by W^uu(q) the element of the partition that contains q. We emphasize that W^uu does not depend on the choice of a particular irreducible component used to define it. This is a consequence of the fact that (S,Σ) acts on H^1(S,Σ,) by real endomorphisms and thus preserves the splitting into real and imaginary parts of cohomology classes. A horosphere is an element of the partition of W^uu. Occasionally, we may call the partition W^uu the horospherical foliation of . Even if this will play no role in the rest of the paper, we justify this choice of terminology for the sake of completeness: the invariant subvariety can be seen to have the structure of a properly immersed manifold , i.e., is the image of a manifold under a proper orbifold immersion f : → and there is a foliation on whose leaves are sent to horospheres by f. We can choose to be the quotient of L by a finite-index torsion-free normal subgroup Γ_0 of (S, Σ) and f : L / Γ_0 →, Γ_0 ↦π(). By Lemma <ref>, the horospherical foliation on L descends to a foliation on the manifold L /Γ_0. The leaves of this foliation are indeed mapped to horospheres and f is an orbifold immersion. The fact that it is proper follows from the fact that the collection of irreducible components of π^-1() is locally finite. Reversing the roles of π_ and π_, and defining π'_ in an analogous fashion, we also define the strong stable and unstable foliations ^ss and ^u as those induced by the submersion π_∘, π'_∘ respectively. Lemma <ref> holds for these foliations as well, with obvious modifications. Summarizing: for every ∈ L we have ^ss() ⊂^s(), ^uu() ⊂^u(), the leaves ^ss() and ^uu() have a natural affine structure and, for n = (), we have ^ss() = ^uu() = n-1, ^s() = ^u(q) = n. As we saw in <ref>, the sup-norm Finsler metric induces a distance function on _m as a path metric. We will induce distance functions on leaves of the stable and strong stable foliations using the same approach. For _0, _1 ∈_m belonging to the same stable (respectively, strong stable) leaf, we define dist^(s)(_0, _1) (respectively, dist^(ss)(_0, _1)) by (<ref>), but making the additional requirement that the entire path γ is contained in the stable (respectively strong stable) leaf of the _i. We similarly define dist^(s)(q_0, q_1) and dist^(ss)(q_0, q_1) for q_0, q_1 ∈ belonging to the same stable (respectively, strong stable) leaf. We will call the distance functions dist^(s), dist^(ss) the stable (resp. strong stable) sup-norm distance function. These distance functions have the following properties: Let L a lift of and let _0, _1 ∈ L. * If _0, _1 are in the same stable (resp., strong stable leaf) leaf then dist(_0, _1) ≤dist^(s) (_0, _1) (resp., dist(_0, _1) ≤dist^(ss) (_0, _1)). * If _0, _1 are in the same strong stable leaf then for all t ≥ 0, dist^(ss) (g_t _0, g_t _1) ≤dist^(ss) (_0, _1). And the same holds for the strong unstable leaf. * If _1 = g_t _0 for some t ∈ then dist^(s)(_0, _1) ≤ |t|. * Statements (<ref>), (<ref>) and (<ref>) also hold in , for q_0, q_1 in place of _0, _1. Assertion (<ref>) is obvious from definitions, and assertions (<ref>) and (<ref>) are proved in <cit.> (where what we call the strong stable foliation is referred to as the stable foliation). The assertions for follows from the corresponding ones for _m. Almost everywhere, the horospheres W^uu(q), W^ss(q) are actually the unstable and stable manifolds of the geodesic flow. That is, for any q, and almost every (with respect to the measure class induced by the affine structure on leaves) q_1 ∈ W^uu(q), q_2 ∈ W^ss(q), we have dist (g_t q, g_t q_1) t → -∞⟶ 0 and dist (g_t q, g_t q_2) t →∞⟶ 0. This is proved in <cit.> (see also <cit.>) for = ^(1). The same result for general invariant subvarieties can be proved by adapting the arguments used in <cit.>. §.§ Definition of horospherical measures Let L be a lift of and let V ⊂ H^1(S,Σ,) be the subspace on which L is modeled. We write V = V_⊕ V_ as in (<ref>). Let η_ and η_ be the translation invariant volume forms on V_ and V_ determined by a choice of an element of the top degree wedge power of V_≅ V_. Define α_ (π_∘)^*(η_), α_ (π_∘)^*(η_). We recall that the measure μ_L on L was defined in Section <ref> as the integral of a volume form α. From now on, this form will be chosen so that α = α_∧α_y. We define the Euler vector field E on such that for any ∈, E(q)= E_x() ∂/∂ t|_t=0[ e^t 0; 0 e^t ]·. This vector field can be thought of as the tangent vector to the rescaling action, which justifies our choice of terminology. Notice furthermore that the image of E by is the usual Euler vector field e(v) = v on H^1(S,Σ;). This is due to the fact that is -equivariant. Since L is a linear manifold, the vector field E is tangent to it. We use this to define the form ι_E α_, i.e., the contraction of α_ by the Euler field E. The restriction of to the leaves of ^uu induces a volume form. We denote by ν_β_ the induced measures. We emphasize that this defines a system of measures, one on each leaf W^uu_L(), so one should write ν_,^L instead of ν_β_; we omit this in our notation. We say that a measure m on L is horospherical if it is supported on L^(1) and its conditional measures on the leaves of ^uu are given by the measures ν_β_. More precisely, this means that for any box in L, there is a measure λ on U_ such that for any compactly supported continuous function f:L →, ∫_ f dν = ∫_U_( ∫_L_y f dν_β_) dλ(y). The measure λ is a so-called `transverse measure' for the horospherical foliation. This means it is a system of measures on sets tranverse to the foliation which is invariant under holonomy along leaves, see <cit.>. The theory of transverse measures implies that (<ref>) serves as a bijection between horospherical measures and transverse measures. We will not be using this point of view in this paper. Let ϕ_t be a smooth flow acting on L. A measure ν is said to be invariant if for any t ∈ we have (ϕ_t)_* ν = ν. This definition is equivalent to requiring that the conditional measures of ν on the orbits of ϕ_t be multiples of the Lebesgue measure dt, i.e., invariant under the maps ϕ_s x ↦ϕ_t+sx for any fixed t. The equivalence can be shown by disintegrating ν on flow boxes, i.e., boxes whose horizontal plaques are pieces of ϕ_t-orbits. By Lemma <ref>, leaves of ^uu are modeled on linear subspaces, and thus one could try and define horospherical measures as those that are invariant under translation along the leaves. However, these translations are not part of a globally defined group action; for instance trajectories might escape to infinity in finite time. To remedy this we adapt the other characterization of invariant measures, where the foliation by orbits of ϕ_t is replaced by the strong unstable foliation and the translation invariant measure dt is replaced by . In order to define a notion of horospherical measures on , we first need some terminology: let ν be a Radon measure on and let ν̃ be its pre-image by π as in (<ref>) (see also Appendix <ref>). By construction, the measure ν̃ is supported on π^-1(). If L is a lift of , then the restriction of the measure ν̃ to L is called the lift of ν corresponding to L. More generally, a lift of ν is a measure of the form ν̃|_L where L is any lift of . For instance, the measures m_L in (<ref>) are the lifts of m_. [Horospherical measure] A Radon measure ν on is horospherical if its lifts are horospherical. By Proposition <ref>, it is enough that one of the lifts is horospherical, as the action of (S,Σ) preserves the set of horospherical measures on _m. By definition, a horospherical measure is supported on L^(1). We have the following useful local disintegration formula: Let ν be a horospherical measure on . For any regular box φ : → in π^-1(), there is a measure λ on U_ such that for any compactly supported continuous function f:→, denoting B=π() we have ∫_ f dν = ∫_U_( ∫_L_y f ∘π dν_) dλ(y). Let L be a lift of in which is contained. We denote by Γ the stabilizer in (S,Σ) of , and by ν̃ the pre-image of ν under π. By definition, the measure ν̃|_L is horospherical, and we let λ_0 be a measure on _ as in (<ref>). We set λ1/|Γ|λ_0, and claim that λ satisfies (<ref>). Indeed, let f ∈ C_c() and assume for now that the support of f is contained in B̅. Let h be the function that is equal to f ∘π on and 0 elsewhere. This function is continuous and its support is contained in by construction. Using that the stabilizer of in (S,Σ) is also Γ, we calculate that for any q ∈, we have ∫_ h dθ_q = |Γ| f(q). We have ∫_B f dν = 1/|Γ|∫_ h dν̃ = 1/|Γ|∫_U_( ∫_L_y f ∘π dν_) dλ_0(y), which is what we wanted. In case the support of f is arbitrary, we pick a sequence ψ_n of uniformly bounded smooth functions with support contained in and that converge pointwise to 1_B, the indicator function of B, and we apply the previous computation to ψ_nf in place of f. We have ∫_B ψ_n f dν = ∫_U_( ∫_L_yψ_n f ∘π dν_) dλ(y). Passing to the limit using Lebesgue's dominated convergence, we obtain (<ref>). §.§ The special flat measures are horospherical In this subsection we prove Theorem <ref>, which gives us our first examples of horospherical measures. Namely we will show that the Masur-Veech measures on strata, and more generally, the special flat measures defined in (<ref>), are horospherical. Let be an invariant subvariety and let L be a lift of . In order to establish Theorem <ref>, we shall first establish that the measure m_L as in (<ref>) is horospherical. This will be achieved in Proposition <ref>. We need some preparatory results. We recall that the measure m_L is obtained by the cone construction applied to μ_L, i.e., for any Borel set A ⊂ L^(1), m_L(A) = μ_L(cone(A)), and the measure μ_L is itself obtained by integration of α = α_∧α_, where α_ and α_ are as in (<ref>). Let βι_Eα. By construction, β induces a volume form on L^(1) and we denote by μ_β the measure obtained by integration of β. The following relates the measure μ_β and the cone measure m_L. We have μ_β = () · m_L. The proof is an application of Stokes' theorem. It follows from (<ref>) that the Lie derivative of α with respect to the Euler vector field satisfies ℒ_E(α) = () ·α. Let U be an open set in L^(1) contained in one chart for the manifold structure on L. Notice that the only part of the boundary ∂cone(U) of cone(U) to which E is not tangent is U itself. In particular, the only part of ∂cone(U) on which ι_Eα does not vanish is U. We have from Stokes' formula (for manifolds with corners, see e.g. <cit.>) that ∫_cone(U) d(ι_E α) = ∫_∂cone(U)ι_Eα = ∫_U ι_Eα = μ_β(U). It follows from the Cartan formula that ℒ_E(α) = d ι_E α + ι_E d α. Since α is closed, we deduce that d ι_E(α)= ℒ_E(α). Gathering everything, we obtain () · m_L(U) = μ_β(U). This is true for all U as above, and these open sets generate the Borel σ-algebra on L^(1). We introduce two new vector fields E_ and E_ on : E_x() ∂/∂ t|_t=0[ e^t 0; 0 1 ]· and E_y() ∂/∂ t|_t=0[ 1 0; 0 e^t ]·. By definition we have E = E_x + E_y, and for any ∈, we have ∂/∂ t|_t=0 g_t · = E_x() - E_y(). For the proof of Theorem <ref>, we will also need the following calculation: The restrictions of the forms α_ and α_ to L^(1) satisfy ι_E (α_∧α_) = 2 (ι_E α_) ∧α_. Let n = (). We begin by observing that on restriction to L^(1), we have ι_(E_-E_)(α_∧α_)=0. Indeed, we deduce from (<ref>) that E_x-E_y is tangent to L^(1). In particular, since L^(1) has dimension 2n-1 (as a real vector space), any family of 2n-1 linearly independent vector fields that are tangent to L^(1) contain E_ - E_ in their span. This implies (<ref>). Now we calculate: ι_E(α_∧α_) = ι_2E_ - (E_-E_) (α_∧α_) (<ref>)= 2ι_E_(α_∧α_) = 2ι_E_α_∧α_ + (-1)^nα_∧ι_E_xα_. The last equality follows from the Leibniz formula for contractions ι_V(α∧β)=(ι_Vα)∧β+(-1)^( α)α∧ι_Vβ. Now, notice that E_ is tangent to the fibers of π_∘. Since α_ = (π_∘)^∗η_, we deduce that ι_E_α_ = 0. Similarly, we prove that ι_E_α_ = 0 and thus ι_E(α_∧α_) = 2ι_E_α_ = 2ι_Eα_. The measure m_L is horospherical. It follows from Lemma <ref> that m_L is given, up to a multiplicative constant, by integration of the differential form β = ι_E( α_∧α_). Lemma <ref> implies that β = 2 β_∧α_. Notice that both the forms β_ and α_ are basic, i.e., they are obtained by pullback of forms on 𝐏(V_) and V_ by the projections ∘π_' and ∘π_. Indeed, we have α_ = (∘π_)^∗η_y and using Lemma <ref>, we can build a differential form β_' on 𝐏(V_) such that (∘π_')^∗β_' = β_x. Now, let φ : → be a box in L^(1) and let f ∈ C_c(L). Notice that φ^∗α_ = η_ and φ^∗β_ = β_'. We have: ∫_ f ·β_∧α_ = ∫_ f ∘φ·β_' ∧η_ = ∫_U_( ∫_U_' ×{y} f ∘φ·β_' ) ·η_ = ∫_U_( ∫__y f ·β_) ·η_. If we let λ be the measure on U_ given by integration of the form 2/()·η_y, we obtain ∫_ f dm_L = ∫_U_( ∫__y f d) d λ(y). By definition, in order to prove that m_ is horospherical, we need to show that the lifts of m_ are horospherical. We recall from (<ref>) that the lifts of m_ are given by the m_L. Theorem <ref> is then a consequence of Proposition <ref>. §.§ The horocycle flow, real REL, and horospherical measures In this subsection we will show that the horocycle flow and the real Rel deformations move surfaces inside their horospherical leaf, and preserve horospherical measures. Horospheres and horospherical measures are horocycle flow-invariant. For ∈_m with () = (x, y) and s ∈, we have (u_s ) = (x + sy, y). This implies that the horocycle flow maps ^uu() to itself and since π is -equivariant, we deduce that horospheres are preserved by the horocycle flow. We also deduce from (<ref>) that the horocycle flow preserves the form α_. Since the horocycle flow commutes with the rescaling action, it also preserves the Euler vector field, from which we deduce that for any s ∈ we have u_s^∗ =. In particular, the horocycle flow preserves the measures ν_. Let ν be a horospherical measure and let s_0 >0. We claim that for any q ∈ such that the orbit segment {u_sq : s∈, |s| ≤ s_0 } is embedded, i.e., Uq is not a periodic horocycle orbit with period of length smaller than 2s_0, there is an open set ⊂ containing q such that for any compactly supported continuous function f with support contained in 𝒰 and any s ∈ with |s| ≤ s_0, we have: ∫_ f∘ u_s dν = ∫_ f dν. To see this, let ∈ be such that π()=q and define σ{ u_s : s ∈, |s| ≤ s_0 }. Let Γ be the stabilizer in (S,Σ) of . Since the -action on commutes with (S,Σ), the group Γ acts trivially on σ and since Uq is not a periodic orbit with period smaller than 2s_0, we have that that σ·γ∩σ = ∅ for any γ∈(S,Σ), unless γ∈Γ. By thickening σ, we can find a box ⊂π^-1() containing σ and up to replacing with ∩_γ∈Γ·γ, we can assume that is regular. By construction, for any s ∈ with |s| ≤ s_0, the surface u_sq belongs to B = π() and lies on the plaque of q. Since the horocycle flow acts continuously, there is a neighborhood ⊂ around q such that for any ' ∈π^-1() ∩ and |s| ≤ s_0, we have u_s ' ∈. Let λ be a transverse measure on U_, i.e., a measure as in (<ref>), and let f be a continuous function with support contained in 𝒰. It follows from (<ref>) that ∫_ f ∘ u_s d ν = ∫_U_( ∫_L_y f ∘ u_s∘π d ν_) dλ(y) = ∫_U_( ∫_L_y f ∘π d u_s_∗ν_) dλ(y) = ∫_U_( ∫_L_y f ∘π d ν_) dλ(y) = ∫_ f dν. The second equality follows from the fact that π is -equivariant and the fact that for any y ∈ U_, the action of u_s maps supp(f ∘π) ∩L_y inside L_y, which in turns is implied by our choice of and the fact that the horocycle flow maps the leaves of ^uu into themselves. For any f ∈ C_c(), define s_f inf{s >0 : supp(f) contains a periodic surface of period s }. It is easy to see that s_f is always positive, and using the first part of the proof together with a partition of unity argument, we can show that (<ref>) holds for f and s ∈ with |s| ≤ s_f. Furthermore, notice that for any s ∈, we have s_f = s_f ∘ u_s. Writing s=ks' with k ∈ℕ and |s'| ≤ s_f, we obtain ∫_ f ∘ u_s dν = ∫_ f ∘ u_(k-1)s' dν = ⋯ = ∫_ f dν. This proves that ν is horocycle flow-invariant. For any irreducible invariant subvariety , we let Z_ V ∩ Z, where V is the model space of any lift of π^-1(). Notice that the space Z_ actually does not depend on the choice of particular lift. This is a consequence of Proposition <ref> together with with the fact that (S,Σ) acts trivially on (). Let v ∈ Z_, q ∈, and suppose _v(q) is defined. Then _v(q) ∈ W^uu(q). If ν is a horospherical measure and _v(q) is defined for ν-a.e. q, then ν is invariant under the (almost everywhere defined) map q ↦_v(q). Let Z^(q) be as in (<ref>). Since Z_⊂ V, where V is the subspace that is modeled on, we have _v(q) ∈ if q ∈ and v ∈ Z_∩ Z^(q). The only properties of the horocycle flow which were used in the proof of Proposition <ref> are that u_s_0 preserves the horospheres, and acts on them by translations. The same properties are valid for the action of _v for v ∈ Z_. Indeed, _v sends surfaces of area one to surfaces of area one, and if () = (x,y) then (_v ) = (x + v , y). If a measure μ on is saddle-connection free, then for μ-a.e. q ∈, _v(q) is defined for every v ∈ Z_, and satisfies the `group law' property ∀ v_1, v_2 ∈ Z_, _v_1( _v_2(q) ) = _v_1+v_2(q). Following <cit.>, we say that an irreducible invariant subvariety is of rank one if ((V))=2, where V is the model space of any lift of π^-1(). In the rank one case we have the following converse to Propositions <ref> and <ref>: If is an invariant subvariety of rank one and μ is a saddle connection-free measure, then μ is horospherical if and only if it is invariant under the horocycle and the real Rel flows. By a dimension count, we see that when has rank one, the dimension of horospheres is the same as (Z_)+1. This means that the horosphere W^uu(q) satisfies W^uu(q) = {_v(u_sq): s ∈, v ∈ Z_}, that is the group action generated by the horocycle flow and real Rel acts transitively on the horospheres. As we saw in the proofs of Propositions <ref> and <ref>, this action is by translations, with respect to the affine structure on W^uu(q) afforded by Lemma <ref>. Since the measures ν_β_ are the unique (up to scaling) translation-invariant measures on the affine manifolds L^(1), the invariance of μ under the horocycle and real Rel flows implies that the conditional measures on the plaques in a box are given by ν_β_. §.§ Further properties Let X be a manifold with a foliation, and a Borel measure μ. We say that μ is ergodic for the foliation if any Borel subset A which is a union of leaves satisfies either μ(A)=0 or μ(X A)=0. For instance we have: The special flat measure on an invariant subvariety is ergodic for the horospherical foliation. This follows from Proposition <ref> and the ergodicity of the special flat measure with respect to the U-action. Denote by 𝒫^(uu)() the collection of horospherical measures on with total mass at most one. The following standard results in ergodic theory are valid in the context of horospherical measures: For the horospherical foliation on any invariant subvariety ^(1), we have: * The space 𝒫^(uu)(), with the weak-* topology, is a compact convex set. * A horospherical probability measure is ergodic if and only if it is an extreme point of 𝒫^(uu)(). * For any probability measure μ∈𝒫^(uu)() there is a probability space (Θ, η) and a measurable map Θ→𝒫^(uu)(), θ↦ν_θ, such that ν_θ is ergodic and a probability measure for η-a.e. θ, and μ = ∫_Θν_θ dη(θ). * If μ_1, μ_2 ∈𝒫^(uu)() such that μ_1 ≪μ_2, and μ_2 is ergodic, then μ_1 = cμ_2 for some c ≥ 0. It is clear from definitions that if μ_1, μ_2 ∈𝒫^(uu)(), and α∈ (0,1), then αμ_1 +(1- α)μ_2 ∈𝒫^(uu)(). It is also clear that condition (<ref>), and the condition μ() ≤ 1, are both closed conditions. This proves the first assertion. The remaining assertions follow from Choquet's theorem by standard arguments, see e.g. <cit.>. We say that two surfaces q, q' ∈ are horizontally equivalent if there is a homeomorphism M_q→ M_q' of the underlying surfaces, that preserves the labels of singularities and maps the horizontal saddle connections of M_q bijectively to those of M_q'. Note that a horizontal equivalence only preserves certain horizontal structure. It preserves saddle connections but need not preserve the horizontal foliation. Any two surfaces in the same horospherical leaf are horizontally equivalent. It suffices to show this upstairs; that is, we let , ' ∈_m with ' ∈^uu(), let f: S → M_q and f': S → M_q' be marking maps representing , ' and show that f' ∘ f^-1 gives a bijection of horizontal saddle connections. We first discuss ' ∈^uu() which are sufficiently close to . Let f: S → M_q be a marking map representing and let σ_1, …, σ_r be the horizontal saddle connections on M_q. Using a neighborhood 𝒰_τ corresponding to a fixed triangulation τ of S, we see that there is a neighborhood 𝒰 of such that for any surface ' ∈𝒰, represented by f': S → M_q', the paths f'∘ f^-1(σ_i) are represented by saddle connections on M_q'. Furthermore, if ' ∈𝒰∩^uu() then these paths are horizontal saddle connections, so that f' ∘ f^-1: M_q → M_q' is a homeomorphism mapping the horizontal saddle connections of M_q injectively to horizontal saddle connections on M_q'. Now choose _max∈^uu() so that it has the maximal number of horizontal saddle connections. We will show that the set 𝒱 of surfaces in ^uu() which are horizontally equivalent to _max is open and closed, and this will conclude the proof. By the preceding discussion, 𝒱 is open in ^uu(). Furthermore, if _n →_∞ is a convergent sequence of surfaces in ^uu(), with _n ∈𝒱, then the horizontal saddle connections on the surfaces M_q_n have length bounded uniformly from above and below, and so converge to paths on M_q_∞ which are represented by horizontal saddle connections or by finite concatenations of horizontal saddle connections. Thus _∞ has at least the same number of saddle connections as _max, and so, by maximality, _∞∈𝒱. This completes the proof. From Proposition <ref> we deduce: If ν is an ergodic horospherical measure then there is a subset ' ⊂ of full ν-measure such any two surfaces in ' are horizontally equivalent. In <cit.>, using boundary marked surfaces, topological horizontal equivalence is introduced. In this definition the homeomorphism M_q → M_q' is required to preserve additional structure, e.g. the angular differences between saddle connections at each singular point. Proposition <ref> and Corollary <ref> hold for this finer notion of equivalence as well. § SADDLE CONNECTION FREE HOROSPHERICAL MEASURES In this section we will prove Theorem <ref>. We first state and prove some auxiliary statements. §.§ The Jacobian distortion in a box The different plaques in a box can be compared to each other using the structure of a box. Namely, let φ: →⊂ L^(1) be a box. For any point y ∈ U_ we define φ_y: U'_→_y, φ_y([x] ) φ([x],y), where _y is the plaque of y in (see Definition <ref>). For any two points y_0 and y_1 in U_, the map φ_y_0,y_1φ_y_1∘φ_y_0^-1 is a diffeomorphism between the plaques _y_0 and _y_1 in B, identifying points parameterized by the same point in U'_. Define δ_y_1 : _y_0→, δ_y_1 ( ) ⟨ x_, y_1 ⟩^-(), where x_ = π_∘(). The diffeomorphism φ_y_0,y_1 is not measure preserving. Instead, we have the following: (Jacobian calculation) For any two points y_0, y_1 ∈ U_ we have (φ_y_0,y_1)^∗(|__y_1) = δ_y_1·(|__y_0). For any y ∈ U_, write L̅_y π_∘ (_y), where π_ is the projection in (<ref>). Then L̅_y is an open subset of an affine hyperplane in V_, which is a translate of {x ∈ V_: ⟨ x, y ⟩ =0}. By Definition <ref> the map F: L̅_y →_y, F(x ) φ([x], y) is a diffeomorphism with inverse π_∘. We denote by e_ the Euler vector field on V_. Notice that F^* β_ is the restriction to L̅_y of ι_e_η_. Indeed, we calculate F^* β_ = F^* ι_E (π_∘^* η_) = F^* (π_∘) ^* (ι_e_η_) = ι_E_ (η_). The map F gives a chart of _y in which β_ is ι_e_η_. We shall perform our calculation in these charts and verify (<ref>) in L̅_y instead of L_y. Let y_0, y_1 ∈ U_, and set h: L̅_y_1→, h(x) 1/⟨ x, y_1 ⟩. The map φ_y_0, y_1 : L_y_0→ L_y_1 is expressed in charts simply as the map φ̅_y_0, y_1: L̅_y_0→L̅_y_1, φ̅_y_0, y_1(x) = h(x) x. This implies by the multivariable product rule that (D φ̅_y_0, y_1)_x(v) = h(x) v + (Dh)_x(v) x. Hence, for v_1, …, v_d-1 in the tangent space to L̅_y_0 at x, denoting n = () we have: ((φ̅_y_0, y_1)^* ι_e_η_x )_x (v_1,… , v_d-1) = (ι_e_η_x)_φ̅_y_0, y_1(x)(D_xφ̅_y_0, y_1(v_1), …, D_xφ̅_y_0, y_1(v_d-1) ) = (η_)_h(x)x (h(x)x, h(x)v_1 + D_xh(v_1) x, …, h(x)v_d-1+ D_xh(v_d-1) x) = (η_)_h(x)x (h(x)x, h(x)v_1,…,h(x)v_d-1 ) =h(x)^n (ι_e_η_)_x(v_1,…,v_d-1). This is Formula (<ref>). Notice that for any y_0,y_1 ∈ U_ and [x] ∈ U_', we have δ_y_1∘φ_y_0([x]) = ( ⟨ x, y_0⟩/⟨ x, y_1⟩)^(). This leads us to define the distortion of as follows: δ_sup{|1 - (⟨ x, y_0 ⟩/⟨ x, y_1 ⟩) ^d | : [x] ∈ U'_, y_0, y_1 ∈ U_}. The quantity ⟨ x, y_0⟩/⟨ x, y_1⟩ has the following geometric interpretation. The points φ([x],y_0) and φ([x],y_1) are in the same weak stable leaf, and this leaf is further foliated by strong stable leaves. The geodesic flow maps a given weak stable leaf to itself, permuting the strong stable leaves inside it. The choice t = log(⟨ x, y_0⟩/⟨ x, y_1⟩) is the value of t∈ for which g_t maps φ([x], y_0) to the strong stable leaf of φ([x], y_1). The distortion can be used to bound the variation of the mass of the horospherical plaques of with respect to the measures ν_. Indeed, by an easy change of variables, using φ_y_0,y_1 we have | (_y_1) - (_y_0) | ≤δ_ (_y_0). From this it follows that | (_y_1)/(_y_0) - 1 | ≤δ_. The distortion of a box is well-behaved with respect to the geodesic flow. For t ∈ and any in π^-1(), we write _t g_t() and B_t π(_t). Let be a box in π^-1(). Then _t is a box with δ__t = δ_ and it is regular whenever is. Let φ: U'_× U_→ L^(1) be the parametrization of , where L is an irreducible component of π^-1() and let U̅_ be the image of U_ under multiplication by e^-t, and let φ̅ ([x], y) g_t ∘φ ([x], e^ty). Using the fact that the geodesic flow preserves the splitting into stable and horospherical foliation, and acts on V_ by multiplication by e^-t, we see that φ̅: U'_×U̅_→ L^(1)_1 is a parameterization of _t as in Definition <ref>. Also, for i=0,1, if ([x], y̅_i) ∈ U'_×U̅_, where y̅_i = e^-ty_i, then ⟨ x, y̅_0 ⟩/⟨ x, y̅_1 ⟩ = ⟨ x, y_0 ⟩/⟨ x, y_1 ⟩. This implies that the distortion of is the same as the distortion of _t. The last statement simply follows from the fact that the actions of and (S,Σ) commute. §.§ Thickness of a box We now introduce the notion of the thickness of a box. To define this quantity we use the sup-norm Finsler metric of <ref> to induce a distance function on leaves of the stable foliation. We rely on work of Avila and Gouezel <cit.>, who defined a similar distance function on the leaves of the strong stable foliation. For a subset of a stable leaf, we denote by diam^(s) its diameter with respect to the distance function dist^(s). We define the thickness of the box as τ_[x] ∈ U'_supdiam^(s) φ( {[x]}× U_) ; that is, the maximal diameter of a plaque for the stable foliation. We will need boxes whose thickness is also well-behaved under the geodesic flow. Similarly to Proposition <ref>, we have: For any >0 and any ∈π^-1(^(1)), there is a regular box in π^-1() containing such that for any t≥ 0, τ__t≤. In the thickness discussion we would like to know that under the forward geodesic flow lengths of paths in the leaves of the weak stable foliation do not grow when we apply the geodesic flow. AG prove this for the strong stable foliation. (Recall the confusing notation remark.) We also know (AG) that the lengths of geodesic paths do not grow. To connect two points in a weak stable leaf we can concatenate a weak stable path and a geodesic path. The length of this path is an upperbound for distance. If our boxes have controlled diameter in both the strong stable direction and the geodesic direction we can show that the lengths of weak stable paths do not grow under the geodesic flow. Observe that the “geodesic width" is bounded by |log⟨ x, y_0 ⟩/⟨ x, y_1 ⟩| (see previous “geometric interpretation") so in fact we have already bounded it in the discussion giving a bound for δ. Connection between d^s and d: d≤ d^s and if both are small they are comparable in size for points in the strong stable manifold. It follows from AG Prop. 5.3 that distance less than 1/25 implies distortion less than 2. add the above discussion to the proof of Prop. 4.2. Let L be a lift of that contains and let Γ be the stabilizer in (S,Σ) of . Since (S,Σ) acts properly discontinuously on , there is a neighborhood containing such that for any γ∈(S,Σ), either ·Γ∩ = ∅ or γ∈Γ. By Lemma <ref>, let ⊂ be a box containing and let φ̅ : U̅'_×U̅_→ be the parametrization of . Let () = (x_0, y_0), let Û'_ be a neighborhood of [x_0] whose closure is contained in U̅'_, and let 𝐂φ_1(Û'_×{y_0}). That is, 𝐂 is a bounded subset of a horospherical leaf, contained in a plaque of , and with closure in the interior of . Let _1 ∈ (0, /4) be small enough so that 𝐂_1 ⋃_|t| ≤_1g_t (𝐂) ⊂, and let _2 ∈(0, /4) such that 𝐂_2 ⋃__1 ∈𝐂_1{_2 ∈^ss(_1) : dist^(ss)(_1, _2) < _2 } is contained in . Such numbers _1, _2 exist because 𝐂 is bounded, and 𝐂_2 contains a neighborhood of . We can therefore let U'_⊂Û'_ and U_⊂U̅_ be small enough open sets so that = φ̅ (U'_× U_) contains and is contained in 𝐂_2. Since is contained in , we may replace by ∩_γ∈Γ·γ and we can assume that is regular, with stabilizer Γ. For ∈, let ^s() be the plaque through for the weak stable foliation, that is, the connected component of in ∩^s(). For each _2 ∈ there is a point _0, which is the unique point in the intersection 𝐂∩^s(_2), and a path from _0 to _2 which is a concatenation of two paths γ_1 and γ_2. The path γ_1={g_t_0 : t ∈ I } from _0 to _1 goes along a geodesic arc, where I is an interval of length at most _1. The path γ_2 from _1 to _2 has sup-norm length at most _2 and is contained in ^ss(_2). Since _1, _2 < /4, each point in any stable plaque in is within distance at most /2 from the unique point at the intersection of this plaque with 𝐂, where the distance is measured using the distance function dist^(s). Concatenating such paths we see that the diameter of any stable plaque in is at most , and this implies the same bound for stable plaques in B. That is, the thickness of B is less than . By Proposition <ref>, the lengths of geodesic paths and of paths in strong stable leaves, do not increase when pushed by g_t for t ≥ 0. Thus the same argument (using the pushes of γ_1 and γ_2 by g_t) give the required upper bound on the thickness of _t. For a compactly supported continuous function f on , we denote by ω_f its continuity modulus with respect to the sup-norm distance function. That is, ω_f(t) →_t → 0+0 and |f(q_1) - f(q_2)| ≤ω_f(dist(q_1, q_2)) for any q_1, q_2 ∈. The following key lemma says that for any horospherical measure ν, any regular box and any test function f, the integral of f with respect to ν|_B can be approximated by the integral of f ∘π with respect to on any one horospherical plaque of , provided that has small distortion and small thickness. We recall that B ⊂ is defined as the image of by π. Let ν be a horospherical measure, let f ∈ C_c (^(1)) and let be a regular box such that ν(B)>0. Then for any y ∈ U_, | 1/ν(B)∫_B f dν - 1/(_y)∫__y f ∘π d| ≤ω_f(τ_) + 2f_∞δ_. For y, y'∈ U_, let φ_y, y' : _y →_y' be as in <ref>. On the one hand, for any y' ∈ U_ we have | ∫__y' f ∘π d - ∫__y' f ∘π∘φ_y',y d| ≤∫__y'| f ∘π -f ∘π∘φ_y',y| d ≤ω_f(τ_)(_y'). The second inequality follows from the fact that, by definition of the thickness, for any [x] ∈ U'_, the distance between the points φ([x]) and φ(φ_y',y([x])), with respect to the distance function dist^(s), is at most τ_ and thus also with respect to the distance function dist, together with the fact that π is a contraction. On the other hand, by the definition of δ_, we have: | ∫__y' f ∘π∘φ_y',y d - ∫__y f ∘π d| = | ∫__y f ∘π dφ_y,y'^∗ - ∫__y f ∘π d| ≤f_∞δ_(_y). The last inequality follows from Proposition <ref> and the definition of δ_B. Using equation (<ref>) we deduce that for any y,y'∈ V_, | 1/(_y')∫__y' f ∘π d - 1/(_y)∫__y f ∘π d| ≤ω_f(τ_) + 2f_∞δ_. Let y_0 ∈ U_ and let λ be a measure on U_ as in (<ref>). Notice that ν(B) = ∫_U_(_y) dλ(y). Therefore | 1/ν()∫_ f dν - 1/(_y_0)∫__y_0 f ∘π d| ≤ | 1/ν()∫_U_( ∫_L_y f ∘π d) dλ(y) - 1/(_y_0)∫__y_0 f ∘π dν_| ≤ 1/ν(B)∫_U_(_y) | 1/(_y)∫__y f ∘π d - 1/(_y_0)∫__y_0 f ∘π d| dλ(y) ≤ ω_f(τ_) + 2f_∞δ_. §.§ Mixing of geodesics, nondivergence of horocycles We recall the following useful results: For any ε>0 and c>0 there is a compact K ⊂^(1) such that for any q ∈^(1), one of the following holds: * T →∞liminf 1 /T∫_0^T 1_K(u_s q) ds> 1 - ε (where 1_K is the indicator of K). * The surface q has a horizontal saddle connection of length smaller than c. Lemma <ref> will be used at several places in this text. The first fact we deduce from it is the following: Let ν be a saddle connection free horospherical measure and let δ>0. Then there is a regular box ⊂π^-1(), a constant c>0 and an unbounded increasing sequence of times t_i such that: * For all i ≥ 0, ν(_t_i) > cν (), where _t_i = π(_t_i). * Both the thickness and distortion of each _t_i are smaller than δ. In particular it follows from (a) that ν is finite. Let K be a compact subset as in Lemma <ref> for ε = 1/2, c=1, and denote ν_t (g_-t)_∗ν. By Proposition <ref>, ν is U-invariant, and since g_t normalizes U, the same holds for ν_t. An application of a generalisation of the Birkhoff ergodic theorem for locally finite measures (see <cit.> for a general formulation) to the function 1_K shows that there is a function f ∈ L^1(ν_t) such that f_L^1(ν_t)≤1_K_L^1(ν_t) = ν_t(K) and for ν_t-almost every q ∈^(1), 1/T| { s ∈ [0,T] : u_s q ∈ K}| T →∞⟶ f(q). Since the {g_t}-action preserves the property of having horizontal saddle connections, ν_t is also saddle connection free and thus by Lemma <ref>, we have almost surely f(q)>1/2. As a consequence, ν_t(K) ≥∫_ f dν_t >ν_t()/2. For every δ>0, using Proposition <ref>, K ∩^(1) can be covered by the image by π of regular boxes _1, …, _N whose distortion is smaller than δ, and for which the thickness of g_t(_j) is smaller than δ, for each j and each t ≥ 0. By Lemma <ref>, the distortion of g_t(_j) is also less than δ for each j and each t ≥ 0. Let c 1/2N. For each t, there is j=j(t) ∈{1, …, N} such that ν_t(B_j ) ≥ν_t(K) /N> c ν_t(). Let t_i →∞ be a sequence along which j = j(t_i) is constant. Then <ref> and <ref> hold for = _j. For any invariant subvariety , the geodesic flow is mixing with respect to the special flat measure on ^(1). For a proof and detailed discussion of this result and its quantitative strengthenings, see <cit.> or <cit.>. §.§ Putting it all together We have gathered all the ingredients needed to give the proof of our main result. Let ν be a horospherical measure. We assume first that ν is ergodic for the horospherical foliation. We will show that the special flat measure m_ is absolutely continuous with respect to ν. To see this, let A be a Borel set of positive measure for m_. Since m_ is a Radon measure, in particular inner regular, there is a compact K contained in A such that m_(K) > 0. Let U be an open set that contains A and let f:^(1)→ [0,1] be a continuous function whose support is contained in U and that evaluates to 1 on K. Such a function exists by Urysohn's Lemma. Let ε >0, and choose δ>0 so that ω_f(δ) + 2f_∞δ < . By Lemma <ref>, there is c>0, a regular box and t_i →∞ such that for each i, τ__t_i < δ and δ_ < δ, and ν(B_t_i) ≥ c ν (). Applying Lemma <ref> to both ν and m_ we obtain | 1/ν(B_t_i)∫__t_i f dν -1/m_ (_t_i)∫_B_t_i f dm_| <2ε. By mixing of the geodesic flow with respect to m_, there is i>0 large enough such that m_(B_t_i∩ K) > m_(B) (m_(K) - ε). Therefore: ν(U)/c ν(^(1))≥ ν(U)/ν(_t_i)≥1/ν(_t_i)∫__t_i f dν > 1/m_(_t_i)∫__t_i f dm_ - 2ε ≥ m_(_t_i∩ K)/m_(_t_i) -2ε > m_(K)-3ε. Since ε was chosen arbitrarily, we have proven ν(U) ≥ c ν () m_(K). We deduce by inner regularity of the measure ν that ν(A) is positive. This completes the proof that m_≪ν. It follows from Proposition <ref> that m_ = cν for some c ≥ 0, and since m_ is nonzero, c>0 and ν = 1/c m_. For general ν, we obtain from the case just discussed that all the ergodic components of the measure ν are proportional to the special flat measure and thus ν itself is proportional to the special flat measure. § EXAMPLES OF HOROSPHERICAL MEASURES The simplest example of a horospherical measure which is not the special flat measure occurs when is a closed -orbit. In this case the leaves of the horospherical foliation are the U-orbits, and the length measure on a closed periodic U-orbit is a horospherical measure; indeed, in this case, the transverse measure λ in (<ref>) is atomic. In order to obtain more complicated examples, we use the following: Let W^uu(q) be a closed horosphere in . Then W^uu(q) is the support of a horospherical measure ν whose lifts are the measures ν_,^L where L is a lift of and π() = q. The horosphere W^uu(q) is closed if and only the collection {^uu() } is locally finite, where ranges over π^-1(q) and L ranges over the lifts of that contain . Each of the ^uu() carries the Radon measure ν_,^L and the measure ν̃∑ν_,^L is a (S,Σ)-invariant Radon measure on π^-1(). Let ν be the Radon measure on whose lift is ν̃ (see Proposition <ref>). The measure ν is horospherical by construction. To construct an example of a closed horosphere, we use horizontally periodic surfaces, i.e., surfaces which can be represented as a finite union of horizontal cylinders. Let = ℋ(1,1). This stratum is an invariant subvariety of dimension 5, and thus its horospherical leaves have real dimension 4. Let a,b be real numbers with a, b ∈ (0,1) and 0 < b < min(a, 1-a), let τ_1, τ_2 ∈𝕊^1 /ℤ, and set τ̅_1 aτ_1 and τ̅_2 (1-a)τ_2, so that τ̅_1, τ̅_2 take values in circles of circumference a, 1-a respectively. Define the surface q=q_a,b, τ_1, τ_2∈ by the polygonal representation shown in Figure <ref>. In the horizontal direction it is comprised of two cylinders, each of height 0.5, and of areas 0.5a and 0.5(1-a). The parameters τ_1, τ_2 are called twist parameters. Changing them by adding an integer amounts to performing the corresponding number of Dehn twists in the two cylinders, and thus does not change the surface q. It is clear that varying the parameters a, b, τ_1, τ_2 results in surfaces that belong to the horospherical leaf of q, and thus, by a dimension count, they locally parameterize the leaf of q. In either of the cases b→ 0, b →min(a, 1 a), the surface q_a,b, τ_1, τ_2 has shorter and shorter horizontal saddle connections on the boundaries of the cylinders, and thus exits compact subsets of ^(1). This means that the horosphere W^uu(q) is closed and that the map 𝕊^1 ×𝕊^1 ×{(a,b) ∈ (0,1)^2 : 0< b < min(a, 1-a)}→^(1) (a,b,τ_1, τ_2) ↦ q_a,b,τ_1, τ_2 is a proper homeomorphism onto W^uu(q). It can be checked that in this case the map (a,b, τ̅_1, τ̅_2) ↦(q_a,b,τ_1, τ_2 ) is affine in charts. Thus the horospherical measure can be written explicitly (up to scaling) as dν(q_a,b,τ_1, τ_2) = da db dτ̅_1 dτ̅_2. For the horospherical measure constructed in the preceding example, the space Z_ (defined in (<ref>) is one dimensional, and for every surface q in the support of this measure, Z^(q) (defined in (<ref>)) is a bounded interval. Moreover, for any v ∈ Z_ there is a positive measure set of surfaces q (with small values of a) for which _v(q) is not defined. This shows that the hypothesis in Proposition <ref>, that _v(q) is defined, is not always satisfied. It is no coincidence that the closed horopsheres in the two preceding examples consist of horizontally periodic surfaces. For any and any q ∈, the surface M_q is horizontally periodic if and only if W^uu(q) is closed. In this case every surface in W^uu(q) is horizontally periodic, and the horospherical measure on W^uu(q) constructed in Proposition <ref> is finite. Suppose first that M_q is horizontally periodic, and let f: S → M_q be a marking map representing ∈π^-1(q). Let C_1, …, C_s be the horizontal cylinders on M_q, and let c_j, h_j denote respectively the circumference and height of C_j. Since the area of M_q is one, ∑_j=1^s c_j h_j =1. Let α_1, …, α_r, α_r+1, …, α_s ∈ H_1(S, Σ) be a generating set satisfying the following: * The collection {f(α_i): i =1, …, r+s} consists of saddle connections. * {f(α_i): i = 1, …, r}, are all the horizontal saddle connections on cylinder boundaries, and are oriented from left to right. * For j = 1, …, s, f(α_r+j) is contained in C_j, connects one boundary component of C_j to the other, and is oriented from bottom to top. Write the holonomies (M_, α_i) as (M_, α_i) = (t_i, 0) i =1, …, r (M_, α_j) = (τ_j, h_j) j=1, …, s. For each j and each boundary component of C_j, we have ∑_i ∈ℐ t_i = c_j, where ℐ is a subset of {1, …, r} containing the saddle connections comprising the boundary component. The numbers t_i, h_j, τ_j also satisfy some linear equations L_1, …, L_t, which describe the space that L is modeled on, in a neighborhood of . Let ' ∈^uu(). We first show that the underlying surface M_q' is horizontally periodic. There is a continuous path σ↦(σ), with (0) = and (1)=', such that (σ) ∈^uu() for every σ∈ [0,1]. By definition of the horospherical foliation, for any σ∈ [0,1], ((σ)) - () ∈ H^1(S, Σ; _). That is to say, there are t_1(σ), …, t_r(σ), τ_1(σ), …, τ_s(σ) ∈ such that (<ref>) holds for (σ). Note that h_j is independent of σ, that the numbers t_i(σ), h_j, τ_j(σ) also satisfy the equations L_1, …, L_t, and that the numbers c_j(σ) defined by (<ref>) also satisfy (<ref>). Assume first that t_i(σ)>0 for all σ∈ [0,1] and i ∈{1, …, r}. For each j ∈{1, …, s}, the set {σ∈ [0,1] : the curve α_r+j crosses a horizontal cylinder on (σ) } is open (this is a general property of cylinders, see e.g. <cit.>) and closed (since the heights h_j are fixed). Therefore, by a connectedness argument, ' is also made of s horizontal cylinders. By (<ref>), these cylinders occupy the entire area of (σ), and thus (σ) is horizontally periodic. Now if (<ref>) fails, let σ_min be the smallest value of σ for which it fails. When σ increases to σ_min from below, the surfaces (σ) have shorter and shorter horizontal saddle connections on the boundaries of cylinders, and this means that the surfaces (σ) cannot converge to (σ_min). This shows that (<ref>) holds and proves that all surfaces in ^uu() are horizontally periodic. As long as there are numbers c'_i satisfying (<ref>), and numbers t'_i>0 satisfying the equations (<ref>) (with c_i, t_i replaced by c'_i, t'_i), there is a surface M_' made of s cylinders with circumferences c'_j, heights h_j, glued in the same way that they are glued on M_. Clearly we then have ' ∈^uu(). Florent asks whether injectivity of the developing map is implicitly being used here. Also there are more equations coming from that are missing. The set of parameters t_i, τ_j giving surfaces in W^uu(q) is bounded. Indeed, the c_i defined by (<ref>) are bounded by (<ref>), and this implies that the numbers t_i ∈ (0, max_j c_j) are bounded. Changing the τ_j by adding an integer multiple of c_j amounts to performing Dehn twists in the cylinder C_j and does not change the projection of the surface to . That is, the numbers τ_j can be taken to lie in the bounded set [0, c_j ). Also, as the parameters t_i leave compact subsets of the bounded domain described above, at least one of the horizontal saddle connections on the corresponding surface has length going to zero. This implies that the bounded set of surfaces we have just described by varying the parameters t_i, τ_j projects to the entire leaf W^uu(q), that this leaf is properly embedded, and that all surfaces in this leaf are horizontally periodic. Furthermore, we can use (<ref>) to express c_1 as a function of c_2, …, c_s (a constant function when s=1), and using the linear equations defining L, we can write some of the variables c_j, τ_j, t_i as linear combinations of a linearly independent set of variables. We can then write the horospherical measure up to scaling as dν(q) = ∏_j=𝒥_1 dc_j ∏_j∈𝒥_2 dτ_j ∏_i ∈𝒥_3 dt_i, for some subsets of indices, and thus the preceding discussion shows that the total measure of the leaf is bounded. Now suppose that M_q is not horizontally periodic. According to <cit.>, the horocycle orbit Uq consists of surfaces that are not horizontally periodic, but there is q' ∈Uq such that M_q' is horizontally periodic. By Proposition <ref>, Uq ⊂ W^uu(q), and thus q' ∈W^uu(q). Since M_q is not horizontally periodic, according to the first part of the proof, q' ∉ W^uu(q). This shows that the leaf W^uu(q) has an accumulation point that is not contained in the leaf, which is to say that W^uu(q) is not closed. §.§ Classification of horospherical measures in the eigenform loci in (1,1) The stratum (1,1) contains a countable collection of complex 3-dimensional invariant subvarieties known as eigenform loci. This terminology is due to McMullen, who gave a complete classification of these invariant subvarieties in a sequence of papers (see <cit.> and references therein), following the first such examples discovered by Calta <cit.>. The horocycle invariant measures and orbit-closures for the U-action on an eigenform locus, were classified in <cit.> (these classification results require Theorem <ref> of the present work). We can classify the horospherical measures inside eigenform loci as follows: Let be an eigenform locus in (1,1), and let ν be an ergodic horospherical measure on . Then either ν is the special flat measure m_ or ν is the measure given by Proposition <ref> on a closed horosphere W^uu(q) of a horizontally periodic surface q ∈. If ν is saddle connection free then it is the special flat measure by Theorem <ref>, and by Proposition <ref>, ν is supported on a properly embedded leaf if and only if ν is supported on horizontally periodic surfaces. The only remaining possibilities are that for a set of positive measure, surfaces have one horizontal saddle connection or a horizontal slit, corresponding to cases (3), (4) or (6) of <cit.>. We assume that such a horospherical measure ν exists, and we will reach a contradiction. By Corollary <ref>, each of the conditions (3), (4), (6) is invariant under the horospherical foliation and so by ergodicity, one of these cases holds for ν-a.e. surface. Let f: supp ν→_+ be the function that assigns to a surface the length of a horizontal saddle connection (note that in case (3) there is a unique horizontal saddle connection and in cases (4) and (6) there are two of equal length). Let _t f^-1(t), _c ≤ c' f^-1([c,c']), and let c'> c>0 such that ην(_c ≤ c')>0. Let K ⊂(1,1) be the compact set given by Lemma <ref>, corresponding to c and to 1/2. The U-action preserves the lengths of horizontal saddle connections, and thus preserves _c ≤ c'. The U-action also preserves ν, by Proposition <ref>. We claim as in the proof of Lemma <ref> that ν(K ∩_c ≤ c') ≥η/2 (and in particular η is finite). Indeed, defining ν' ν|__c ≤ c', we have by the Birkhoff ergodic theorem that for ν'-a.e. x, 1/T∫_0^T 1_K(u_sx) ds ⟶_T →∞ f(x), where f is a function satisfying f_L^1(ν')≤1_K_L^1(ν') = ν(K ∩_c ≤ c'). By Lemma <ref> we have f(x) ≥1/2 whenever the limit in (<ref>) exists, and this gives (<ref>). Now note that by Proposition <ref>, ν is invariant under Rel deformations. In our context there are Rel deformations which increase the lengths of saddle connections by an arbitrary fixed number. This implies that for every s>0, ν(_c ≤ c') = ν(_c+s ≤ c'+s) . Repeating the arguments by which we obtained (<ref>) we obtain for every s>0, ν(K ∩_c+s ≤ c'+s) ≥η/2. For s >c'-c, and j ∈, the sets _c+js ≤ c'+js are disjoint. This implies that ν(K) ≥∑_j=1^∞ν(K ∩_c+js ≤ c'+j s) = ∞, contradicing the fact that ν is a Radon measure. §.§ A further example in (2) Since there is currently no classification of horospherical measures in (2), it is of interest to give examples. In this subsection we construct an ergodic horospherical measure which is not the special flat measure and is not supported on one properly embedded horospherical leaf. Its support is contained in the four-dimensional invariant subvariety = (2), the genus two stratum consisting of surfaces with one singular point of order two. Recall from Corollary <ref> that for a given ergodic horospherical measure, almost all surfaces are horizontally equivalent. In Figure <ref> we show a typical surface q for our horospherical measure, and a typical topological picture of its horizontal saddle connections. These saddle connections will be denoted by δ and δ'. They disconnect the surface into a horizontal cylinder C, shaded gray in Figure <ref>, and a torus T. Let x be the length of δ and δ', let η be a saddle connection passing from top to bottom of the cylinder C, and let its holonomy be (a, τ). Fix ∈π^-1(q). The height of C is constant and equal to a in a neighborhood of in ^uu(). The area of C is ax, and hence 0< x < 1/a. Moreover, changing τ by an integer multiple of x amounts to performing a Dehn twist in C so does not change the surface M_q. Thus we may take τ∈ [0, x). When varying surfaces within their horospherical leaves, we change horizontal components of all saddle connections, and thus changing τ and x we stay in the horospherical leaf. Similarly, by Proposition <ref>, u_s'q ∈ W^uu(q) for every s'. Moreover, if M_q=C ∪ T as above, the surface u^(T)_s M_q obtained by performing the horocycle flow on T and leaving C unchanged is also in W^uu(q). It is easy to check that changing the three parameters x,τ, s gives a linear mapping in period coordinates, and that the three corresponding tangent directions in directions in T_q() are linearly independent. Since ()=4, the dimension of the horospherical leaves in is three, so the variables x, τ, s give an affine parameterization of a neighborhood of q in W^uu(q). Since the height a of C remains constant in W^uu(q), by (<ref>), (<ref>), the variables x,τ take values in the bounded domain Δ{(x,τ): 0 ≤τ < x < 1/a}. We construct a bundle ℬ with base Δ, and a homogeneous space fiber, as follows. Let Tor G/_2(ℤ), the space of tori of some fixed area. This area is usually taken to be one, but by rescaling, can be taken to be any fixed number. For each x ∈(0, 1/a), let Tor(x) denote the space of tori of area 1-ax and with an embedded horizontal segment of length x. This is the complement in Tor of a closed set with empty interior (consisting of periodic horocycles of period at most x). Define ℬ to be the bundle with base Δ and such that the fiber over (x, τ) ∈Δ is Tor(x). Let μ be the G-invariant probability measure on Tor. Since the set of surfaces which do not admit an embedded horizontal segment of some length is of μ-measure zero, we can also think of μ as a probability measure μ_x on Tor(x). For (x, τ) ∈Δ let C = C(x,τ) be a cylinder of height a, circumference x and twist τ. We have a map Ψ: ℬ→ℋ(2) defined by gluing the torus T from Tor(x), with a slit of length x, to the cylinder C(x, τ). Let ν∫_0^1/a∫_0^x Ψ_*(μ_x) dτ dx. The image Ψ(ℬ) is a five-dimensional properly embedded submanifold of , consisting of all surfaces that can be presented as in Figure <ref> for some fixed choice of a>0. Along any sequence of elements (x,τ) ∈Δ leaving compact subsets, we have either x → 0 or the area 1-ax of T goes to zero, and in both cases the surfaces in the image of Ψ have short saddle connections. This shows that Ψ(ℬ) is properly embedded. Since ν is invariant under translations using the affine coordinates x,τ,s, it is a finite horospherical measure supported on Ψ(ℬ). We now claim that any measure ν which is strong-stable invariant and ergodic, with Ξ(ν) of type D, is the above measure up to multiplication by a scalar. To see this, note that the number a = a(M) described above for a surface M ∈ℋ(2) with Ξ(M) of type D, is a function on supp ν which is fixed on strong stable leaves, so is constant. So we may assume it takes a fixed value a for ν a.e. surface. Let ℒ_a be the subset of ℋ(2) consisting of surfaces with Ξ(M) of type D, and a(M)=a. Then one can show using the above discussion that ℒ_a is the image of the set of parameters x, τ, M, where x and τ satisfy (<ref>), (<ref>) and M ∈Tor(1-ax,x). Moreover this set of parameters embeds properly, i.e. one goes to infinity in ℒ_a ⊂ℋ(2) exactly when x goes to either 0 or 1/a, or M goes to infinity in Tor(1-ax,x). So the functions assigning to a surface its parameters x, τ are well-defined functions, let ℒ_a,x,τ be the level sets of such a function, i.e. the subset of ℒ_a with coordinates x, τ two fixed numbers. Then the measure ν decomposes into conditional measures on each ℒ_a,x,τ which are invariant under the intersection of the strong stable leaf with this set. As discussed above, each ℒ_a,x,τ is the pre-image of Ψ_x,τ, i.e. is Tor(1-ax,x), and so ν decomposes into horocycle invariant measures on each Tor(1-ax,x). By Dani's measure classification <cit.>, this measure is either ν(x,τ) or a measure supported on a closed horocycle. But the surfaces with closed horocycles have additional horizontal saddle connection so, since Ξ(ν) is of type D (not F), we cannot assign positive mass to closed horocycles in a positive measure's worth of Tor(1-ax,x). So the measure ν decomposes into the measures ν(x,τ), and by invariance under the flows in direction x and τ, are equal to the measure ∫_0^1/a∫_0^x f(x) dν(x,τ) dτ dx up to a constant factor. To discuss orbit closures use a similar analysis, using Dani-Smillie <cit.> in each Tor(1-ax,x) instead of <cit.>. The orbit closure is ℒ_a. § THE GEODESIC FLOW AND WEAK UNSTABLE FOLIATION Let ν be a horospherical measure that is invariant by the geodesic flow. We will assume that ν is ergodic and is not equal to the special flat measure, and prove that ν=0. By Theorem <ref>, ν-a.e surface in ^(1) has a horizontal saddle connection. Denote by f the map that maps a surface to the length of its shortest horizontal saddle connection. Using Lemma <ref> as in the proof of Theorem <ref>, we have that for any c>0, ν(_≥ c) <∞, where _≥ c f^-1([c,∞)). Since ν( ⋂_c' ≥ c_≥ c')= 0, this implies ν(_≥ c') ⟶_c' →∞ 0. The geodesic flow expands the horizontal direction, and hence g_t (_≥ c)= _≥ ce^t. By invariance of the measure ν under the A-action, we obtain that ν(_≥ c ) = ν(_≥ ce^t ) → 0, and hence ν(_≥ c)=0 for any c>0. This implies ν =0. We now show that any leaf for the weak-unstable foliation is dense. Let q ∈_1^(1), let U be an open set contained in ^(1) and let f be a nonzero non negative compactly supported function whose support is contained in U. In order to show U ∩ W^u(q) ≠∅ we will show that there is p ∈ W^u(q) such that f(p)>0. Let ε∫_ f d μ_>0, let ω_f denote the continuity modulus of f with respect to the sup-norm distance function, and let ∈π^-1(q). Using Propositions <ref> and <ref>, let be a regular box containing such that for any t ≥ 0, the box _t g_t() satisfies ω_f(τ__t) + 2f _∞δ__t < ε/4. Let m_ be the special flat measure on ^(1). By mixing of the geodesic flow (Proposition <ref>), there is T>0 such that for any t>T, we have | 1/m_()∫__t f dm_ - ∫_f dm_| < ε/4. Applying Proposition <ref> to the special flat measure m_, and denoting by _t the plaque of g_t in _t, we have |1/m_()∫__t f dm_ - 1/(_t)∫__t f ∘π d| < ε/4, and consequently |∫_ f dm_ - 1/(_t)∫__t f ∘π d | < ε/2. This implies ∫__t f ∘π d > 0 and since π(_t) is contained in W^u(q), we obtain that there is p ∈ W^u(q) such that f(p) >0. § CLOSURES OF HOROSPHERICAL LEAVES The goal of this section is to prove Theorem <ref>. First, in order to explain the idea, we will prove the following weaker result. Let q ∈^(1) be a surface without horizontal saddle connections. Then W^uu(q) is dense in ^(1). Let U be any open set contained in ^(1) and let f be a nonzero non-negative function whose support is contained in U. It is enough to show that there is p ∈ W^uu_q such that f(p)>0. Let ε∫_ f dm_ >0, let c 1, and let K be a compact subset as in Lemma <ref>. For any n>0, the surface g_-nq does not have horizontal saddle connections and thus there is s_n >0 such that p_n u_s_n g_-n q satisfies p_n ∈ K ∩ W^uu(g_-n q). The horocycle flow preserves the horospheres and the geodesic flow permutes them. As a consequence g_n p_n ∈ W^uu(q). Since K ∩_1^(1) can be covered by the image by π of finitely many arbitrarily small boxes, by passing to a subsequence and using Propositions <ref> and <ref>, we can assume that there is a box ⊂π^-1() such that the translates _n = g_n() satisfy ω_f(τ__n) + 2f_∞δ__n < ε/4 and p_n ∈π(), for all n ∈ℕ. Denote by _n a plaque of _n = g_n() whose image by π contains g_n(p_n). By mixing of the geodesic flow, for all large enough n: | 1/m_()∫__n f dm_ - ∫_f dm_| < ε/4. It thus follows from Proposition <ref> applied to the special flat measure m_ that |1/m_(B)∫_B_n f dm_ - 1/(_n)∫__n f ∘π| < ε/4 . Consequently, for large enough n, |∫_ f dm_ - 1/(_n)∫__n f ∘π| < ε/2, and thus 1/(_n)∫__n f ∘π > ∫_ f dm_ - ε/2 > 0. This implies that there is a p ∈π(_n) ⊂ W^uu(q) such that f(p) >0. In order to upgrade Theorem <ref> to Theorem <ref>, we will need the following result: Let be an invariant subvariety and suppose that q ∈^(1) has horizontal saddle connections, but is not horizontally periodic. Then there is q' ∈ W^uu(q) such that all horizontal saddle connections on M_q' are longer than the shortest horizontal saddle connection on M_q. If in addition M_q has no horizontal cylinders, then for any T>0 there is q' ∈ W^uu(q) such that the shortest horizontal saddle connection on M_q' is longer than T. We repeat the arguments given in the proof of Theorem <ref>. In that proof, the only place where we used the assumption that q has no horizontal saddle connections, is to ensure the existence of p_n satisfying (<ref>). For this, using Proposition <ref> and Lemma <ref>, it is enough to show that there is q_n' ∈ W^uu(g_-nq) such that the shortest horizontal saddle connection in M_q'_n has length at least one. By our assumption, M_q has no horizontal cylinders and therefore neither does M_g_-nq, and thus we can conclude using the second assertion of Theorem <ref>. Let q ∈_1^(1) be a surface with horizontal cylinders C_1, …, C_s. Its leaf-closure W^uu(q) can be described as a properly embedded bundle ℬ in ^(1), very similar to the one discussed in <ref>. We sketch the argument here. Any surface in q' ∈ W^uu(q) also has corresponding cylinders C'_1, …, C'_s (see the proof of Proposition <ref>). Let c'_j, a'_j, τ'_j denote respectively their circumferences, heights, and twists. We have a'_j = a_j, that is the heights of the cylinders are the same on the surfaces M_q and M_q'. Arguing as in the proof of Proposition <ref>, the numbers c'_j, τ'_j belong to a bounded subset Δ⊂^2s. Let Δ_q be the subset of Δ describing cylinders that can arise for q' ∈ W^uu(q). This set is the base of ℬ. The fiber over c⃗, τ⃗∈Δ_q is described as follows. Let q' ∈ W^uu(q) have cylinders C'_1, …, C'_s whose geometry is prescribed by c⃗, τ⃗, and let q” be the surface obtained by removing the cylinders C'_1, …, C'_s and regluing the boundary components to each other by a translation. The translation in each cylinder is chosen so that singularities on opposite sides of a cylinder are not glued to each other. This surface can be alternatively described as the limit t → 0 of the cylinder stretch map g̅, for g=( t s 0 1), for some s (see Proposition <ref>). The surface q” belongs to some invariant subvariety ”, independent of c⃗, τ⃗, in a lower dimensional stratum. It has no horizontal cylinders, so by Theorem <ref>, its horosphere is dense in ”. Note that the area of q” is not one and so we apply Theorem <ref> after rescaling. Thus the fibers of ℬ are all isomorphic to ”. As c⃗, τ⃗ leaves compact subsets of Δ_q, the corresponding surfaces have shorter and shorter horizontal saddle connections, and thus ℬ is properly embedded in . § EXTENDING SADDLE CONNECTIONS AND CYLINDERS (APISA AND WRIGHT) In this section we give the proof of Theorem <ref>. We need some auxiliary statements. A horizontal cylinder on a translation surface is a cylinder whose core curve is horizontal. We say that a cylinder and a saddle connection are disjoint if they do not intersect, except perhaps at singular points. Our convention is that cylinders are closed, and thus a cylinder and a saddle connection on one of its boundary components are not considered to be disjoint. We recall the notion of -equivalence of cylinders, introduced in <cit.>. Let be an invariant subvariety, let q ∈ and let C_1, C_2 be two parallel cylinders in M_q. The cylinders are called -parallel if there is a neighborhood 𝒰 of q in , such that C_1, C_2 remain parallel for all q' ∈𝒰. More precisely: * there is a lift L of and open 𝒱⊂ L and 𝒰⊂ such that q ∈𝒰, π|_𝒱: 𝒱→𝒰 is a homeomorphism and is injective on 𝒱; * for ∈𝒱 with q = π(), represented by a marking map f: S → M_q, and for any ' ∈𝒱, represented by f': S → M_q', the sets f' ∘ f^-1(C_i), i=1,2 are parallel cylinders on q' = π('). Being -parallel is clearly an equivalence relation. For a cylinder C on a translation surface M, we denote by G_C the subgroup of fixing the holonomy of the core curve of C. Clearly G_C_1 = G_C_2 if C_1, C_2 are parallel. If C_1, …, C_r are parallel on M and g ∈ G_C_1 then the cylinder surgery corresponding to g, C_1, …, C_r consists of applying g to the C_i and leaving the complement M ⋃_i=1^r C_i untouched. For example if C is horizontal then the elements of G_C are of the form ( 1 s 0 t), with t>0. The cylinder surgery of such a matrix with t=1 consists of cylinder shears (with shear parameter s), and with s=0, consists of cylinder stretches (with stretch parameter t). By an appropriate conjugation, the definition of cylinder shears and stretches is extended to non-horizontal cylinders. We have: For , any q ∈, and an -parallel equivalence class of cylinders C_1, …, C_r on M_q, if g ∈ G_C_i then the surface obtained from M_q by cylinder surgery corresponding to g, C_1, …, C_r is also in . Suppose q ∈ and C_1, …, C_r are -parallel cylinders on q, which are not necessarily a full equivalence class of -parallel cylinders. Let L be a lift of , let ∈ L ∩π^-1(q) and let V ⊂ H^1 ( S, Σ; ) such that (L)=V. Varying g ∈ G_C_1 gives rise to a two dimensional collection (in the previous example, corresponding to possible choices of the parameters s,t) of surfaces, obtained from M_q by cylinder surgery corresponding to g, C_1, …, C_r. This collection is affine in period coordinates and its tangent direction is a one dimensional complex subspace of H^1 (S, Σ; ). A generator for this subspace is σ_{C_i, h_i}∑_i=1^r h_i γ_i^*, where h_i is the height of C_i, γ_i is the core curve of C_i (considered as an element of H_1(S, Σ)) and γ_i^* is the dual class in H^1(S, Σ). Moving along the line tangent to σ_{C_i, h_i} in amounts to performing cylinder shears in each of the C_i, and moving along the line tangent to 𝐢·σ_{C_i, h_i} in amounts to performing cylinder stretches. Below we will be interested in such one-parameter families of deformations, tangent to σ_{C_i, h_i} as in (<ref>), in which the C_i might not be a full equivalence class of -parallel cylinders, and the h_i might not be their heights. Note that for cylinder shears, such surgeries are well-defined for any value of the shear parameter s, and for cylinder stretches, they are well-defined as long as t>0. When σ_{C_i, h_i}∈ V for , L, V as above we simply say that σ_{C_i, h_i} is contained in the tangent space to at q. If is an invariant subvariety and q ∈ is not horizontally periodic, then there is a nonempty collection of -parallel cylinders C_1, …, C_r on M_q which consists of cylinders disjoint from all horizontal saddle connections on M_q, and positive h_1, …, h_r such that the class σ_{C_i, h_i} as in (<ref>) is contained in the tangent space to at q. Furthermore, there is A_0>0, depending only on , so that if q ∈ has no horizontal cylinders, one can choose a collection of cylinders with these properties, so that in addition, the sum of the areas of the cylinders is at least A_0. We note that the h_i in Proposition <ref> might not be the heights of the C_i. The vector σ_{C_i, h_i} is tangent to the line in obtained by applying different cylinders shears to each C_i. In order to formalize this, for g_i ∈ C_i for each i, we define the cylinder surgery corresponding to {C_i, g_i} to be the map obtained by applying g_i to each C_i, leaving the complement M ⋃_i=1^r C_i untouched. With this terminology, the line tangent to σ_{C_i, h_i} is the collection of surfaces obtained by cylinder surgery corresponding to {C_i, g_i}, where s ∈ and g_i performs a cylinder shear with parameter sh_i in C_i. Similarly, the line tangent to 𝐢·σ_{C_i, h_i} is the collection of surfaces obtained by cylinder surgery corresponding to {C_i, g_i}, where s ∈ and g_i performs a cylinder stretch with parameter sh_i in C_i. Since the U-action is linear in charts, preserves horizontal saddle connections, and maps -equivalent cylinders to -equivalent cylinders, preserving their area, the validity of both statements is unchanged if we replace q with some surface q' in its horocycle orbit Uq. According to <cit.>, there is q_∞ in the closure of Uq which is horizontally periodic, and we will see that the required properties hold for all q' sufficiently close to q_∞. Let M_∞ be the underlying surface of q_∞, let C_1, …, C_r be the horizontal cylinders on M_∞, and for each i, A_i, c_i, h_i, γ_i denote respectively the area, circumference, height, and core curve of C_i. Here we consider γ_i as an element of H_1(S, Σ) by using a marking f: S → M_∞ corresponding to _∞∈π^-1(q_∞). By Proposition <ref>, σ_{C_i, h_i} belongs to the tangent space of at q. For any θ_0>0 there is a neighborhood 𝒰 = 𝒰(θ_0) of q_∞ in such that if q' ∈𝒰 then the underlying surface has r cylinders C'_1, …, C'_r of circumferences and areas satisfying c'_i < c̅ 2max_i=1, …, r c_i, A'_i > A1/2min_i=1, …, r A_i , and with directions of core curves in (-θ_0, θ_0). If C and σ are a cylinder and a straight segment on a translation surface, we say that σ crosses C if it intersects both of the boundary components of C (possibly at singular points). Since a cylinder contains no singularities in its interior, if a saddle connection intersects the interior of a cylinder, then it must cross it. Let s be the maximal length of a horizontal saddle connection on M_q and let θ_0 be small enough so that a horizontal segment of length s cannot cross a cylinder of direction θ satisfying 0 < |θ| < θ_0, with circumference at most c̅ and area at least A. By making 𝒰 smaller, so that it is an evenly covered neighborhood of q_∞, we can ensure that σ_{C'_i, h_i} belongs to the tangent space of at q'. Indeed, if 𝒱 is a connected component of π^-1(𝒰) and ', _∞∈𝒱 are preimages of q', q_∞ respectively, then the core curves of the cylinders C'_i, C_i map to the same elements γ_i ∈ H_1(S, Σ) under the corresponding marking maps, and thus σ_{C'_i, h_i} = σ_{C_i, h_i}. Now suppose that q' ∈ Uq ∩𝒰, and let M' be the underlying surface. Since q is not horizontally periodic, neither is q'. Therefore there is an equivalence class C_1, …, C_r of -parallel cylinders on M_∞, so that the corresponding cylinders C'_1, …, C'_r are not horizontal cylinders on M', and satisfy the bounds (<ref>). Furthermore the maximal length of a horizontal saddle connection on M' is s, since the horocycle flow maps horizontal saddle connections to horizontal saddle connections of the same length. By choice of θ_0, the cylinders in this equivalence class are all disjoint from horizontal saddle connections on M'. This proves the first assertion. Let t be an upper bound on the number of horizontal cylinders for a surface in and let A_0 1/2t. The argument above works for any collection of -parallel cylinders C_1, …, C_r which are horizontal on q_∞ and are not horizontal on q'. If q has no horizontal cylinders then neither does q', and we can apply the argument with any equivalence class of -parallel horizontal cylinders C_1, …, C_r on M_∞. One of these classes must have total area at least 1/t, and thus for 𝒰 sufficiently small, the sums of the areas of the corresponding cylinders C'_1, …, C'_r is at least A_0. We first prove the first assertion. Let C_1, …, C_r be the -parallel cylinders on M_q, and h_1, …, h_r the positive numbers provided by Proposition <ref>. We define q' as g ∘φ (q), where g ∈ and φ is a cylinder surgery corresponding to {C_i, g_i}, and g_i is the cylinder stretch with parameter sh_i for some s<0. Neither of the maps g, φ preserves the area of the surface, we will choose parameters so that their composition does. Moreover both of these maps will not change the vertical component of the holonomy of any curve. The -action preserves , and by Proposition <ref>, so does φ. The map g will increase the length of all horizontal saddle connections on q, and the cylinder surgery φ will not affect their length, since the cylinders C_i are disjoint from the horizontal saddle connections on q. The area of φ (q) is smaller than the area of q since all of the cylinders C_i are stretched by a negative parameter. Let A be the sum of the areas of the cylinders C_1, …, C_r. Then by choosing the parameter s appropriately, we can arrange so that the area of φ(q) is 1-A/2. We now set t (1 -A/2)^-1 and g ( t 0 0 1 ). Then g increases the lengths of horizontal saddle connections by a factor t>1, and multiplies the area of φ(q) by t. This completes the proof of the first assertion. For the second assertion, we use the second assertion in Proposition <ref> to choose the cylinders so the sum of their areas satisfies A ≥ A_0. This ensures that the horizontal saddle connections on q' g ∘φ (q) are longer than the horizontal saddle connections on q by a factor of at least t, where t>1 is as in (<ref>) and t-1 is bounded away from 0. In light of Proposition <ref>, q' ∈ W^uu(q) also does not have horizontal cylinders. So we can apply the above argument iteratively, at each stage obtaining surfaces in W^uu(q) with longer and longer horizontal saddle connections. Since the lengths of these horizontal saddle connections grows by a definite amount in each step, after finitely many steps they will all be longer than T. § MEASURES ON AND (S,Σ)-INVARIANT MEASURES ON The goal of this section is to prove a result on the correspondence between Radon measures on and (S,Σ)-invariant Radon measures on . This result is part of the folklore but we were not able to find a reference; see <cit.> for an analogous result in a restricted setting. We state the result in a general setting. Let X̃ be a paracompact manifold and Γ a discrete group acting properly discontinuously on X̃. We will write the Γ-action as an action on the right. Let X=X̃/Γ be the quotient space and π:X̃→ X the quotient map. If Γ acts freely then X is a manifold and π is a covering map. If Γ does not act freely then we can view X as an orbifold and π as a regular orbifold covering map (although no knowledge of orbifolds is assumed in this section). We do not assume that the action on Γ is faithful but, since the action of Γ is proper, the subgroup of Γ that acts trivially on X̃ must be finite. For q̃∈X̃ let Γ(q̃) be the stabilizer of q̃ in Γ. For any q ∈ X, we define a measure on X̃ by θ_q ∑_q̃∈π^-1( q) |Γ(q̃)|·δ_q̃, where δ_q̃ is the Dirac mass at q̃. The measure θ_q is supported on π^-1(q). For any f ∈ C_c(X̃) and q̃∈X̃ we have ∫_X̃ f dθ_π(q̃) = ∑_γ∈Γf(q̃·γ). It follows from the fact that Γ acts properly discontinuously on X̃ that the sum on the right-hand side is finite. Given a Radon measure ν on X we define a Radon measure ν̃ on X̃, called the pre-image of ν, by the formula ∫_X̃ f dν̃ = ∫_X(∫_X̃ f dθ_q ) dν(q) for any f ∈ C_c(X̃). Equation (<ref>) defines a unique Radon measure ν̃ on X̃ in light of the Riesz Representation Theorem. To see that (<ref>) converges, note that the integrand q ↦ F(q) ∫_X̃ f dθ_q is a Borel function, which is supported on the compact set π( supp f), and is bounded by D f _∞, where D #{γ∈Γ: (supp f) ·γ∩supp f ≠∅} is finite since the Γ-action is properly discontinuous. By (<ref>) the measures θ_q are all Γ-invariant, and since ν̃ is an average of the measures θ_q, we have: The measure ν̃ is Γ-invariant. The following converse can be understood as a disintegration theorem for Γ-invariant Radon measures on X̃. Let m be a Γ-invariant Radon measure on X̃. There is a unique Radon measure μ on X such that m is the pre-image of μ. We call μ the image of m. Let m be given. We are claiming the existence of a Radon measure μ so that (<ref>) holds (with ν̃, ν replaced with m, μ). The idea of the proof is to build μ on small neighborhoods using the fact that π is an orbifold cover. This will be made rigorous using a partition of unity. Let q̃∈X̃ and let Γ(q̃) be the stabilizer of q̃ in Γ. Since Γ acts properly discontinuously on X̃, Γ(q̃) is finite, and there is connected Γ(q̃)-invariant neighborhood of q̃ and a neighborhood of π(q̃) such that π induces a homeomorphism / Γ(q̃) →, and π^-1() = _γ∈Γ(q̃) \Γ·γ, where γ ranges over a set of coset representatives, and where the sets 𝒱·γ are disjoint. We say that such a ⊂ X is evenly covered (in the orbifold sense). Let (_i)_i ∈ I be a locally finite cover of X by evenly covered neighborhoods. Such a cover exists by the paracompactness of X̃ and the considerations above. For each i ∈ I choose a connected component _i of π^-1(_i). Denote by Γ_i=Γ(_i) the stabilizer of _i in Γ. Let (ρ_i)_i∈ I be a partition of unity subordinate to the cover (_i)_i ∈ I and define a Radon measure μ on X (by using the Riesz Representation Theorem) such that for any f ∈ C_c(X), ∫_X f dμ = ∑_i ∈ I1/|Γ_i|∫__i (ρ_i f) ∘π dm. We want to show that the measure μ satisfies (<ref>). We claim first that for any q̃∈X̃, there is a neighborhood around q̃ such that (<ref>) holds for any f ∈ C_c(X̃) with support contained in . Indeed, let q̃∈X̃ and let be a neighborhood of q̃ small enough so that for any i ∈ I, intersects at most one connected component of π^-1(_i). This is possible since the cover by the _i is locally finite. Let J = {i ∈ I : π() ∩_i ≠∅} and for j ∈ J, let γ_j ∈Γ be such that _j ·γ_j ∩≠∅. By the assumption on 𝒱, the coset Γ_j ·γ_j is uniquely determined. Let f ∈ C_c(X̃) with support contained in . We compute: ∫_X( ∫_X̃ f dθ_q ) dμ(q) = ∑_i ∈ I1/|Γ_i|∫__i∑_γ∈Γρ_i(π(q̃) )f(q̃·γ) dm(q̃) = ∑_j ∈ J1/|Γ_j|∫__j ·γ_j∑_γ∈Γ_jρ_j(π(q̃)) f(q̃·γ) dm(q̃) = ∑_j ∈ J1/|Γ_j|∫_X̃∑_γ∈Γ_jρ_j(π(q̃)) f(q̃) dm(q̃) = ∑_j ∈ J∫_X̃ρ_j(π(q̃)) f(q̃) dm(q̃) = ∫_X̃ f dm. Now let f be an arbitrary compactly supported continuous function and let K denote its support. Using a covering argument and the computation above, we can find finitely many (_i)_i that cover K and such that (<ref>) holds for continuous functions with support contained in _i. Let (ψ_i)_i be a partition of unity associated with this cover. We can write f = ∑_i ψ_if. By construction, each of the ψ_if has support contained in _i and the result follows by (<ref>) and the linearity of the integral. To prove uniqueness of the measure μ, we proceed as follows. Let μ_1 and μ_2 be two Radon measures on X that satisfy (<ref>) (with m,μ_i instead of ν̃, ν). Let f ∈ C_c(X) be a compactly supported continuous function whose support is contained in an evenly covered neighborhood and let be a connected component of π^-1(). We denote by Γ() the stabilizer in Γ of . Let h be the function on X̃ that is equal to f ∘π on and vanishes outside of . Since the support of f is contained in , the function h is continuous and has compact support. Furthermore, it is easy to see that for any q ∈ X, ∫_X̃ h dθ_q = |Γ()| f(q). This implies ∫_X f dμ_1 = 1/|Γ()|∫_X̃ h dm =∫_X f dμ_2. To deal with the case when f is an arbitrary function of compact support we appeal once more to existence of partitions of unity. Let G be a group acting on X̃ so that the action commutes with the action of Γ. The group G induces an action on X so that π is G-equivariant. A Radon measure μ on X is invariant under g∈ G if and only if its pre-image μ̃ is invariant under the action of g on X̃. We start by proving two formulas showing the naturality of the pre-image construction. g_*(θ_q)=θ_g(q). g_*(θ_q) =∑_π(q̃)=q|Γ(q̃)|·δ_g(q̃) =∑_π(g(q̃))=g(q)|Γ(q̃)|·δ_g(q̃) =∑_π(g(q̃))=g(q)|Γ(g(q̃))|·δ_g(q̃)=θ_g(q). In line (<ref>) we used the fact that π(g(q̃))=g(π(q̃))=g(q). In line (<ref>) we used the fact that the Γ action commutes with g, which implies that |Γ(g(q̃))|=|Γ(q̃)|. g_*(μ̃)=g_*(μ). It suffices to show that both measures assign the same integrals to continuous functions of compact support on X̃. Let f be such a function. ∫_X̃f dg_*(ν) =∫_X(∫_X̃ f dθ_q ) dg_*(ν)(q) =∫_X(∫_X̃ f dθ_g(q)) dν(q) =∫_X(∫_X̃ f dg_*(θ_q) ) dν(q) =∫_X(∫_X̃ f∘ g dθ_q ) dν(q) =∫_X̃f∘ g dν̃=∫_X̃f dg_*(ν̃). In line (<ref>) we used Claim <ref>. In line (<ref>) we used the definition of the pre-image applied to the function of compact support f∘ g. Using these formulas we now prove the Proposition. If g_*(μ)=μ then g_*(μ̃)=g_*(μ)=μ̃ by Claim <ref>. So μ̃ is invariant under the action of g on X̃. If g_*(μ̃)=μ̃ then g_*(μ)=g_*(μ̃)=μ̃ so the pre-images of g_*(μ) and μ are equal. It follows from the uniqueness assertion in Proposition <ref> that g_*(μ)=μ. alpha
http://arxiv.org/abs/2303.06714v1
20230312173557
BCSSN: Bi-direction Compact Spatial Separable Network for Collision Avoidance in Autonomous Driving
[ "Haichuan Li", "Liguo Zhou", "Alois Knoll" ]
cs.RO
[ "cs.RO", "cs.AI" ]
BCSSN: Bi-direction Compact Spatial Separable Network for Collision Avoidance in Autonomous Driving Haichuan Li Liguo Zhou Alois Knoll Chair of Robotics, Artificial Intelligence and Real-Time Systems Technical University of Munich haichuan.li@tum.de, liguo.zhou@tum.de, knoll@in.tum.de March 30, 2023 =========================================================================================================================================================================================================== empty Autonomous driving has been an active area of research and development, with various strategies being explored for decision-making in autonomous vehicles. Rule-based systems, decision trees, Markov decision processes, and Bayesian networks have been some of the popular methods used to tackle the complexities of traffic conditions and avoid collisions. However, with the emergence of deep learning, many researchers have turned towards CNN-based methods to improve the performance of collision avoidance. Despite the promising results achieved by some CNN-based methods, the failure to establish correlations between sequential images often leads to more collisions. In this paper, we propose a CNN-based method that overcomes the limitation by establishing feature correlations between regions in sequential images using variants of attention. Our method combines the advantages of CNN in capturing regional features with a bi-directional LSTM to enhance the relationship between different local areas. Additionally, we use an encoder to improve computational efficiency. Our method takes "Bird's Eye View" graphs generated from camera and LiDAR sensors as input, simulates the position (x, y) and head offset angle (Yaw) to generate future trajectories. Experiment results demonstrate that our proposed method outperforms existing vision-based strategies, achieving an average of only 3.7 collisions per 1000 miles of driving distance on the L5kit test set. This significantly improves the success rate of collision avoidance and provides a promising solution for autonomous driving. § INTRODUCTION Trajectory prediction <cit.> is a critical task in autonomous driving for collision avoidance, as it requires the autonomous vehicle (AV) to accurately estimate the future motion of surrounding objects and plan its own motion accordingly shows in Fig <ref>. This task is challenging due to the uncertainty of the surrounding environment and the complexity of the motion patterns of other vehicles, pedestrians, and cyclists. To improve the accuracy of trajectory prediction, various techniques have been proposed. For instance, multi-modal prediction <cit.> and uncertainty estimation <cit.> have been utilized to consider multiple possible future trajectories and their probabilities. Attention mechanisms <cit.> and graph-based models <cit.> have been proposed to capture the importance and relationships among different objects. Convolutional Neural Network (CNN) has made outstanding contributions to vision tasks and has been widely applied to traffic scenes due to its excellent regional feature extraction capabilities. Based on this advantage, CNN will obtain the local feature information of sequential related frames in our network. Additionally, since the motion trajectory is planned for AV, which means each position point has a sequential relation (the later points depend on former points). It is necessary to establish the relationship between each local feature of the image obtained by CNN. To address this, some strategies use CNN plus RNN to deal with sequential graphs as input, such as STDN <cit.>, CRNN <cit.>, LSTM-CNN <cit.>, RCNN <cit.>. Although the above strategies have performed well in a large number of vision tasks, their performances are still far inferior to similar-sized convolutional neural networks counterparts, such as EfficientNets <cit.> and RepVGG <cit.> in Fig.<ref>. We believe this is due to the following aspects. First, the huge differences between the sequential tasks of NLP and the image tasks of CV are ignored. For example, when the local feature information acquired in a two-dimensional image is compressed into one-dimensional time series information, how to achieve accurate mapping becomes a difficult problem. Second, it is difficult to keep the original information of inputs since after RNN layers, we need to recover the dimension from one to three. Besides, due to the several transformations between different dimensions, that process becomes even harder, especially our input size is 224×224×5. Third, the computational and memory requirement of switching between layers are extremely heavy tasks, which also becomes a tricky point for the algorithm to run. Higher hardware requirements as well as more running time arise when running the attention part. In this paper, we propose a new network structure based on CNN, Bi-LSTM, encoder, and attention to trajectory-generating tasks in autonomous driving. The new network structure overcomes these problems by using Bi-direction Compress Sequential Spatial Network (BCSSN). As shown in Fig. <ref>, input Bird's Eye View (BEV) images first will be divided into three sub-graphs. Then go through bi-directional frame-related(BIFR) blocks which consist of flatten layer, Bi-LSTM layer, and full connect layers. After that, information will be fed into the main stem, the convolution stem for fine-grained feature extraction, and are then fed into a stack of SSN (Sequential Spatial Network) blocks in Fig. <ref> for further processing. The Upsampling Convolutional Decreasing (UCD) blocks are introduced for the purpose of local information enhancement by deep convolution, and in SSN block of features generated in the first stage can be less loss of image resolution, which is crucial for the subsequent trajectory adjustment task. In addition, we adopt a staged architecture design using three convolutional layers with different kernel sizes and steps gradually decreasing the resolution (sequence length) and flexibly increasing the dimensionality. Such a design helps to extract local features of different scales and, since the first stage retains high resolution, our design can effectively reduce the resolution of the output information in the first layer at each convolutional layer, thus reducing the computational effort of subsequent layers. The Reinforcement Region Unit (RRU) and the Fast MultiHead Self-Attention (FMHSA) in the SSN block can help obtain global and local structural information within the intermediate features and improve the normalization capability of the network. Finally, average pooling is used to obtain better trajectory tuning. Extensive experiments on the lykit dataset <cit.> demonstrate the superiority of our BCSSN network in terms of accuracy. In addition to image classification, SSN block can be easily transferred to other vision tasks and serve as a versatile backbone. § RELATED WORKS Rule-based systems<cit.>: Rule-based systems are a type of artificial intelligence that uses a set of rules to make decisions. These rules are typically expressed in if-then statements and are used to guide the system's behavior. Rule-based systems have been used in a variety of applications, including expert systems, decision support systems, and automated planning systems. Decision trees<cit.>: Decision trees are a type of machine learning algorithm that is used for classification and regression analysis. They are built using a tree structure, where each internal node represents a decision based on a feature, and each leaf node represents a prediction. Decision trees are widely used in various fields, including business, medicine, and engineering. Markov Decision Processes<cit.> (MDPs): Markov Decision Processes are a mathematical framework for modeling sequential decision-making problems, where an agent interacts with an environment in discrete time steps. The framework involves a set of states, actions, rewards, and transition probabilities that govern the agent's behavior. MDPs have been used in a wide range of applications, such as robotics, finance, healthcare, and transportation. Bayesian networks<cit.>: A Bayesian network is a probabilistic graphical model that represents a set of random variables and their conditional dependencies using a directed acyclic graph. It is a powerful tool for probabilistic inference, learning from data, and decision making under uncertainty. Except for the mentioned four methods, there are some popular strategies as well. Over the past decade, autonomous driving has flourished in the wave of deep learning, where a large number of solution strategies are based on computer vision algorithms, using images as the primary input. The prevailing visual neural networks are typically built on top of a basic block in which a series of convolutional layers are stacked sequentially to capture local information in intermediate features. However, the limited receptive field of the small convolution kernel makes it difficult to obtain global information, which hinders the high performance of the network on highly feature-dependent tasks (such as trajectory prediction and planning). In view of this dilemma, many researchers have begun to deeply study self-attention-based <cit.> networks with the ability to capture long-distance information. Here, we briefly review traditional CNN and recently proposed visual networks. Convolutional neural network. The first standard CNN was proposed by LeCun <cit.> et al. and was used for handwritten character recognition. Based on this foundation, a large number of visual models have achieved cross-generational success in a variety of tasks with images as the main input. Google Inception Net  <cit.> and DenseNet  <cit.> showed that deep neural networks consisting of convolutional and pooling layers can yield adequate results in recognition. ResNet <cit.> in Fig.<ref> is a classic structure that has a better generalization ability by adding shortcut connections to the underlying network. To alleviate the limited acceptance domain in previous studies, some studies used the attention mechanism as an operator for adapting patterns. Besides, several novel visual networks have been proposed recently, which have achieved remarkable performance in various computer vision tasks. For example, the Mask R-CNN <cit.> proposed by He et al. extends the Faster R-CNN framework with an additional mask branch to perform instance segmentation. SENet <cit.> and MobileNetV3  <cit.> demonstrate the effectiveness of multiple paths within a basic block. The DenseNet <cit.> proposed by Huang et al. introduced dense connections between layers to improve feature reuse and alleviate the vanishing-gradient problems. Moreover, the Transformers-based networks, such as ViT <cit.> in Fig.<ref> proposed by Dosovitskiy et al. and DETR <cit.> proposed by Carion et al., have achieved state-of-the-art performance on image classification and object detection tasks, respectively, by leveraging the self-attention mechanism. These novel visual networks have shown promising results and have opened up new research directions in the field of computer vision. § METHOD §.§ Trajectory Prediction Trajectory prediction is an essential task in autonomous driving for collision avoidance. In this task, the goal is to predict the future trajectory of the vehicle based on its current and past states. This prediction allows the autonomous vehicle to plan its future path and avoid potential collisions with other objects in the environment. What we obtain from our model and dataset are X, Y axis position, and yaw. Since the frame slot is known, we can easily get the velocity that AV needs. Besides, after combing fiction between ground and wheels, wind resistance, and other physic parameters, we can calculate the acceleration that AV needs so that we can control the motor force just like human driving via an accelerograph. Moreover, yaw can provide a driving wheel adjustment as well. These processes compose the basic requirements for autonomous driving. Some mathematical models such as kinematic or dynamic models can show these processes. The kinematic model assumes that the vehicle moves in a straight line with a constant velocity and acceleration. The equations of motion for the kinematic model can be represented as: x(t) = x_0 + v_0 cos(θ_0) t + 1/2 a_x t^2, y(t) = y_0 + v_0 sin(θ_0) t + 1/2 a_y t^2, θ(t) = θ_0 + ω t, where x(t) and y(t) are the position of the vehicle at time t in the x and y axes, respectively, v_0 is the initial velocity, θ_0 is the initial orientation, a_x and a_y are the acceleration in the x and y axes, respectively, and ω is the angular velocity. On the other hand, the dynamic model takes into account the forces acting on the vehicle, such as friction, air resistance, and gravity. Wind resistance is an important factor to consider when predicting the trajectory of an autonomous vehicle. The force of wind resistance can be calculated using the following formula: F_wind = 1/2ρ v^2 C_d A, where F_wind is the force of wind resistance, ρ is the density of air, v is the velocity of the vehicle, C_d is the drag coefficient, and A is the cross-sectional area of the vehicle. The drag coefficient and cross-sectional area can be experimentally determined for a specific vehicle. To incorporate wind resistance into the trajectory prediction model, we can use the above formula to calculate the additional force that the vehicle must overcome. This can then be used to adjust the predicted trajectory accordingly. The equations of motion for the total dynamic model can be represented as: md^2 x/dt^2 = F_x - F_friction - F_wind, md^2 y/dt^2 = F_y - F_g - F_friction - F_wind, where m is the mass of the vehicle, F_x and F_y are the forces acting on the vehicle in the x and y axes, respectively, F_friction and F_wind are the forces due to friction and wind resistance, respectively, and F_g is the force due to gravity. To predict the future trajectory of an autonomous vehicle, we need to estimate the parameters of the kinematic or dynamic model based on the current and past states of the vehicle. This can be done using machine learning techniques such as regression or neural networks. A popular neural network model for trajectory prediction in autonomous driving is the Long Short-Term Memory (LSTM) network. LSTM networks are a type of recurrent neural network that can capture long-term dependencies in sequential data. The LSTM network can take as input the current and past states of the vehicle and predict its future trajectory. Given a sequence of input states s_1, s_2, ..., s_T, where s_t represents the state of the vehicle at time t, an LSTM network can predict the future states ŝt+1, ŝt+2, ..., ŝ_t+k, where k is the number of future time steps to predict. The LSTM network consists of an input layer, a hidden layer, and an output layer. The input layer takes the sequence of input states as input, and the hidden layer contains recurrent connections that allow the network to maintain a memory of past states. The output layer produces the predicted future states. The LSTM network can be trained using backpropagation through time to minimize the prediction error. Several studies have proposed different variations of the LSTM network for trajectory prediction in autonomous driving, such as the Social LSTM <cit.>, the ConvLSTM <cit.>, and the TrajGRU <cit.>. These models have shown promising results in predicting the future trajectory of the vehicle and avoiding potential collisions with other objects in the environment. Recent works have also explored the use of self-attention mechanisms to capture both local and global information for trajectory prediction in autonomous driving <cit.>. These models, such as the proposed SSN architecture, combine CNN and self-attention to capture spatiotemporal features from input data and improve the ability of sequentially related inputs. In summary, trajectory prediction for collision avoidance in autonomous driving is a crucial task that can be addressed using recurrent neural networks such as LSTM or hybrid models that incorporate self-attention mechanisms to capture both local and global information. §.§ BIFR Block To address this sequential relation problem, we also propose a bi-directional frame-related (BIFR) block to build up relations between sequential frames, as shown in Fig. <ref>. This block consists of one flatten layer, one bi-directional LSTM, and two fully connected layers. By utilizing bi-directional LSTMs, the information of both past and future frames can be incorporated into the current frame, which can effectively solve the problem of unreachability and safety of the predicted trajectory for AV. The trajectory planning process is based on several waypoints, and these waypoints have a sequential relationship. The position of the later waypoints depends on the former waypoints, and the position of the former waypoints should consider the later waypoints as well. The potential danger of not considering the sequential relationship between waypoints can be observed from the examples shown in figures. The red circles represent the actual positions of the vehicle, and the blue circles represent the predicted positions based on the current waypoints. As can be seen from the figures shows in Fig. <ref>, the former waypoints are reachable in the predicted trajectory but the latter waypoints are not, or vice versa. Therefore, it is essential to incorporate the sequential relationship between waypoints into the trajectory planning process to ensure the safety and feasibility of the trajectory. §.§ Network Structure Overview Our strategy is to take advantage of CNN, encoder, Bi-LSTM, and attention by building a hybrid network. CNN has excellent regional feature extraction capabilities, allowing the network to accurately and quickly capture important visual features within an image. 𝐡i = f(∑j=1^N𝐰j * 𝐱i-j + b) 𝐡_i = f(∑j=1^N𝐰_j * 𝐱_i-j + b) Encoder can efficiently compress and encode the input data, reducing the computational complexity of the neural network. Encoder = f_enc(x_1, x_2, ..., x_T). LSTM can learn and model long-term dependencies within sequential data, making it particularly effective in modeling and predicting temporal information. f_t = σ_g(W_f x_t + U_f h_t-1 + b_f), i_t = σ_g(W_i x_t + U_i h_t-1 + b_i), C̃t = σ_c(W_c x_t + U_c ht-1 + b_c), C_t = f_t ⊙ C_t-1 + i_t ⊙C̃t, o_t = σ_g(W_o x_t + U_o ht-1 + b_o), h_t = o_t ⊙σ_h(C_t). Attention mechanisms can dynamically weight different regions of an image or sequence, allowing the network to selectively focus on the most important information and improving overall performance. h_t = ∑_i=1^T_xα_t,i·h_i, h_t = ∑_i=1^T_xα _t,i·h_i, α_t,i = exp(e_t,i)/∑_j=1^T_xexp(e_t,j), e_t,i = f(s_t-1, h_i). The combination of these techniques can allow the network to effectively model complex and dynamic relationships within a scene, allowing for more accurate and robust predictions. In particular, the use of attention mechanisms can help the network to better handle variable and unpredictable inputs, allowing it to adapt to a wider range of scenarios and improve generalization performance. The bi-directional frame-related(BIFR) block is one of the fundamental building blocks in our networks, especially aims to capture sequential information in image data. The first step in the BIFR is to flatten the input sub-graphs, which converts the input data to a one-dimensional format that can be processed by the following layers. Next, the Bi-LSTM layer plays a central role in capturing local sequential information. By recording the temporal dependencies between the input data, the Bi-LSTM layer enables the network to learn the long-term dependencies between the input and output. To enhance the computational efficiency of the network, only the output value is kept, and the hidden layer parameters are ignored. This allows the subsequent layers to process the output value more efficiently. Finally, two fully connected layers are used to map the output value produced by the Bi-LSTM layer as inputs for later blocks, which further process the information to extract higher-level features. Overall, the BIFR is a powerful tool for capturing sequential information in image data and has the potential ability widely used in many state-of-the-art computer vision networks, especially for sequentially related inputs. §.§ SSN Blcok Resnet-50 is a powerful architecture that has proven to be effective for various image classification tasks. Its design comprises of five stages, with the initial stage0 consisting of a convolutional layer, a batch normalization layer, and a maxpooling layer. The bottleneck blocks used in stages 1-4 allow for efficient feature extraction and are followed by a fully connected layer for classification. One of the advantages of this design is that it enables efficient classification between different images. However, stage0 only uses one convolutional layer with a large kernel size, which can limit the capture of local information. To address this limitation, the main input block is introduced, which is composed of three different kernel sizes and steps convolutional layers. The main objective of the input block is to extract input information quickly when the output size is large and then use the smaller kernel sizes to capture local information as the input size decreases. This approach helps to improve the overall performance of our model. The proposed SSN block consists of a Reinforcement Region Unit (RRU), a Fast Multi-Head Self-Attention (FMHSA) module and an Information Refinement Unit (IRU), as shown in Fig. <ref>. We will describe these four components in the following. After taking into account the fast processing and local information processing of the main input block, the input information is transferred to the subsequent blocks for subsequent processing. Furthermore, between each block, we add a UCD layer, which consists of a convolutional layer with 1×1 kernel size and a downsampling layer which a sampling ratio is 0.5. The UCD layer allows us to speed up the network without reducing the amount of information in the input but maintaining the ratio between the information, and the size of the input is reduced to half of the original size after the UCD layer. Afterward, the feature extraction is performed by a network layer composed of different numbers of SSN blocks, while maintaining the same resolution of the input. Due to the existence of the self-attention mechanism, SSN can capture the correlation of different local information features, so as to achieve mutual dependence between local information and global information. Finally, the results are output through an average pooling layer and a projection layer as well as a classifier layer. The reinforcement region unit (RRU) was proposed as a data augmentation technique for our network. Data augmentation technique can generate high-quality augmented samples that maintain the spatial correlation and semantic information of the original image by selectively amplifying the informative regions of the input images. This technique can improve the robustness and generalization of the model, and it has been applied to various computer vision tasks such as object detection, semantic segmentation, and image classification. Moreover, RRU can be easily integrated with existing models and does not require additional computational resources, making it an efficient and practical data augmentation method for deep learning models. In other words, a good model should maintain effective operating output for similar but variant data as well so that the model has better input acceptability. However, the absolute position encoding used in the common attention was originally designed to exploit the order of the tokens, but it breaks the input acceptability because each patch adds a unique position encoding to it  <cit.>. Furthermore, the concatenation between the local information obtained by the information capture module at the beginning of the model and the structural information inside the patch  <cit.> is ignored. In order to maintain input acceptability, the Reinforcement Region Unit (RRU) is designed to extract the local information from the input to the "SSN" module, defined as: RRU(X)=Conv(Conv(X)). The FMHSA module in our model is designed to enhance the connection between local information obtained from the RRU. With the use of a convolutional layer, a linear layer, and multi-head self-attention, we can effectively capture the correlation between different local features. This is particularly useful for the collision avoidance task, where the trajectory prediction is based on continuously predicted positions that are sequentially related. The FMHSA module allows for the transfer of local information between different areas, making it suitable for solving this problem. By improving the connection between local information, our model is able to achieve outstanding results in this task. Additionally, the sequential relationship between predicted positions is taken into account, ensuring that the autonomous driving vehicle arrives at each target position before moving on to the next one. The Information Refinement Unit (IRU) is used to efficiently extract the local information obtained by FMHSA, and after processing by this unit, the extracted local information is fed into the pooling and classifier layers. The original FFN proposed in ViT consists of two linear layers separated by the GELU activation <cit.>. First, expand the input dimension by 4 times, and then scale down the expanded dimension: FFN(X) = GELU(XW1 + b1)W2 + b2. This has the advantage of using a linear function for forward propagation before using the GELU() function, which greatly improves the efficiency of the model operation. The proposed design concept is to address the performance sacrifice issue of using the linear function for forward propagation in the FFN of ViT. The solution is to use a combination of convolutional layers with different kernel sizes and a linear function layer to achieve both operational efficiency and model performance. First, a larger convolutional kernel is used to capture the input information's characteristics with a large field of view. Then, the linear function layer is applied for fast propagation of the input information. Finally, a smaller convolutional kernel is used to refine the obtained information. By using this approach, the model can efficiently process the input information while maintaining high performance during fast propagation. This strategy is particularly useful for vision tasks such as image classification and object detection, where the model's performance and operational efficiency are crucial. IRU(X)=Conv(L(Conv(X))), where L(X)=WX+b. After designing the above three unit modules, the SSN block can be formulated as: A =RRU(X), B =FMHSA(A), C =IRU(B)+B. In the experiment part, we will prove the efficiency of SSN network. In addition to its ability to capture the temporal dependencies of sequential data, SSN also has versatility in handling different downstream tasks. Specifically, SSN employs a self-attention mechanism to capture the relationships between the different temporal feature maps. This mechanism can effectively encode the dependencies between different timesteps and extract the most relevant information for the downstream tasks. Furthermore, SSN is designed to handle the sparsity and irregularity of the sequential data, which is common in real-world driving scenarios. These features make SSN a promising candidate for various applications in autonomous driving, such as trajectory prediction, behavior planning, and decision-making. § EXPERIMENT The autonomous driving obstacle avoidance task is crucial in ensuring safe driving in real-life scenarios. To evaluate the effectiveness of the BCSSN architecture, experiments were conducted using a driving map as the main input. We use the Earlystopping function with 100 patience for finding the best parameters' value. Besides, we apply cosine dynamic learning rate <cit.> adjustment for tuning suitable values at each iteration. To implement the cosine dynamic learning rate adjustment, we use the following formula: η_t=η_max1+cos(tπ/T)/2 where η_max is the maximum learning rate, t is the current iteration, and T is the total number of iterations. The EarlyStopping function is used to monitor the validation loss and stop the training process when the validation loss does not improve for a certain number of epochs. Specifically, we use the patience parameter, which determines how many epochs to wait for the validation loss to improve before stopping the training process. The EarlyStopping function is defined as follows: EarlyStopping(V_loss,patience) where V_loss is the validation loss and patience is the number of epochs to wait for the validation loss to improve. In the experiments, the proposed BCSSN architecture was compared with other popular models. The experimental results in Table <ref> were then analyzed to draw conclusions on the performance of the BCSSN architecture. To assess the performance of the BCSSN architecture, collisions were defined into three categories: front collision, rear collision, and side collision. These collisions were caused by different unsuitable physical parameters, and they are depicted in Fig. <ref>. The experiments aimed to test the ability of the BCSSN architecture to detect and avoid these collisions effectively. The results of the experiments were analyzed, and the performance of the BCSSN architecture was compared with other popular models to determine its effectiveness in addressing the obstacle avoidance task. The analytical conclusions drawn from these experiments provide valuable insights into the efficiency and efficacy of the proposed BCSSN architecture. §.§ Dataset and Description The l5kit dataset is a vast collection of data, which serves as the primary source for this study. It is an extensive dataset containing over 1,000 hours of data collected over a four-month period by a fleet of 20 autonomous vehicles that followed a fixed route in Palo Alto, California. The dataset comprises 170,000 scenes, where each scene lasts for 25 seconds. Each scene captures the perception output of the self-driving system, which provides precise positions and motions of nearby vehicles, cyclists, and pedestrians over time. This information is invaluable for training and testing autonomous driving models. In addition to the scene data, the l5kit dataset also contains a high-definition semantic map with 15,242 labeled elements, which includes information about the lane markings, traffic signs, and other relevant information. This semantic map is used to help the autonomous vehicle understand the environment and make informed decisions. Furthermore, the dataset also includes a high-definition aerial view of the area, which provides a top-down perspective of the environment. Overall, the l5kit dataset is an invaluable resource for researchers and developers working in the field of autonomous driving. With its vast collection of data, including the perception output of the self-driving system, semantic map, and aerial view, the dataset provides a comprehensive understanding of the driving environment, which can be used to train and test autonomous driving models. §.§ Data Preprocessing The l5kit dataset has a well-defined structure, consisting of three main concepts: Scenes, Frames, and Agents. Scenes are identified by the host vehicle that collected them and a start and end time. Each scene consists of multiple frames, which are snapshots captured at discretized time intervals. The frames are stored in an array, and the scene datatype stores a reference to its corresponding frames in terms of the start and end index within the frames array. All the frames in between these indices correspond to the scene, including the start index, but excluding the end index. Each frame captures all the information observed at a particular time, including the timestamp, which the frame describes. The frame also includes data about the ego vehicle itself, such as its position and rotation. Additionally, the frame contains a reference to other agents (such as vehicles, cyclists, and pedestrians) that were detected by the ego's sensors. The frame also includes a reference to all traffic light faces for all visible lanes. An agent in the l5kit dataset is an observation made by the autonomous vehicle of another detected object. Each agent entry describes the object in terms of its attributes, such as position and velocity, and gives the agent a tracking number to track it over multiple frames (but only within the same scene!) and its most probable label. The input of this dataset is images of the Ego car, which is one of the properties of the EgoDataset. The output of the model is the position and yaw, which are also properties of the EgoDataset. By using this method, it is possible to simulate vehicles' driving as human driving actions. During the human driving process, drivers control the accelerator and the driving wheels to move the vehicles, where the accelerator is used for velocity and the driving wheel for yaw. Similarly, the output of the model is also the velocity and yaw, which can be used to simulate the trajectories of vehicles and avoid collisions during driving. §.§ Result We conducted experiments using four different network structures and presented their results in Table <ref>. We compared our model's performance with other transformer-based and convolution-based models and found that our model achieved better accuracy and faster processing speed. The results highlighted the significance of our proposed BCSSN for capturing both local and global information, which resulted in a significant reduction of front collision errors. Specifically, our model achieved 2.6 times fewer front collision errors compared to RepVGG, which is 13.6 times less than RepVGG's error rate. Similarly, our model achieved 5.8 times fewer front collision errors than ViT and 12.6 times less than ResNet50. Other comparisons can observe form result table <ref> directly as well. These results demonstrate the effectiveness of the BCSSN in capturing both local and global information, leading to significant improvements in the model's accuracy. BCSSN consistently outperformed other models by a large margin across all the test scenarios. These findings indicate that the proposed BCSSN block is a promising technique for improving the performance of autonomous driving systems by effectively capturing both local and global information. § FEATURE WORK To integrate our algorithm model with the Unity virtual world, we need to establish communication between them. We accomplish this by using Unity's built-in API and message-passing techniques, a first-person view, and bird eye view figure shown in Fig. <ref> . The communication protocol is established such that the algorithm sends the input information to the virtual world, and the virtual world returns the output information to the algorithm. To ensure accurate physical modeling and simulation, we need to perform coordinate transformation between the image coordinates and the world coordinates. The process involves mapping the image coordinates to the virtual world coordinates using the camera parameters and the intrinsic and extrinsic calibration matrices. The resulting coordinates are then transformed to the physical world coordinates, where the physical model can calculate the necessary forces and physical parameters for the autonomous driving system. This transformation can be mathematically represented as: [ X_world; Y_world; Z_world ] = R[ X_camera; Y_camera; Z_camera ] + T where 𝐑 is the rotation matrix, 𝐓 is the translation vector, and [X_camera, Y_camera, Z_camera] are the coordinates in the camera frame. To obtain accurate values for 𝐑 and 𝐓, we need to perform calibration using various methods such as checkerboard pattern or laser scanning techniques  <cit.>. The resulting calibration parameters can then be used to transform the image coordinates to world coordinates for accurate physical modeling and simulation. § CONCLUSION In this paper, we introduce a novel hybrid architecture named BCSSN that is designed to improve the ability of vision-based autonomous driving tasks as well as other vision tasks. The BCSSN architecture combines the strengths of several different techniques, including CNN, Bi-LSTM, encoders, and self-attention, to capture both local and global information from sequentially related inputs. The CNN are used to extract local information from the input images, while the Bi-LSTM is used to model the temporal dependency between the frames. The encoder is used to convert the input images into a high-level feature representation, which is then passed to the self-attention mechanism to capture the long-range dependencies and context information. To evaluate the effectiveness of the proposed BCSSN architecture, we conducted extensive experiments on the Lykit dataset, which is a challenging dataset for vision-based autonomous driving tasks. The results of these experiments demonstrate the superiority of the proposed BCSSN architecture compared to other state-of-the-art models. Specifically, the BCSSN architecture achieved better performance in terms of accuracy, speed, and generalization ability. Overall, BCSSN architecture offers a promising solution for vision-based autonomous driving tasks and other vision tasks that require the ability to capture both local and global information from sequentially related inputs. Its hybrid design allows it to take advantage of the strengths of several different techniques, resulting in improved performance and generalization ability. unsrt
http://arxiv.org/abs/2303.07234v1
20230313160646
Multi-objective analysis of the Sand Hypoplasticity model calibration
[ "Francisco J. Mendez", "Miguel A. Mendez", "Nicola Sciarra", "Antonio Pasculli" ]
cond-mat.soft
[ "cond-mat.soft" ]
Multi-objective analysis of the Sand Hypoplasticity model calibration Francisco J. Mendez^1,*,  Miguel A. Mendez^2,   Nicola Sciarra^1 , Antonio Pasculli^1 ^1University G. D'Annunzio, Dept. of Engineering Geology (INGEO), Chieti-Pescara, Italy; ^2 von Karman Institute for Fluid Dynamics, EA Department, Sint-Genesius-Rode, Belgium ^*Corresponding to: francisco.mendez@unich.it March 30, 2023 ========================================================================================================================================================================================================================================================================================================================== empty The Sand Hypoplastic (SH) constitutive law by von Wolffersdorff (1996) is a interesting hypoplastic model for soil mechanics. This model includes eight parameters, usually calibrated using the oedometric (OE) and the drained isotropically consolidated triaxial tests (CD). However, previous studies show that the SH model calibration in the CD test has conflicting requirements in predicting the evolution of stresses and strains. In this work, we study the SH model calibration over a wide range of testing conditions using 12 OE and 25 CD tests by Wichtmann and Triantafyllidis (2016) on the Karlsruhe sands. The parameter space is extensively explored via Genetic Algorithm Optimization (GA) using the recently developed open-source software GA-cal (available at <https://github.com/FraJoMen/GA-cal>). This exploration allowed us to study the SH model's predictive limits and to identify, using a multi-objective analysis, the main parameters governing the compromise between the accurate prediction of stresses versus strain in the CD tests. Keywords  Automatic calibration, Hypoplasticity, Numerical optimization, Genetic Algorithm, Nonlinear Regression § INTRODUCTION Based on the first Hypoplastic constitutive law <cit.>, several models have been developed to describe the stress-strain behaviour of clay <cit.> and sand <cit.>, with extensions available for cyclic loads <cit.>. Arguably one of the most famous hypoplastic model is the one proposed by von Wolffersdorff <cit.>, often referred to as Sand Hypoplasticity (SH). This model has been successfully applied to a wide variety of problems in geotechnical engineering <cit.>, despite its limitations <cit.>. The SH model requires eight parameters. These are traditionally calibrated from geotechnical laboratory tests, as firstly proposed in <cit.>. The early approaches for the SH model calibration, however, relied on a large number of laboratory tests and estimates of the tangents to the response curves. Unfortunately, such estimates are usually impossible in some tests (e.g. in the oedometric curves) because of the coarse time-stepping, and are particularly sensitive to measurement noise in others (e.g. in the triaxial tests). Moreover, the formulas used to compute the model parameters are extremely sensitive to the input data, resulting in considerable uncertainties in the estimated parameters and the need for non-trivial manual adjustments to improve the model predictions. To reduce the manual adjustments in the SH calibration, a more robust approach has been proposed in <cit.> and made available in the free software ExCalibre (<www.soilmodels.com/excalibre>). This approach solely relies on experimental data from the oedometric (OE) and drained isotropically consolidated triaxial tests (CD) tests and uses a combination of empirical relations and optimization. Interestingly, this approach ignores the SH model predictions of the volumetric strain and uses the OE data to calibrate some of the parameters and the CD data to calibrate others. This is a convenient but restrictive simplification because all parameters play a role in determining the soil response in both tests. More general methods formulating the calibration of constitutive laws as a regression problem were proposed in <cit.>. The regression solution involves an optimization, for which both deterministic and stochastic approaches have been proposed, as reviewed in <cit.> and <cit.>. Stochastic Optimisers (SO) are notoriously less sample efficient than deterministic ones (see <cit.>) but allow for better exploring the parameter space without being trapped in local minima. These optimisers are based on the generation of pseudorandom numbers commonly used by the Monte Carlo method, which has also been applied in different fields in <cit.>. The most popular SO used in the parameter calibration of a constitutive model are the genetic algorithm (GA) <cit.>, the differential evolution <cit.>, and particle swarm optimisation <cit.>. The authors recently proposed the first calibration of SH using GA in <cit.>. In this work, the GA was proven able to provide a good calibration and was also employed to quantify the model prediction's sensitivity, the model parameters' uncertainty and the potential correlations between them. The availability of powerful optimization techniques and ever-increasing experimental datasets allows for exploring and stretching the SH model's predictive capabilities. To the author's knowledge, a practical problem that has yet to be addressed in the open literature is the extent to which the SH model can perform well in both OE and CD tests (thus, the calibration is possible) for different types of sands. While the SH model in the first calibration on the Hochstetten's sand by von Wolffersdorff <cit.> performed satisfactorily in all tests, many authors have reported on the limits of this model in predicting the volumetric deformations in the CD tests for other sands <cit.>. In this work, we study these limits and the conflicting requirements on the model parameter to predict stresses and strain in the CD test. Building upon an extensive exploration of the parameter space via GA, this work aims to investigate the SH model capabilities to describe the 12 OE and 25 CD tests[The data set is downloadable from the website <www.torsten-wichtmann.de/>] on the Karlsruhe sands published in <cit.>. Moreover, with the adaptive weighted sum approach to multiobjective optimization <cit.>, we analyze the relationship between the SH model parameters and the model performances in the CD tests. The analysis was carried out using the software GA-cal, an open-source software recently released by the authors <cit.> for solving the inverse problem of calibrating a constitutive law. The source code of GA-cal, a Fortran revisited version of the algorithms initially developed in Python <cit.>, is freely available at <https://github.com/FraJoMen/GA-cal>. The article is organized as follows. Section 2 recalls the calibration problem, while Section 3 describes the dataset and the preprocessing. Section 4 presents the calibration results and Section 5 collects the conclusions. § THE SH CALIBRATION PROBLEM The SH model proposed by <cit.> links the time derivative of the Cauchy effective stress 𝐓̇ and the void ratio ė, with the granulate stretching rate 𝐃 and the state variable e and 𝐓. This link depends on eight parameters; hence the SH model in the OE and CD test case can be written as a system of parametric nonlinear Ordinary Differential Equations (ODEs) as 𝐗̇=𝐇(𝐗; 𝐏) ; 𝐗(0)=𝐗_0 , where 𝐗=[𝐓;e] is the state vector and 𝐏 is the set of parameters: 𝐏={e_c0 , e_d0 , e_i0 , h_s , φ_c , n , α , β} . The reader is referred to appendix <ref> for more details on this model. For the scopes of this work, it suffices to recall that the model calibration consists in identifying the parameters 𝐏 that make the trajectory of the system 𝐗(t) match with a set of experimental data 𝐗(t_k) available on a discrete set of times k=1,… n_t. The experimental results are given in the plane (σ_v, e) for the OE test, with σ_v the effective vertical pressure, and in the triaxial deviatoric (ε_a, q) and triaxial volumetric (ε_a, ε_v) planes for the CD test, with q the deviatoric stress, and ε_a and ε_v the volumetric and the axial deformations. Following the approach proposed in <cit.>, the calibration aims to find the parameters that minimise a cost function. This cost function C(𝐏) measures the discrepancy between model prediction and available data. As in <cit.>, we define it as: C(𝐏)=w_1δ_1(𝐏)+w_2δ_2(𝐏)+w_3δ_3(𝐏) , where w_i weights the discrepancy in each plane on the model performance evaluation (σ_v, e), (ε_a, q) and (ε_a, ε_v). The δ_i, with i=1,2,3 functions in the (<ref>) are the average Fréchet distances between data and predictions, measured in appropriate dimensionless plans (see <cit.>). The weight in the (<ref>) can be used to prioritise the model performance on one plane or the other. In this work, we use these values to study the feasibility of identifying a set performing well on all planes and to reveal contrasting requirements. Using the GA-cal code, we minimise (<ref>) and explore the parameter space (i.e. the set of possible parameters) with Genetic Algorithm (GA) optimisation. § DATASET The selected experimental data were collected on the Karlsruhe fine sand. This sand is characterised by the subangular shape of most grains and no fines content, a mean grain size d_50 = 0.14 mm and a uniformity coefficient C_u = d_60/d_10 = 1.5 <cit.>. The initial conditions for the OE tests are reported in Table <ref>, while the initial conditions for the CD tests are reported in Table <ref>. These tables also report the initial relative densities of the samples I_D0. I_D0 = e_max - e_0/e_max- e_min . The minimum and maximum void ratios e_min = 0.677 and e_max = 1.054 were determined from standard tests at mean pressure p = 0 <cit.>. §.§ Pre-processing and Test Grouping To speed up the cost function evaluation (and hence allow for better exploration of the parameter space), the calibration is not carried out on the full data set. Instead, a sub-sampling was carried out by interpolating the available data. 10 points were uniformly distributed between 10 and 400 kPa for the OE test, while 15 points were uniformly distributed between points between ε_a = 0.01 % and max(ε_a). The significant sub-sampling drastically reduced the computational time with a negligible loss in accuracy, given the model predictions' smoothness. To analyse the robustness of the model calibration, the large number of experimental tests were divided into six groups characterised by different initial relative densities I_D0. Among the initial conditions identifying each test, the initial void ratio was found to be the one that most influenced the model calibration. The different groups, labelled G1, G2,..., G6 are listed in Table <ref>. These also differ in the number of tests. All input files, output files and the Python scripts for post-processing used in this work are made available in the folder Example in the GA-cal repository <https://github.com/FraJoMen/GA-cal>. § RESULTS This section is divided into two parts. In the first (Sec. <ref>), we analyse the GA calibrations on the previously defined groups to study the range of validity of each calibration and its sensitivity to the available data. In the second part (Sec. <ref>), we report on the Pareto front analysis to identify which parameters mostly influence the model performances in the different tests. §.§ The variability of SH model calibration For each of the six groups of calibration data sets in Table <ref>, we consider four sets of weights (w_1,w_2,w_3) (see equation (<ref>)). These are (1,1,1),(1,0,0),(0,1,0),(0,0,1); that is, the first gives equal importance to all planes, the second only focuses on the (σ_e,e) plane, the third on the (ε_a,q) plane, etc. Table <ref> reports a set of 24 possible combinations of parameters obtained via GA (labelled as C02, C03, etc) together with the parameters indicated by Wichtman and Triantafyllidis (WT) <cit.> (labelled as C01) for reference. For each combination, the table reports the weights used in the cost function and the data group used in the calibration. Moreover, the last column collects the fitness score in (<ref>), weighted by the number of tests n_i in the group used for the calibration and the sum of weights: η= C(𝐏)/∑^3_j=1 w_j n_i This normalization enables a fair comparison between parameters that have been evaluated in a different number of planes. The values of η show that the parameters derived by the GA calibration on all the data (combination C02-C07) outperform the parameter sets by Wichtman and Triantafyllidis (C01) according to the metrics in (<ref>). The error significantly reduces when the calibration focuses on one of the planes. Moreover, the test in group G2 apparently yields the largest error in the (ε_a, ε_v) plane. All these sets of parameters lead to comparable cost functions and can thus be considered `optimal' candidates if evaluated in the data used for their derivation. However, as we shall see shortly, their fitness decreases significantly when evaluated on different data. Moreover, some parameters are more variable than others. This is further illustrated in Table <ref>, which shows the average value for each parameter, theirs standard deviation to mean ratio, and theirs minimum and maximum value. It is thus clear that the parameter h_s, α, β vary significantly among the various calibration, contrary to e_i0, e_d0, e_c0. To evaluate the accuracy of each set of parameters, we now consider the mean deviation in the abscissa of each plane (σ_v, e), (ε_a, q) and (ε_a, ε_v), normalised by the corresponding maximum variation in the experimental data from each test. That is, given ξ_i=|Y_num-Y_dat|/max(Y_dat)-min(Y_dat) · 100 , with Y_num the SH model prediction and Y_dat the experimentally measured ones, in each plane, we define the global deviation as ξ=𝔼(ξ_i), where, 𝔼 is the expectation operator. Although this fitness measurement is less suited than the Fréchet distance for calibration purposes because it evaluates the model errors only in one of the axes in each plane, it allows for a more intuitive evaluation of the model performances in relation to the data variability. Indicatively, ξ≤ 20 % is acceptable for the CD test and ξ≤ 30 % for the OE test. The SH model performances using all the sets in Table <ref> is illustrated in detail in Figure <ref>. The x axis provides the ID of each test and the plane in which the deviation ξ is measured. The first 12 IDs are given to the OE tests, evaluated in the (σ_v, e) plane. The IDs from 12 to 37 are given to the CD tests evaluation in the (ε_a , q) plane, while the last IDs, from 37 to 62, are given to the CD tests evaluated in the plane (ε_a, ε_v). For each test, the upper portion of the graph indicates the minimum and the maximum deviation together with the associated parameter combination. The bottom portion of the graph shows the envelope of performances for all combinations, together with some illustrative cases. No combination reaches the minimal error in all planes. For the OE tests, ξ varies from 3.0 to 189.6 %, for the CD it varies from 3.1 to 181.1 %, in the (ε_a , q) plane and from 1.6 to 210.9 %, in the (ε_a , ε_v) plane. For example, the combination C12 provides excellent results in the CD in the (σ_v, e), with ξ∈ [4,30.7]% and mean 14.5%, but fails in both (ε_a, q) and (ε_a, ε_v) planes. Not surprisingly, the GA obtained this combination when the weights were set to (1,0,0). The trends for the combinations C03 and C20 are also shown using green and red lines in Figure <ref>. The combination C20 performs well in the plane (ε_a, ε_v) with an ξ∈ [3.7,17.7%] and mean 7.9%, while the combination C03 perform well in the plane (ε_a , q) and ξ∈ [3.9,21.0%] and mean 8.5%. While this is in line with the choice of weights for C20 and C12, the combination C03 gave equal weights to all planes, thus showing that the amount and the kind of data used for the training play an important role. Figure <ref> provides a qualitative overview of the good agreement between the experimental data and the numerical prediction with the combinations C12, C03 and C20. As shown in Figure <ref>, some experiments (CD11, CD12, CD13) can be well described with a single set of parameters (C05). We have ξ∈[2.5,23.4]%, with a mean of 9.1 %, for these tests. Figure <ref> also shows the average percentage deviation for the SH using the model parameters by Wichtman and Triantafyllidis (WT) <cit.> (combination C01) and for the combination C02, which was derived using all the dataset and giving all planes equal importance. Both C01 and C02 perform worst than the optimal combinations in each test, and the comparison shows that C01 favours the model accuracy in the planes (σ_v, e) and (ε_a,q) over the ones in the plane (ε_a, ε_v). To further illustrate the performances of the different combinations, Figures <ref> and <ref> plot the experimental data together with the model predictions using the best combination on that specific set (black dashed lines) and the predictions using the parameters by Wichtman and Triantafyllidis (C01, with the blue dotted line). While all the identified optimal combinations outperform C01, the improvement comes at the cost of considering a different set of parameters for each test. The relative importance of model accuracy in these planes depends significantly on the application. For example, in the slope stability analysis, one is more interested in the accurate modelling of the soil response in the plane (ε_a,q), and the combination C03 could suit that purpose. On the other hand, in the settlement prediction of a shallow foundation, one is primarily interested in the soil response in the plane (ε_a, ε_v), and hence combination C06 could be more appropriate. In problems such as soil-structure interaction, where the behaviour in all planes are equally relevant, one must accept a compromise (see combination C02) and use a set of coefficients that is sub-optimal in each plane taken separately. The main conclusion in this analysis is that the model calibration in these three planes yields contrasting objectives that bring the SH model to its limits. We search for the parameters driving the compromise in the following section. §.§ The Pareto Front The analysis of the combination C01 and C02, aimed at modelling the soil response in all planes, shows that the main discrepancies occurs in the planes (ε_a,q) and (ε_a,ε_v), in that the success in one of them yields failure in the other. In this section, we further analyse the performances in these two planes and identify which parameters are mostly involved in the conflicting requirements. Specifically, we treat the calibration as a multi-objective optimisation which seeks to minimise the average Fréchet distances in these two planes, i.e. δ_2 and δ_3 in (<ref>). We then search for the optimal trade-offs between the two objectives, i.e. the Pareto front <cit.> for the problem. At the Pareto front, improvements in one plane cannot be attained without worsening in the other. The search for the Pareto front was conducted using the weighted sum method <cit.>. This approach consists in performing a large set of single objective optimisations (in this case, 400) using weights defined as (1, w_p, 1) and (1, 1, w_p) where w_p is a vector of linearly spaced values from 0 to 10 with 200 elements. For each calibration, we monitor the values of δ_2 and δ_3, averaged over the 25 tests in Table <ref>. The results are plotted in Figure <ref>, with markers coloured by two of the eight parameters in the optimal set obtained by the calibration: α and φ_c. The Pareto front is qualitatively identified. Furthermore, the marker face colour allows us to reveal whether any of these parameters changes monotonically from one extreme of the front to the other, and is thus potentially correlated with the degradation of performances in one plane (and the consequent improvement in the other). The parameter α was included because this is often considered to be the main responsible for the poor performances in the (ε_v, q) plane and is usually calibrated to reproduce the peak stress rather than the volumetric deformation <cit.>. However, the plot in Figure <ref> display no clear trend along the Pareto front and thus does not support this common belief. Similar observations holds for the other parameters h_s, n, β, e_i0, e_c0 and e_d0, which are thus not shown. On the other hand, φ_c increases when moving from low δ_2 (high δ_3) to high δ_3 (low δ_2). Relatively low values of φ_c, in the range of 32-35 degrees, produce good predictions of the stress (low values of δ_2) but poor predictions in the strain (large values of δ_3). The opposite is true at the largest values of φ_c, in 36-39 degrees range. Wu et al. <cit.> have shown that the SH model oversimplifies the constitutive law in <cit.> and yields an unrealistic relation between the initial Poisson ratio ν_i and the friction angle at critical state φ_c. We here further explore (and corroborate) the reasons for Wu et al. <cit.>'s concerns. Figure <ref> plots the initial Poisson ratio ν_i, computed a posteriori from the calibrated curves, and the GA calibrated critical state φ_c for the 400 choices of weights that lead to the Pareto front identification. The different initial conditions (see Table <ref>) are made visible using different markers for the initial mean pressure p_0 and a colour scale for the void ratios e_0. The analysis confirms Wu et al. <cit.>'s observation on the link between ν_i and φ_c and complements it with the critical role of the initial conditions: the mean pressure p_0 becomes particularly important for low values of void ratios. Moreover, the analysis confirms that the SH model yields nonphysical negative values for ν_i at large values of φ_c, while the parameter α appears entirely uncorrelated from ν_i. The range 36-39 degrees for φ_c is the one that yields the best model predictions in the (ε_a,ε_v) plane. Therefore, the nonphysical values of ν_i appear to be necessary for the SH model to overcome its underlying simplification, trading the accuracy in the prediction of the initial (contractile) phases with the accurate prediction of the expansion at the largest values of ε_v. § CONCLUSIONS We studied the calibration of the SH constitutive law <cit.> in the 12 OE, and 25 CD tests on the Karlsruhe sands Wichtman and Triantafyllidis <cit.>. The parameter space was extensively explored using GA <cit.>, by setting the calibration problem in the optimisation framework proposed in <cit.>. In this framework, the calibration involves identifying the model parameter set that optimises a global performance measure. This is a weight-ed average of model performances in the (σ_v, e), (ε_a, q) and (ε_a, ε_v) planes so that acting on the set of weights it is possible to prioritise accuracy on one plane over the others and study how the model parameters control the model performances. The available data were divided into six groups. In each of these, the model was calibrated using four combinations of weights to obtain twenty-four sets of optimal parameters. The analysis of the average relative deviation for each combination across the full dataset confirms that the SH model can be made sufficiently versatile to interpret all the tests, but only if a different set of parameters is used for each. Moreover, a calibration that gives equal weight to all planes provides parameters that perform significantly worse than those obtained when the focus is narrowed to two or even one of the planes. This confirms the need for a compromise in the calibration, particularly in the prediction accuracy for stresses and deformations in the CD tests. We analysed the conflicting objectives in this compromise using a Pareto front analysis and identified the parameters primarily responsible for it. Contrary to the common belief that this compromise is ruled by the parameter α <cit.>, it was found that the trade-off in prediction accuracy for stresses and deformations in the CD tests is primarily due to the parameter φ_c. As previously highlighted by Wu et al. <cit.>, this parameter is tightly linked to the initial Poisson ratio ν_i, which becomes unrealistically close to zero and eventually negative at the large values of φ_c required to obtain good prediction in the (ε_a, ε_v) plane. Furthermore, it was shown that the initial conditions strongly influence the relation between φ_c and ν_i, and negative values of ν_i are obtained for smaller φ_c in the samples with the highest void ratio e_0. In conclusion, we have shown that the SH model can be used to predict the soil response in the (σ_v, e), (ε_a, q) and (ε_a, ε_v) planes if the focus is placed on each of these separately. Therefore, the SH model provides enough flexibility to study geotechnical problems such as slope stability or settlement prediction of a shallow foundation, which do not demand high accuracy in all planes simultaneously. However, the model performances are inherently limited for problems challenging it in all planes, such as soil structure interaction. The inevitable compromises needed in the calibration have been tightly linked to the parameter φ_c and thus to ν_i. § CONFLICT OF INTEREST The authors declare no conflict of interest. § THE SH MODEL In the formulation of SH by von Wolffersdorff <cit.>, the objective Zaremba-Jaumann <cit.> stress tensor ∘𝐓 is: ∘𝐓 = f_e f_b/(𝐓̂^2)( F^2 𝐃 + a^2(𝐓̂·𝐃)𝐓̂ + f_d a F (𝐓̂+𝐓̂^*)‖𝐃‖) where ‖ ‖ is the tensor norm ‖ A ‖=√((AA^T)), 𝐓̂^*= 𝐓̂-1/3 𝐈, with 𝐈 the identity tensor and 𝐓̂=𝐓/(𝐓). a =√(3)(3-sinφ_c)/2√(2)sinφ_c F =√(1/8tan^2ψ+2-tan^2ψ/2+√(2)tanψcos 3θ)-tanψ/2√(2) , where: tanψ =√(3)‖𝐓̂^*‖ cos 3θ =-√(6) (𝐓̂^*3 )/[ (𝐓̂^*2)]^3/2 . The barotropy coefficients f_b and f_e are: f_b=(e_i0/e_c0)^β h_sn1+e_i/e_i(-(𝐓)h_s)^1-n3+a^2-a √(3) ( e_i0-e_d0e_c0-e_d0)^α , f_e =(e_c/e)^β . The pyknotropy coefficient f_d is defined as f_d=(e-e_d/e_c-e_d)^α . The maximal (e_d), minimal (e_i) and critical (e_c) void ratio are linked by the system: e_i/e_i0=e_d/e_d0=e_c/e_c0=exp[-(-(𝐓)/h_s)^n] . The materials parameters 𝐏={e_c0 , e_d0 , e_i0 , h_s , ϕ , n , α , β} are: * e_c0, e_d0 e_i0. These are, respectively, the critical the minimal and the maximal void ratios, obtained when p_s=(𝐓)=0 in (<ref>). * h_s is called granular hardness, and Its increasing increases stiffness and dilatancy. * φ_c is the critical friction angle at the critical state. * n is a parameter influencing the barotropy of the soil, influencing the stiffness, peak resistance and dilatancy. * α is the exponent in the calculation of the pyknotropy coefficient f_d and controls the dependency of peak friction angle on relative density. * β is a coefficient influencing barotropy and pyknotropy. Increasing β produces an increase of the stiffness of material and in particular the shear stiffness. The reader is referred to <cit.> for more details on these parameters, and to <cit.> for more details on the model formulation and the relevant simplifications related to the OD and CD tests. §.§ Acknowledgements The authors gratefully acknowledge the support and the discussions with the engineer Pierantonio Cascioli, from GEINA srl, and Gabriele Sandro Toro, laboratory technician of the Department of Engineering and Geology of the Faculty Gabriele D'Annunzio of Chieti. ieee_fullname
http://arxiv.org/abs/2303.07108v1
20230313134345
Quantum ghost imaging of a transparent polarisation sensitive phase pattern
[ "Aditya Saxena", "Manpreet Kaur", "Vipin Devrari", "Mandip Singh" ]
quant-ph
[ "quant-ph" ]
Upcycling Models under Domain and Category Shift Sanqing Qu^1Equal Contribution , Tianpei Zou^1, Florian Röhrbein^2, Cewu Lu^3, Guang Chen^1Corresponding author: guangchen@tongji.edu.cn , Dacheng Tao^4,5, Changjun Jiang^1 ^1Tongji University, ^2Chemnitz University of Technology, ^3Shanghai Jiao Tong University, ^4JD Explore Academy, ^5The University of Sydney March 30, 2023 ================================================================================================================================================================================================================================================================================================================================= empty § INTRODUCTION Quantum ghost imaging of light absorbing objects relies on Einstein-Podolsky-Rosen (EPR) quantum entanglement of photons <cit.>. A single photon after interaction with an absorptive object is detected by a stationary detector and a non-interacting photon is detected in the image plane of an imaging lens in a coincidence measurement with the interacting photon. EPR entanglement of photons manifests position correlations between the object plane and its ghost image plane. In quantum ghost imaging, a momentum state of the interacting photon is measured in the object plane by placing a lens after the object plane, which focus the photon on a stationary single photon detector. Therefore, a photon detection does not reveal any information of location on the object where a photon has interacted with it. In other words, momentum measurement projects an interacting photon quantum state in a quantum superposition of its position states in the object plane. In contrast, a non-interacting photon is measured in a position basis in the image plane. Quantum ghost imaging techniques of photon-absorptive objects has been extensively investigated theoretically as well as experimentally <cit.>. Classical ghost imaging has been of considerable interest with thermal light <cit.>. Quantum imaging of spiral objects has been realised with random light <cit.>. Furthermore, ghost imaging experiments are performed with X-rays <cit.>, electrons <cit.> and correlated atoms <cit.>. A transparent phase object is imaged with quantum entangled photons using ghost diffraction <cit.> and computational ghost imaging technique <cit.>. In a direct coincidence imaging experiment, a polarisation sensitive meta-surface is imaged with polarisation entangled photons <cit.>. In this paper, a quantum ghost imaging experiment of a transparent polarisation sensitive phase pattern is presented, which manifests a polarisation and position dependent phase shift of transmitted photons. To image such type of pattern represented by a unitary transformation, quantum entanglement in the polarisation degree of freedom is incorporated in addition to EPR entanglement of photon pairs. Photons are EPR entangled and polarisation entangled separately in the form of a hyper-entangled state. Polarisation entanglement leads to detection of polarisation sensitive phase shift exhibited by the pattern and EPR entanglement correlates position states of an interacting photon in the object plane with position states of a non-interacting photon in the image plane. However, experiment presented in this paper is performed in quantum mechanical way, where the which-position-polarisation information of interacting photon on the pattern is not available even in principle. This experiment is a quantum ghost imaging version of a direct coincidence imaging experiment of a transparent polarisation sensitive phase pattern described in Ref. <cit.>. However, in this paper the quantum entanglement under consideration involves EPR and polarisation degrees of freedom in hyper-entanglement of photon pairs, where in Ref.<cit.> the hyper-entangled state involves momentum and polarisation degrees of freedom. These two experiments are fundamentally different. To produce a quantum ghost image, EPR-polarisation hyper-entanglement becomes necessary as further described in this paper. Therefore, experimental and theoretical analysis given in Ref. <cit.> cannot be applied directly to the present experiment. Furthermore, the experiments described in this paper and in Ref.<cit.> are very different from the experiment described in Ref.<cit.> which involves only polarisation entanglement of photon pairs and a direct imaging is performed in the close vicinity of object. In contrast, experiment presented in this paper and in Ref.<cit.> are realised for a large optical path length, where the object is situated at a large distance from the imaging camera . Hyper-entanglement is necessary to realise a ghost and direct imaging of the distant object by jointly measuring momentum-polarisation of interacting photon and position-polarisation of non-interacting photon. As a consequence of EPR-polarisation hyper-entanglement the polarisation, momentum and position quantum states of an individual photon are completely undefined prior to a measurement. Hyper-entangled photons are produced by type-II spontaneous parametric down conversion (SPDC) at the intersection of emission cones of down converted photons. A nonlinear crystal is pumped by a broad diameter laser beam to produce the required quantum entangled state of photons. A polarisation sensitive phase pattern is produced by a spatial light modulator (SLM). A corresponding quantum ghost image is captured on an intensified-charge-coupled-device (ICCD) single photon sensitive camera. ICCD camera detects a non-interacting photon only if an interacting photon is detected with a particular measurement outcome by a stationary single photon detector, which triggers the camera. A quantum ghost image gradually emerges after accumulating the detections of non-interacting photons by repeating the experiment for the same measurement outcomes. Each detection event of the non-interacting photon on the camera corresponds to its position measurement. However, momentum measurement outcome of interacting photon is kept same in all measurements presented in this paper, which reveals no position-information of the interacting photon on the pattern. Different quantum ghost images are produced for different polarisation detection outcomes of photons in a selected diagonal polarisation basis. By ignoring the interacting photon measurement outcomes or by letting this photon escape without any measurement, no ghost image is produced by single photon accumulation on camera. This is regarded as one of the main characteristics of quantum ghost imaging method, where an individual photon reveals no information of the pattern because of quantum entanglement. § CONCEPT AND EXPERIMENT Consider a schematic diagram of a ghost imaging configuration as shown in Fig. <ref>, where a hyper-entangled photons pair is produced by a source positioned around origin. Photon-1 passes through a polarisation sensitive phase pattern without absorption. After that, it passes through a polariser and a convex lens L_o, which focus photon-1 on a single photon detector. If the detector detects photon-1, then a particular joint measurement outcome corresponding to a specific polarisation and momentum state of photon-1 in an object plane containing the pattern is produced. Whereas photon-2 never interacts with the pattern. It is detected by a single photon sensitive coincidence camera, which measures its position in an image plane of an imaging convex lens after a polarisation selection made by a polariser-2. Coincidence camera detects photon-2 only if it receives a trigger signal from a single photon detector i.e. a signal corresponding to a particular joint measurement outcome of photon-1. An imaging lens is placed in path of photon-2 such that an object plane corresponds to a plane containing the pattern and an image plane corresponds to a plane of camera image sensor. Since the pattern under consideration is transparent and it introduces a polarisation dependent phase shift therefore, it cannot be imaged with conventional ghost imaging method for absorptive objects. The current setup shown in Fig. <ref> differs from a conventional setup in three main aspects, (a) photons are polarisation entangled and EPR entangled separately, which is a necessary condition to produce a quantum ghost image of a transparent polarisation sensitive phase pattern. Polarisation entanglement detects the polarisation dependent phase shift and EPR entanglement correlates locations of photons between the object and image planes. (b) The polarisation and momentum state of photon-1 are measured together in the object plane. (c) The polarisation and position states of photon-2 are measured together in the image plane. A quantum ghost image is produced by correlating the joint measurement outcomes of both photons. In one-dimension, EPR quantum state in position basis can be written as |α⟩=∫^∞_-∞|x⟩_1|x+x_o⟩_2dx, where subscripts 1 and 2 are particle labels and x_o is position difference between position states of particles. In momentum basis, the same quantum state can be written as |α⟩=∫^∞_-∞e^i p x_o/ℏ|p⟩_1|-p⟩_2dp, where particles have opposite momenta and ℏ=h/2π is the reduced Planck's constant. Therefore, both position and momentum of each particle are completely unknown. If x_o=0, then both particles have same position in the integral. In addition, for the EPR quantum state |α⟩, both particles are equally likely to be found at all spatial and momentum locations i.e. spatial and momentum extensions of their position and momentum wavefunctions are infinite. In this paper, a three dimensional time independent scenario for photons is considered, where a finite source of photons is positioned around origin as shown in Fig. <ref>. Let 𝐫' be an arbitrary point in the source where both photons are produced together. An amplitude to find photon-1 at point o_a in region-a and photon-2 at point o_b in region-b originating from a point 𝐫' and prior to any optical element can be written as e^ip_1|𝐫_a-𝐫'|/ℏ/|𝐫_a-𝐫'|e^ip_2|𝐫_b-𝐫'|/ℏ/|𝐫_b-𝐫'| <cit.>, where p_1 and p_2 are magnitudes of momentum of photon-1 and of photon-2, respectively. Consider 𝐫_a and 𝐫_b are position vectors of points o_a and o_b from origin, respectively. Therefore, |𝐫_a-𝐫'| and |𝐫_b-𝐫'| are distances of o_a and o_b from 𝐫', respectively. In addition, |H⟩_a and |V⟩_b are the polarisation quantum states of photon-1 propagating in region-a and of photon-2 propagating in region-b, respectively. For an extended source, a quantum state leading to a finite amplitude to find a photon at o_a with polarisation state |H⟩_a and a photon at o_b with polarisation state |V⟩_b is a linear quantum superposition of amplitudes originating from all the points in the source, which can be written as |Ψ⟩_12=A_o∫^∞_-∞∫^∞_-∞∫^∞_-∞ψ(x',y',z') e^ip_1|𝐫_a-𝐫'|/ℏ/|𝐫_a-𝐫'|e^ip_2|𝐫_b-𝐫'|/ℏ/|𝐫_b-𝐫'|dx'dy'dz' ⊗|H⟩_a|V⟩_b where, A_o is a constant and ψ(x',y',z') is an amplitude of pair creation at a location r'(x',y',z'). For a special case of an infinitely extended EPR state the amplitude of pair production ψ(x',y',z') is constant for any arbitrary position vector 𝐫'. A symbol ⊗ denotes separation of quantum states of different uncoupled degrees of freedom. Consider magnitudes of photons momenta are equal, p_1=p_2=p. Therefore, due to Bosonic nature of identical photons, a symmetric quantum state of photons is written as |Ψ⟩= 1/√(2)(|Ψ⟩_12+|Ψ⟩_21), where |Ψ⟩_21 is a quantum state given in Eq. <ref> after the exchange of photons. Therefore, after symmetrization <cit.>, a total symmetric quantum state can be written as |Ψ⟩= A_o∫^∞_-∞∫^∞_-∞∫^∞_-∞ψ(x',y',z') e^ip|𝐫_a-𝐫'|/ℏ/|𝐫_a-𝐫'|e^ip|𝐫_b-𝐫'|/ℏ/|𝐫_b-𝐫'|dx'dy'dz' ⊗1/√(2)(|H⟩_1|V⟩_2+|V⟩_1|H⟩_2) This integral represents a continuous variable entangled quantum state for a finite extension of EPR source and 1/√(2) (|H⟩_1|V⟩_2+|V⟩_1|H⟩_2) represents a discrete variable symmetric polarisation entangled state. Total quantum state in Eq. <ref> is a hyper-entangled state, this combined quantum state is a tensor product of quantum entangled states in different degrees of freedom. A pair creation amplitude is considered be a gaussian function such that ψ(x',y',z')= a e^-(x'^2+y'^2)/σ^2e^-z'^2/w^2, where a is a constant, σ and w are the widths of the gaussian. Consider two planes parallel to xy-plane located on z-axis at distance s_1 (plane-1) and s_2 (plane-2) from origin. An amplitude to find photon-1 on plane-1 and photon-2 on plane-2 can be evaluated close to z-axis as follows. Consider distances of planes are such that σ^2p/h s_1≥ 1 and σ^2p/h s_2≥ 1, where s_1 and s_2 are much greater than σ and w. This approximation is applicable to the experimental considerations presented in this paper. However, in Ref.<cit.>, a small source extension is considered i.e. σ^2p/h s_1≪1 and σ^2p/h s_2≪ 1, which leads to a momentum-polarisation hyper-entanglement of photons. Therefore, Eq. <ref> becomes |Ψ⟩= a A_o/s_1s_2 e^ip(s_1+s_2)/ℏ∫^∞_-∞e^-x'^2/σ^2 e^ip/ℏ((x_1-x')^2/2s_1+(x_2-x')^2/2s_2)dx' ∫^∞_-∞e^-y'^2/σ^2 e^ip/ℏ((y_1-y')^2/2s_1+(y_2-y')^2/2s_2)dy' ∫^∞_-∞e^-z'^2/w^2 e^-i2p/ℏz'dz' ⊗1/√(2)(|H⟩_1|V⟩_2+|V⟩_1|H⟩_2) After solving this integral, Eq. <ref> can be succinctly written as |Ψ⟩= Φ(x_1,y_1; x_2, y_2) ⊗ (|H⟩_1|V⟩_2+|V⟩_1|H⟩_2)/√(2), where Φ(x_1,y_1; x_2, y_2) is a two-photon position amplitude with variables in the argument separated by a semicolon denoting a position of photon-1 on plane-1 and of photon-2 on plane-2 such that Φ(x_1,y_1; x_2, y_2)= c_ne^ip/ℏ(s_1+s_2) e^-iϕ/(4s^2_1s^2_2+(p/ℏ)^2σ^4 (s_1+s_2)^2)^1/2exp(-(p/ℏ)^2(s_1 s_2σ)^2((x_1/s_1+x_2/s_2)^2+ (y_1/s_1+y_2/s_2)^2)/4s^2_1s^2_2+(p/ℏ)^2σ^4 (s_1+s_2)^2-(p/ℏ)^2w^2) exp( -ip/2 ℏ((x_1/s_1+ x_2/s_2)^2 + (y_1/s_1+ y_2/s_2)^2) (p/ℏ)^2σ^4 s_1 s_2 (s_1+s_2) /4s^2_1s^2_2+(p/ℏ)^2σ^4 (s_1+s_2)^2) exp(ip/2 ℏ(x^2_1+y^2_1/s_1+x^2_2+y^2_2/s_2)) provided tan(ϕ)=-p(s_1+s_2)σ^2/2ℏ s_1 s_2 with c_n as a constant. The resulting quantum state of photons is a product of a continuous variable EPR entangled quantum state, where position states of photons on two planes are quantum entangled with each other, and a discretely entangled quantum state in the polarisation degree of freedom. In this analysis to evaluate Φ(x_1,y_1; x_2, y_2), photons propagation close to z-axis is considered. However, by considering propagation along all directions in three-dimensional space for a large distance from the source, it is shown in Ref.<cit.> that photons propagate in opposite direction along z-axis. Therefore, equation of plane-1 is z=-s_1 where photon-1 is found and of plane-2 is z=s_2 where photon-2 is found. In actual experiment, anti-symmetric polarisation entangled state is produced as it remains same in the diagonal polarisation basis. Photons are propagating in the opposite direction along z-axis from the source, in non-overlapping regions. This imposes a condition that Φ(x_2,y_2; x_1, y_1)=0, when photons are further exchanged <cit.>. Therefore, a hyper-entangled state produced by source can be written as |Ψ⟩= Φ(x_1,y_1, z_1=-s_1; x_2, y_2, z_2=s_2) ⊗1/√(2)(|H⟩_1|V⟩_2-|V⟩_1|H⟩_2) where z-position of photons is incorporated in Φ(x_1,y_1, z_1=-s_1; x_2, y_2, z_2=s_2). §.§ Quantum ghost interference EPR entanglement part of Eq. <ref> produces a quantum ghost interference <cit.>, which can be captured on a coincidence camera if a polarisation sensitive phase pattern is replaced with a double-slit positioned in a plane z=-s_1, which is plane-1. Since a double-slit under consideration is polarisation independent therefore, polarisation entanglement does not contribute to ghost interference. Polariser-1 and polariser-2 can be removed to make no polarisation measurement. A convex lens L_o focus photon-1 on a single photon detector. Detection of photon-1 at the detector projects quantum state of photon-1 onto a momentum state in a plane z=-s_1. In other words, this measurement projects photon-1 quantum state onto a quantum superposition of position states in a plane of the double-slit. This measurement does not reveal any which-path information at the double-slit. Interference pattern is produced in coincidence measurements of photons, where position of photon-2 is measured in a plane defined as an interference plane, which is same as z=s_2 plane-2, located in path of photon-2. To obtain a quantum ghost interference, an imaging lens is removed and a camera detector surface is placed in the interference plane to detect position of photon-2. In another configuration, an imaging lens is placed such that its object plane corresponds to an interference plane and a corresponding image plane is further imaged by a telescope onto the camera. The latter configuration is preferable in experiments involving a long optical path. Consider a double-slit of slit separation d along x-axis at y=0. A transmission function of the double-slit can be written as A_T(x_1,y_1)= (δ(x_1-d/2)δ(y_1)+δ(x_1+d/2)δ(y_1))/√(2). Therefore, an amplitude of coincidence detection of photon-1 by the detector and photon-2 in the interference plane at a location (x_2, y_2) can be written as A_12(x_2, y_2)= ∫^∞_-∞∫^∞_-∞A_T(x_1, y_1) Φ(x_1,y_1, -s_1; x_2, y_2, s_2) dx_1dy_1 Here, integration represents a projection onto a quantum superposition of position states of photon-1 in plane-1 containing a double-slit. Therefore, the probability of coincidence detection P_12(x_2, y_2)=|A_12(x_2,y_2)|^2 represents a quantum ghost interference. Quantum ghost interference patterns shown in Fig. <ref> are obtained by solving Eq. <ref>, for a double-slit located at z=-s_1=-1.33 m and an interference plane located at z=s_2=1 m. A slit separation of double-slit is d=2 mm and σ=3 mm. In Fig. <ref> (a), single slits of the double-slit are positioned at x_1=1 mm and x_1=-1 mm and in (b) single slits are positioned at y_1=1 mm and y_1=-1 mm. A quantum ghost interference pattern originates due to EPR-entanglement of Φ(x_1,y_1, -s_1; x_2, y_2, s_2). §.§ Quantum ghost imaging of a polarisation sensitive phase pattern: Theory To produce a quantum ghost image of a transparent polarisation sensitive phase pattern an imaging lens of focal length f is positioned such that the pattern is located in its object plane z=-s_1 at a distance u from imaging lens, where u>f. Coincidence camera is positioned in an image plane of imaging lens located at a distance v from the lens. Imaging lens and pattern are positioned on opposite locations w.r.t. source as shown in Fig. <ref>. Therefore, position of imaging lens from origin is s_2=u-s_1. Neither of the photons reveal information of the pattern therefore, a quantum ghost image is obtained by making correlated joint measurements on both photons. Consider, a cartesian coordinate (ξ,η)-plane, coinciding with a plane z=s_2 with origin on z-axis, where a thin imaging lens is positioned such that ξ-axis is parallel to x-axis and η-axis is parallel to y-axis. A polarisation sensitive phase pattern transforms the polarisation quantum state of photon-1 as a unitary transformation i.e. |H⟩_1↦ e^iϕ(x_1, y_1)|H⟩_1 and |V⟩_1↦|V⟩_1 at a position (x_1, y_1) on the pattern. Where ϕ(x_1, y_1) is an arbitrary position dependent phase shift introduced by the pattern. This transformation couples the polarisation entanglement with a position of photon-1 on the pattern. A quantum image state is defined as a quantum state that results in coincidence detection of photon-1 at a position (x_1, y_1) just after passing through the pattern and photon-2 at a position (x_2, y_2) in the image plane of imaging lens but without polarisation measurement. A quantum image state can be written as |Ψ⟩_I=c_I∫^∞_-∞∫^∞_-∞Φ(x_1,y_1, -s_1; ξ,η, s_2) a_p2(ξ,η) e^-ip/ℏ(ξ^2+η^2)/2 f e^ip/ℏ((x_2-ξ)^2/2v+(y_2-η)^2/2 v)dξdη 1/√(2)(e^iϕ(x_1,y_1)|H⟩_1|V⟩_2-|V⟩_1|H⟩_2) which is succinctly written as |Ψ⟩_I= Φ_I(x_1, y_1; x_2, y_2) (e^iϕ(x_1,y_1)|H⟩_1|V⟩_2-|V⟩_1|H⟩_2)/√(2), where c_I is a constant, a_p2(ξ,η) is a transmission function of an aperture placed close to the imaging lens, e^-ip(ξ^2+η^2)/2fℏ is the phase shift term introduced by the imaging convex lens. After transmission through the lens, photon-2 propagates to the imaging plane where propagation from a position (ξ,η) to a position (x_2, y_2) is given by the term e^ip((x_2-ξ)^2+(y_2-η)^2)/2vℏ. For a circular lens of radius ρ without any additional aperture, the transmission aperture function a_p2(ξ,η) = 1 for ξ^2+η^2≤ρ^2 and zero otherwise. A quantum ghost image is obtained by correlating the joint measurements of polarisation and momentum of photon-1 in the object plane with measurements of polarisation and position of photon-2 in the image plane. Consider a diagonal polarisation basis for photon-j (j=1 or 2) such that |d^+⟩_j=(|H⟩_j+|V⟩_j)/√(2) and |d^-⟩_j=(|H⟩_j-|V⟩_j)/√(2), where |d^+⟩_j, |d^-⟩_j represent linear polarisation states of photon-j with planes of polarisation at δ_j=+45^o and δ_j=-45^o w.r.t. x-axis, respectively. If pass axes of polariser-1 and polariser-2 are oriented at δ_1=δ_2=-45^o then photon-1 is measured in a polarisation state |d^-⟩_1 and photon-2 is measured in a polarisation state |d^-⟩_2 after their detection. Therefore, from Eq. <ref> the probability of coincidence detection corresponding to a polarisation measurement outcome (|d^-⟩_1, |d^-⟩_2) can be calculated as P_d^-_1, d^-_2(x_2,y_2)=|∫^∞_-∞∫^∞_-∞_2⟨ d^-|_1⟨ d^-|Ψ⟩_I a_p1(x_1,y_1)dx_1dy_1|^2 which can be written as P_d^-_1, d^-_2(x_2,y_2)=|∫^∞_-∞∫^∞_-∞ a_p1(x_1,y_1) Φ_I(x_1, y_1; x_2, y_2) (1-e^iϕ(x_1, y_1)/2√(2))dx_1dy_1 |^2 where a_p1(x_1,y_1) is the aperture transmission function of an aperture placed just after the pattern being imaged. Similarly, if polarisers are aligned such that δ_1=+45^o and δ_2=-45^o for (|d^+⟩_1, |d^-⟩_2) measurement, then the probability of coincidence detection of photons can be written as P_d^+_1, d^-_2(x_2, y_2)=|∫^∞_-∞∫^∞_-∞ a_p1(x_1,y_1)Φ_I(x_1, y_1; x_2, y_2) (1+e^iϕ(x_1, y_1)/2√(2))dx_1dy_1|^2 The coincidence detection probability represents a quantum ghost image of a polarisation sensitive phase pattern. Quantum ghost images P_d^-_1, d^-_2(x_2,y_2) and P_d^+_1, d^-_2(x_2,y_2) are inverted w.r.t each other. §.§ Experiment A polarisation sensitive phase pattern under consideration is shown in Fig. <ref> (a), which is produced by SLM. A lighter region on the pattern introduces a phase shift ϕ(x_1,y_1)=π for horizontally polarised photon-1 and a darker region corresponds to ϕ(x_1,y_1)=0. After a transformation by the pattern i.e. |H⟩_1↦ e^iϕ(x_1, y_1)|H⟩_1 and |V⟩_1↦|V⟩_1, a polarisation entangled state of photons becomes |Ψ^-⟩_p=(|H⟩_1|V⟩_2-|V⟩_1|H⟩_2)/√(2) for ϕ(x_1,y_1)=0 and |Ψ^+⟩_p=-(|H⟩_1|V⟩_2+|V⟩_1|H⟩_2)/√(2) for ϕ(x_1,y_1)=π. A schematic of experiment performed is shown in Fig. <ref>. Hyper-entangled photons are produced by type-II SPDC process in a beta-barium-borate (BBO) nonlinear anisotropic crystal. A broad beam diameter pump laser light of wavelength 405 nm is incident on the crystal, which is aligned to produce non-collinear degenerate 810 nm photons. Photons are hyper-entangled at the intersection of conical emission profiles of down converted photons. Intersection regions expand with distance from BBO crystal and width of each region is about 7 mm in a transverse plane at a distance 1.33 m from the crystal. EPR entanglement and polarisation entanglement are produced at the intersection regions. A compensation crystal is placed after the first BBO crystal to compensate for longitudinal and transverse walk-offs. Compensation crystal is aligned parallel to the first crystal such that optic axes of both crystals are parallel to each other and both photons pass through the compensation crystal. A half wave-plate is inserted between the two crystals to interchange orthogonal linear polarisation states. Photon-1 of an entangled pair is incident on SLM close to a normal incidence, which produces a polarisation sensitive phase pattern. Difference between angle of reflection and angle of incidence on SLM is about 8^o. After passing through a convex lens L_o, polariser-1 and an optical bandpass filter of center wavelength 810 nm, photon-1 is detected by a single photon detector. Photon-2 never interacts with the pattern and it passes through an imaging convex lens. Imaging lens is positioned such that it produces an image of SLM surface onto the image plane as shown in Fig. <ref>. This image plane acts as an object for a telescope, which produces its image on ICCD camera. Photon-2 travels a longer optical distance as compared to photon-1 in order to provide time to ICCD camera to open its direct gate electronic shutter after receiving a trigger signal from single photon detector. ICCD camera direct gate shutter opening delay time is 20 ns after receiving a trigger signal. Optical distance of ICCD camera from BBO crystal is 17.83 m and an optical distance of SLM surface from ICCD camera is 19.16 m. Optical distance of SLM surface from BBO crystal is 1.33 m. Focal length of imaging lens is 1.5 m, this lens images SLM surface onto the image plane as shown in Fig. <ref> however, imaging lens distance from BBO crystal is same as its focal length to collimate non-interacting photons on the telescope, otherwise photon coincidence counts reduce considerably. Telescope consists of three convex lens system, where lens L_1 of focal length 40 cm and diameter 5 cm produces a real image of an image plane of the imaging lens. Lens L_2 of focal length 10 cm produces a virtual image of the real image produced by lens L_1. Lens L_3 of focal length f_3= 1 m is configured in a 2f_3 imaging configuration such that ICCD camera detector surface is placed at a distance 2 m from lens L_3 to image the virtual image produced by lens L_2. Since a virtual image is displaced by displacing lens L_2 therefore, a sharp image is produced on ICCD camera sensor surface if virtual image is located at a distance 2f_3 from lens L_3. In this configuration, only lens L_2 is displaced to image any plane under consideration. Polariser-2 is placed close to ICCD camera after the telescope. Polariser-1 is placed at a distance 22 cm from SLM as shown in Fig. <ref>. Polarisation entanglement part of the hyper-entangled state is characterised by violating Clauser, Horne, Shimony, Holt (CHSH) inequality i.e. 0<|S|<2 <cit.>. Experimentally measured value of parameter is S=-2.57. A polarisation sensitive phase pattern is shown in Fig. <ref> (a). A quantum ghost image of the pattern is constructed by measuring coincidence photon counts between single photon detector and different locations on ICCD camera. Prior to any quantum ghost image measurement, a coincidence background ghost image is captured on ICCD camera by imprinting a uniform polarisation sensitive phase pattern on SLM that leads to minimum coincidence photon counts for the same inclination of polarisers that is δ_1=δ_2=-45^o. This background image is subtracted from all subsequent images to obtain a quantum ghost image. A polarisation sensitive phase pattern is shown in Fig. <ref>(a), where a lighter region transforms the polarisation entangled state to |Ψ^+⟩_p and a darker region represents an identity transformation resulting same polarisation entangled state |Ψ^-⟩_p as produced by the source. A quantum ghost image of this polarisation sensitive phase pattern is shown in Fig. <ref> (b) for same inclination of pass axes of polarisers i.e. δ_1=δ_2=-45^o. The quantum ghost image of the same pattern gets inverted as shown in Fig. <ref> (c), when pass axis of polariser-1 is inclined at δ_1=+45^o and pass axis of polariser-2 remains at same inclination, δ_2=-45^o. A coincidence background image and a coincidence image with the pattern under consideration are taken for 30 min time of exposure of ICCD camera under the direct gate operation in accumulation mode. In accumulation mode, frames captured during the exposure time are accumulated. However, a frame can register photon-2 only if direct gate shutter is opened by the trigger signal during its acquisition. Negative coincidence counts regions in Fig. <ref> (b) and (c) are due to experimental fluctuations because each quantum ghost image is constructed by subtracting a background image from an image with the pattern. The quantum ghost image shown in Fig. <ref>(c) is an inverted image w.r.t. the quantum ghost image shown in Fig. <ref>(b). Demagnification of each image is 0.87. Single photon-2 accumulation on ICCD camera without making any correlation with photon-1 measurements results in no image formation. § CONCLUSION This paper presented an experiment on quantum ghost imaging of a transparent polarisation sensitive phase pattern with EPR-polarisation hyper-entangled photons. Since the pattern is polarisation sensitive therefore, polarisation entanglement is incorporated to detect a polarisation sensitive phase exhibited by the pattern. A quantum ghost image is a combined result of EPR entanglement and polarisation entanglement of photons. Paper presented a detailed analysis of hyper-entanglement of photons, quantum ghost interference and quantum ghost imaging. The required hyper-entangled state is produced with type-II SPDC process in a BBO crystal. The experiment is performed with a gated ICCD single photon sensitive camera to capture coincidence ghost images. Each quantum ghost image is background corrected. Two joint measurements on each photon, which correspond to polarisation, momentum of photon-1 and polarisation, position of photon-2, are correlated to construct a quantum ghost image. § METHODS Hyper-entangled photon pairs are produced by Type-II degenerate SPDC process in a BBO crystal at 810 nm. This source configuration is different from the configuration used in a previously published quantum imaging experiment based on hyper-entangled photon pairs, where a hyper-entangled state consists of momentum entanglement and polarisation entanglement, which is produced at a very large distance from the source as described in Ref.<cit.>. In the present paper, hyper-entangled state consists of EPR-entanglement and polarisation entanglement, which is produced at the intersection of down converted cones. However, in the present source the beam size of the pump laser beam is approximately expanded by twenty times as compared to the source described in Ref.<cit.>. In this configuration, the integral given by Eq. <ref> cannot be approximated as given in the previous paper Ref.<cit.>. EPR entanglement produces quantum ghost interference however, momentum entanglement cannot produce quantum ghost interference. EPR-entanglement and polarisation entanglement produce a quantum ghost image of the polarisation sensitive phase pattern. Typical pump laser power passing through the BBO crystal is 60 mW at 405 nm. A walk-off compensation crystal of half thickness is placed parallel to the first crystal and a half wave plate is placed between the two crystals to interchange orthogonal linear polarisation states. Diameter of each intersection region of cones expands with distance from the crystal. The required EPR-polarisation hyper-entangled state is produced at the intersection regions. No image is observed for non-interacting photon accumulation on ICCD camera without correlating it with the interacting photon. In a coincidence measurement, the direct gate electronic shutter of ICCD camera is opened by a trigger pulse generated by the single photon detector after detection of an interacting photon. Direct gate shutter opening allows a detection of photon by the ICCD camera. Direct gate shutter remains open for the duration of trigger pulse which is 10 nsec. Single photon detector produces 2×10^4 trigger pulses per second. Therefore, the direct gate shutter opens 3.6×10^7 times in 30 min while camera is accumulating frames continuously. A narrow time window and low photon pair generation rate allow a selective detection of an entangled pair of photons i.e. it significantly reduces the overlapping of detection events of a selected pair of photons with another pairs. Ghost images shown in Fig. <ref> correspond to accumulation of photon counts in the coincidence window for 30 min time of frame-accumulation on the ICCD camera. A separate background ghost image of a uniform pattern is taken under same conditions. Background image is subtracted from each image of a pattern under consideration to obtain its background corrected ghost image shown in Fig. <ref>. Image accumulation and background substraction are performed by the ICCD camera. § ACKNOWLEDGMENTS Mandip Singh acknowledges research funding by the Department of Science and Technology, Quantum Enabled Science and Technology grant for project No. Q.101 of theme title “Quantum Information Technologies with Photonic Devices”, DST/ICPS/QuST/Theme-1/2019 (General). § AUTHOR CONTRIBUTIONS MS setup the experiment. MK, AS and MS performed the experiment. MK, AS and VD took data. MS developed concept and theory. MS drawn diagrams and wrote the manuscript. § COMPETING INTERESTS The authors declare no competing interest. § DATA AVAILABILITY STATEMENT All data generated or analysed during this study are included in this published article.
http://arxiv.org/abs/2303.07079v1
20230313130355
Automatically Identifying Relations Between Self-Admitted Technical Debt Across Different Sources
[ "Yikun Li", "Mohamed Soliman", "Paris Avgeriou" ]
cs.SE
[ "cs.SE", "cs.AI" ]
Automatically Identifying Relations Between Self-Admitted Technical Debt Across Different Sources Yikun Li, Mohamed Soliman, Paris Avgeriou Bernoulli Institute for Mathematics, Computer Science and Artificial Intelligence University of Groningen Groningen, The Netherlands {yikun.li, m.a.m.soliman, p.avgeriou}@rug.nl March 30, 2023 ======================================================================================================================================================================================================================================== Self-Admitted Technical Debt or SATD can be found in various sources, such as source code comments, commit messages, issue tracking systems, and pull requests. Previous research has established the existence of relations between SATD items in different sources; such relations can be useful for investigating and improving SATD management. However, there is currently a lack of approaches for automatically detecting these SATD relations. To address this, we proposed and evaluated approaches for automatically identifying SATD relations across different sources. Our findings show that our approach outperforms baseline approaches by a large margin, achieving an average F1-score of 0.829 in identifying relations between SATD items. Moreover, we explored the characteristics of SATD relations in 103 open-source projects and describe nine major cases in which related SATD is documented in a second source, and give a quantitative overview of 26 kinds of relations. deep learning, self-admitted technical debt, SATD duplication, SATD repayment, code comments, commit messages, pull requests, issue tracking systems § INTRODUCTION The implicit documentation of technical debt by developers with statements like “TODO” or “FIXME” has become known as Self-Admitted Technical Debt or SATD <cit.>. This can take place in various sources such as source code comments, commit messages, issue tracking systems, and pull requests <cit.>. The analysis of SATD has shown to be an important and valuable complement to using static source code analysis for technical debt management <cit.>. Consequently, significant research work has focused on identifying SATD from various sources; most of this work uses source code comments <cit.>, but recently some work also used issue tracking systems <cit.>, commit messages <cit.>, and pull requests <cit.>. Furthermore, recent research has found that there are relations between SATD items in different sources<cit.>. For example, developers may document and explain the same SATD item in both code comments and issues, and then record its repayment in a commit message. The automated identification of such SATD relations could support more efficient and effective SATD management. First, it would allow developers to trace multiple SATD items at once. For instance, tracing the SATD from code comments to issues could assist developers in identifying other relevant SATD items under the same issue. As a result, developers could address these related SATD items together. Furthermore, it could assist developers in having a better understanding of how debt is introduced, accumulated, and eventually repaid. This would give a better overview of how SATD evolves in the system. Last, but not least, it would help to tackle individual SATD items by combining information from multiple sources and forming a more complete picture on how to prioritize and fix them. Despite this significance of SATD relations in different sources, there is currently a lack of approaches for automatically identifying such relations. To address this problem, we propose and evaluate approaches for automatically identifying relations between instances of SATD across four different sources: source code comments, issue trackers, commit messages, and pull requests. Specifically, as related SATD items are often explicitly linked (e.g. a commit message references a pull request through its unique ID - see <ref>), we use such linked data between different sources and randomly collect a dataset of 1,000 pairs of SATD items from 103 open-source projects. We then manually analyze these pairs to identify the relations between SATD items. Using this dataset for training, we compare the predictive performance of two deep learning approaches (i.e., BERT-based and CNN-based) and one baseline method (i.e., random) for automatically identifying SATD relations. Finally, we summarize the characteristics of SATD relations with examples and present the number of various types of SATD relations in 103 open-source projects. The main contributions of this paper are as follows: * Contributing a self-admitted technical debt relation dataset. We gather a dataset of 1,000 pairs of SATD items from 103 open-source projects across four sources (code comments, commit messages, pull requests, and issues). Our dataset includes manual annotations on the relationship types of each SATD pair. In order to promote further research in this area, we make our dataset publicly accessible[<https://github.com/yikun-li/satd-relations>]. * Proposing an approach to automatically identify relations between SATD items. We propose a BERT-based approach for identifying SATD relations and compare it to a CNN-based approach and a baseline method in terms of F1-score. The results showed that our BERT-based approach attains an average F1-score of 0.829 for identifying two types of SATD relations, significantly outperforming the CNN-based approach and the baseline. * Exploring the amount of data necessary for training the model. We find that only a small amount of training data is needed to achieve a high level of accuracy in identifying relations between SATD items. * Characterizing SATD relations in 103 open-source projects. We report on the sequences and amount of SATD relations. Specifically, with the aim of gaining a qualitative understanding of SATD relations, we summarize the most prevalent SATD relations and provide examples based on the manually annotated dataset. To provide a better overview of the quantity of SATD relations, we then apply the proposed machine learning model to automatically identify all relations between SATD items from 103 open-source projects. We consequently present the number of various types of SATD relations. The structure of the remainder of this paper is as follows. In <ref>, we discuss related work. The case study design is then described in detail in <ref>, and the results are presented and discussed in <ref> and <ref>, respectively. In <ref>, we evaluate threats to validity, and we draw conclusions in <ref>. § RELATED WORK In this work, we focus on automatically identifying relations between SATD items across different sources. Thus, we review related work from two areas: 1) research on SATD in general and 2) research on SATD relations. §.§ Self-Admitted Technical Debt. Potdar and Shihab <cit.> were pioneers in the field of studying SATD in source code comments. They conducted an analysis of four open-source projects, identifying instances of SATD within the codebase. Their findings revealed that between 2.4% and 31% of source files contained SATD comments, and that only between 26.3% and 63.5% of identified SATD was removed after its introduction. Then Maldonado and Shihab <cit.> expanded on this work by focusing on the different types of SATD present in open-source projects. They analyzed 33,000 code comments from five projects, categorizing SATD into five distinct types: design, requirement, defect, documentation, and test debt. The study results indicated that design debt was the most prevalent type of SATD, accounting for between 42% and 84% of the classified instances. Following the initial work on exploring SATD in source code comments, there has been a significant focus on developing automatic methods for SATD identification. Maldonado et al. <cit.> manually classified source code comments from ten open-source projects into different types of SATD and used a maximum entropy classifier to automatically identify design and requirement debt. Moreover, Ren et al. <cit.> proposed a convolutional neural network-based approach to accurately identify SATD from source code comments. Some researchers have also focused on identifying SATD from other sources. Li et al. <cit.> examined 23,000 issue sections and proposed a convolutional neural network-based approach for identifying SATD from issue tracking systems. Furthermore, they conducted another study to identify four types of SATD from multiple sources, including source code comments, commit messages, pull requests, and issues <cit.>. In addition to identifying SATD, there has been research about the measurement, prioritization, and repayment of SATD. Kamei et al. <cit.> examined ways to measure the interest accrual of SATD and proposed to use lines of code (LOC) and Fan-In measures. Mensah et al. <cit.> developed an SATD prioritization scheme that consists of identification, examination, and estimation of rework effort. §.§ Relation Between SATD Items. There are limited studies that have explored or utilized the relations between SATD items across different sources. Zampetti et al. <cit.> investigated the degree to which the removal of SATD in code comments is documented in commit messages. They found that the removal of SATD was documented in commit messages in 131 out of 997 cases. Li et al. <cit.> further examined the relations between SATD items across different sources. Their results indicated that there are four types of relations between SATD in different sources and that the number of related SATD items in different sources is comparable. Compared to the previously mentioned studies, our study is the first to propose an automated method for identifying relations between SATD items across different sources. This can help to improve the effective management of technical debt. Additionally, we applied our trained machine learning model to 103 open-source projects and summarized the characteristics of SATD relations, allowing for a comprehensive understanding of SATD relations and providing valuable insights for developers and managers. § STUDY DESIGN The goal of this study, formulated according to the Goal-Question-Metric <cit.> template is to “analyze self-admitted technical debt from source code comments, commit messages, pull requests, and issue trackers for the purpose of automatically identifying and characterizing relations between self-admitted technical debt with respect to the identification accuracy, the sequences of relations, and the quantity of relations from the point of view of software engineers in the context of open-source software systems.” This goal is refined into two research questions (RQs): * RQ1: How to automatically and accurately identify relations between SATD from different sources? This RQ is further refined into three sub-RQs: * RQ1.1: Which deep learning approaches can effectively identify relations between SATD items? Rationale: As there is no approach available for SATD relation identification, we investigate the efficacy of two deep learning methods: a CNN-based approach and a BERT-based approach. We choose these two methods because: a) previous studies <cit.> have demonstrated that CNN-based approaches are capable of extracting features from SATD items; and b) the self-attention mechanism of BERT, is particularly powerful in extracting relationships between items <cit.>. * RQ1.2: How to further improve the predictive performance of the machine learning model? Rationale: In order to make machine learning models as accurate and reliable as possible for real-world applications, we need to explore further optimizing the predictive performance of machine learning models. This can be achieved, for example, by investigating the effectiveness of pre-training models on domain-specific data (e.g., pre-training on SATD comments). * RQ1.3: How much data is sufficient for training the machine learning models to identify related SATD? Rationale: The lack of training data could lead to poor machine-learning model performance. Therefore, we need to investigate whether the current training dataset is sufficient for training machine learning models to identify SATD relations or whether it needs to be further extended. * RQ2: What are the sequences and quantities of SATD relations? This RQ is further refined into two sub-RQs: * RQ2.1: What are the sequences of documenting related SATD in different sources? Rationale: SATD items can be related between two sources in a bi-directional way: developers can consider SATD that already exists in source A and subsequently document it in source B, and vice versa. For instance, existing SATD from issues is sometimes also documented in code comments, so that developers are aware of its location; but also, code comments that contain SATD are sometimes also documented as issues, so that they become visible at the issue tracker level. Thus, it is important to know the sequences of documenting related SATD. This could aid in further understanding how related SATD occurs and is utilized. * RQ2.2: How much SATD is related between different sources? Rationale: Quantifying how much SATD is related across different sources can help us to understand how developers make use of different sources to manage SATD. For example, when developers create an issue to solve a technical debt item, they could document the repayment of that item in commit messages or in code comments. Knowing the amount of SATD repayment documented in commit messages or in code comments helps us understand how developers are managing SATD. This RQ also gives us insights on how to use SATD relation information. For example, if we find that a large amount of SATD in issues, is additionally documented in code comments, we could combine the information in both sources to obtain a more complete understanding of such SATD items. To answer these Research Questions, we follow the approach that is presented in <ref>. In the following subsections, we will go into more detail about each step. §.§ Data Collection To analyze relations between SATD in different sources, we chose to use the dataset provided by the work of Li et al. <cit.>. The reasons for using this dataset are listed below: * This dataset collects data from 103 projects from the Apache ecosystem. These projects possess a high level of quality and are maintained by mature communities. * This dataset contains 23.6M code comments, 1.2M commit messages, 3.1M issue sections, and 2.5M pull request sections; these provide us with sufficient data to mine SATD items and study SATD relations from different sources. We note that because issues and pull requests are both composed of three sections (i.e. summaries, descriptions, and comments), we consider each of these sections individually. This is because developers commonly share a single item of SATD in an issue or pull request section <cit.>. In other words, a pull request or issue may have one, two, or more SATD items in the respective sections. The details of this dataset are presented in <ref>. §.§ Linking Data in Different Sources To study relations between SATD in different sources, we linked different sources using issue ID, pull request ID, and commit hash. This approach is similar to the study of Li et al. <cit.>. An example of link building is shown in <ref>. In this example, we can link the pull request and issue with the issue ID (#12769) (see Link A). Moreover, the pull request and the commit are linked with the pull request ID (#13005) (see Link B). Furthermore, we can also use the commit hash (0ffd5fa) to link the commit and pull request (see Link C). §.§ Data Cleansing Some comments are generated by bot users. Because we focused on technical debt that was explicitly documented and admitted by developers (i.e., SATD), we removed data generated by bot users when manually analyzing the data. Specifically, during data analysis, when we found that a comment is generated by a bot, we note down the username of the bot. Then we remove all the comments created by identified bot users. §.§ Data Sampling Li et al. observed in their study <cit.>, that whether two SATD items are related, is associated with the cosine similarity between the two items. Specifically, a higher cosine similarity indicates a higher likelihood of SATD items being related, with most SATD items considered related when the cosine similarity is greater than 0.5. Moreover, they also discovered that the majority of the SATD item pairs have low cosine similarity, with an average similarity score of 0.135 and a standard deviation of 0.142. If we randomly select pairs of SATD items from the dataset, it is likely that most of the pairs will have low similarity, thus resulting in a very small percentage of SATD items being related. To solve this issue, we used the stratified sampling method, similar to the previous study <cit.>, to obtain 10 groups of samples with similarity scores between 0 and 1: 0.1 and 0.2, ..., 0.9 and 1. This way of sampling ensures the diversity of the sample for analysis. In total, we obtained a sample of 1,000 pairs of SATD items to be analyzed. It is worth noting that in RQ1.3, we investigate whether this amount of data is indeed sufficient to train the machine learning models. §.§ Data Classification In order to construct a dataset of SATD relations for training machine learning models, we first developed a classification framework through the independent analysis of 50 pairs of SATD items by the first and second authors. The results of this analysis were then compared and discussed between the two authors to ensure consistency and agreement on the classification framework. To further refine the framework, the first and second authors independently classified an additional 50 pairs of SATD items, resulting in a more consistent, accurate, and condensed classification framework. Finally, we reached an agreement on the framework, comprising two types of relationships: duplication of SATD referring to documenting identical SATD items in different sources; and repayment of SATD, referring to documenting in source A the repayment of an SATD item, originally reported in source B. For example, after documenting an SATD item in code comments, developers may occasionally report it in issues. We categorize this case as duplication of SATD (see more examples in <ref>). The first author then independently classified 1,000 pairs of SATD items. Of these pairs, 197 were classified as SATD duplication and 390 pairs were classified as SATD repayment. To further assess the level of agreement on the annotations, a random sample of 15% of the dataset (150 pairs) was selected and independently classified by the second author. Cohen's kappa coefficient <cit.>, which measures the level of agreement between the classifications of the first and second authors, was calculated. The results indicate that we achieved a substantial level of agreement <cit.> with a coefficient of +0.785. Examples of SATD relations are provided in <ref>. §.§ Machine Learning and Model Training We propose two deep-learning approaches for automatically identifying relations between pairs of SATD items: BERT-based and CNN-based. In order to provide an objective evaluation of the effectiveness of our proposed approaches for SATD relation identification, we compare their performance with one random baseline approach. The details of these three approaches are presented below: * CNN-based Approach: Text-CNN is a state-of-the-art text classification algorithm proposed by Kim <cit.> that has been widely used in several studies on SATD identification <cit.>. Given its demonstrated effectiveness in identifying SATD, we leveraged Text-CNN to extract features for SATD relation identification in this study. Inspired by the Siamese network architecture, we created a Siamese Text-CNN architecture to identify relations between SATD items. The architecture of Text-CNN is demonstrated in <ref> (a). As can be seen, our CNN-based approach utilizes Text-CNN to extract features from two input SATD items, concatenates the extracted features, and then predicts the type of relationship between the two SATD items. * BERT-based Approach: BERT is a pre-trained transformer-based neural network that has been widely utilized for natural language processing tasks such as text classification, question answering, and language translation <cit.>. BERT has achieved state-of-the-art performance on various natural language understanding tasks by learning deep bidirectional representations of text. Given that BERT leverages the self-attention mechanism, which helps the model to understand the relationships between different words in a sentence and how they depend on each other, it is particularly adept at capturing underlying relations in natural language. Therefore, we employed the BERT base model to extract features for identifying relations between SATD items. As we can see in <ref> (b), a fully-connected layer is added after feature extraction with the BERT model to predict the SATD relation types. * Random Approach: This baseline approach randomly predicts the SATD relations based on the probability of the proportion of SATD relation types present in our SATD relation dataset. In this study, we implemented machine learning approaches utilizing the Pytorch library. For the CNN-based approach, we set the word-embedding dimension at 300, employed filters of five different window sizes (1, 2, 3, 4, 5), and utilized 200 filters for each window size. This configuration was previously found to achieve the best F1-score in identifying SATD in previous research <cit.>. Furthermore, we utilized the pre-trained BERT base model (uncased) for feature extraction. All machine learning models were trained on NVIDIA Tesla V100 GPUs. § RESULTS §.§ RQ1: How to automatically and accurately identify relations between SATD from different sources? §.§.§ RQ1.1: Which deep learning approaches can effectively identify relations between SATD items? To accurately evaluate the predictive performance of machine learning approaches, we choose to use stratified 10-fold cross-validation. Specifically, we shuffle and split the manually-analyzed dataset into ten equally-sized partitions, while keeping the number of duplicated SATD pairs and repayment SATD pairs (see Section <ref>) in each division approximately equal. Then, we choose one of the ten subgroups for testing and the remaining nine for training, repeating the process for each subset and calculating the average precision, recall, and F1-score across ten experiments. <ref> shows the precision, recall, and F1-score of the two deep learning approaches (BERT-based and CNN-based) and the baseline approach (random). As can be seen, the BERT-based approach achieved the highest F1-score of 0.759 and 0.853, for identifying SATD duplication and SATD repayment respectively, with an average F1-score of 0.806. Moreover, we notice that the CNN-based method achieved a lower average F1-score of 0.607, compared to the BERT-based approach. Both of these deep-learning approaches significantly outperform the average F1-score of the random baseline (0.234). The BERT-based approach achieves the highest F1-score of 0.759 and 0.853 for identifying SATD duplication and SATD repayment respectively, with an average F1-score of 0.806. §.§.§ RQ1.2: How to further improve the predictive performance of the machine learning model? While the BERT-based model achieved an average F1-score of 0.806, there are still opportunities for improvement in identifying duplicated SATD, as evidenced by the lower F1-score of 0.759. One way is to enhance the model pre-training. The BERT model is pre-trained on a general-domain corpus, specifically a large corpus of text data comprised of the BookCorpus and English Wikipedia. However, in-domain pre-training can significantly enhance the predictive performance of the BERT model for text classification <cit.>. Thus, we explore the effectiveness of pre-training the BERT model on the SATD data. Because this task focuses on identifying SATD relations and we need domain-specific data to pre-train the BERT model, we first need to collect a sufficient amount of SATD comments for pre-training the BERT model. Specifically, we utilize the pre-trained machine learning model from the previous work of Li et al. <cit.> to collect SATD items from code comments, pull requests, issues, and code commits; these are the raw data without labels. We then further pre-train BERT with masked language models on the collected SATD comments. The collected SATD comments for pre-training are made publicly available[1]. A common issue in transfer learning is catastrophic forgetting <cit.>: during the process of acquiring new knowledge, previously obtained knowledge is erased. To avoid this, we follow the suggestion of previous work <cit.> to use lower learning rates (i.e., 2e-5, 5e-5, and 1e-4). The results of different pre-trained models are shown in <ref>; note that reported results are averaged over three random initializations. We find that two out of three pre-trained models outperform the original BERT-base model (see row w/o pre-train in <ref>) in both identifying SATD duplication and SATD repayment. Generally, using a lower learning rate for pre-training models leads to higher predictive performance. Specifically, we observe that the pre-trained model with a learning rate of 2e-5 obtains the highest average F1-score of 0.829, while the model with a learning rate of 1e-4 achieves the lowest average F1-score of 0.767. After pre-training the BERT-based model, the average F1-score for identifying SATD duplication and SATD repayment is improved from 0.806 to 0.829. §.§.§ RQ1.3: How much data is sufficient for training the machine learning models to identify related SATD? To answer this research question, we train the BERT-based model on datasets of various sizes using the settings of the BERT-based model from <ref>. Specifically, we first shuffle and split the manually-analyzed dataset into two partitions in a ratio of 1:9. Then, we use the large partition for training and the small partition for testing. Because we want to train the model on datasets of various sizes, we create an empty training dataset, add five items to it each time, and train the machine learning model using the training data. The results of the F1-score for identifying SATD repayment and SATD duplication, achieved while increasing the size of the training dataset, are presented in <ref>; the left subfigure (A) concerns SATD repayment while the right subfigure (B) concerns duplication. In subfigure (A), we can observe that the BERT-based model can obtain a relatively good F1-score when trained on a very small training dataset. When more data is added to the training dataset, the model keeps improving until there are around 200 instances. After that, the model improves rather slowly when further increasing the training dataset, until the curve flattens completely. In subfigure (B), we find that, the BERT-based model performs much worse when trained on a very small training dataset, compared to identifying SATD repayment relations. When training on the dataset from 0 to 300 instances, the F1-score goes up dramatically. After 300 instances, the F1-score improves slowly until there are around 800 instances. There is a very slight upward trend for the full partition of the training dataset (900 instances). To reach a high F1-score, it is sufficient to train the model with approximately 300 instances for identifying SATD duplication and 200 instances for identifying SATD repayment. The current dataset seems to achieve the highest F1-score for SATD repayment, while for SATD duplication, further increasing the dataset could potentially improve the F1-score, but only slightly. §.§ RQ2: What are the sequences and quantities of SATD relations? §.§.§ RQ2.1: What are the sequences of documenting related SATD in different sources? To investigate the sequences in which related SATD items are documented, we grouped our SATD relation dataset by source and eliminated cases where there were fewer than five related SATD items. Through this analysis, we observed nine major cases where the related SATD is documented in other sources. Note that `R' and `D' denote `Repayment' and `Duplication' respectively. * Issue:summary/Pull:summary → Commit (R) Developers create issues or pull requests to report SATD items. When this kind of SATD is solved, they always document the repayment of SATD in the commit messages (in contrast this does not always happen when SATD is in the issue comments - see following case). For example, a developer wanted to improve the performance of an iterator, so they created a new issue: “Improve MergeIterator performance” - [Cassandra-issue-summary-8915] When the improvement is accomplished, it is then documented in the commit message: “Introduce a more efficient MergeIterator.” - [Cassandra-commit] Similarly, developers also document SATD in pull requests and then log the repayment in commit messages. For example, a developer reported a problem with unnecessary calls in a new pull request: “Avoid unnecessary leaderFor calls when ProducerBatch queue empty.” - [Kafka-pull-summary-7196] After solving this SATD, they mentioned the repayment in the relevant commit message: “Avoid unnecessary leaderFor calls when ProducerBatch queue empty (#7196).” - [Kafka-commit] * Issue:comment/Pull:comment → Commit (R) When SATD is documented in issue comments or pull request comments during the discussion, developers sometimes record its repayment in commits. For instance, a developer pointed out a piece of code that is not being used: “The `unused-argument' is quite popular in tests...” - [Airflow-pull-comment-5586] When the unused code is cleaned up, it is then recorded in the commit message: “Remove unused arguments in tests” - [Airflow-commit] * Issue:summary/Pull:summary → Comment (D/R) Developers occasionally introduce technical debt in new issues or pull requests during software development. Subsequently, the same SATD item may be duplicated in other sources, such as code comments. For example, a temporary solution was adopted when solving the following Helix issue: “Enable periodic rebalance as a temporary work-around for the Helix issue.” - [Pinot-pull-summary-6989] After introducing this technical debt, developers documented this debt as a TODO comment in the source code: “TODO: Enable periodic rebalance per 10 seconds as a temporary work-around for the Helix issue.” - [Pinot-code-comment] Documenting the repayment of issue SATD in code comments is also common. For instance, a developer pointed out a consistency problem in a new issue: “Maintained consistency between local, remote, and caching table.” - [Samza-pull-summary-555] When the debt was solved, they documented the repayment of the debt in a code comment: “Maintains naming consistency” - [Samza-code-comment] * Issue:comment/Pull:comment → Comment (D/R) When SATD is discussed in issue comments and developers postpone revolving them in a future iteration, they may document the same SATD in code comments. For example, a developer decided to keep using the old variable names but noted that this could be improved in the future, so he created an issue comment: “I added this TODO. Kept the old config names from BoundedBBPool for BC.” - [HBase-issue-comment-15525] Then, a relevant TODO comment was added to the codebase. “// TODO better config names?” - [HBase-code-comment] In other cases, when SATD is pointed out by developers, they sometimes solve it directly and document the repayment of it in code comments. For example, a developer indicated that Java's built-in steam is much slower than loops in an issue comment: “Nit: streams are significantly slower than for loops even with JDK 12.” - [Beam-pull-comment-9374] Following that, the debt was solved and documented in a code comment. “Use a loop here due to the horrible performance of Java Streams” - [Beam-code-comment] * Comment → Issue:summary/Pull:summary (D) When developers decide to fix SATD which is documented in code comments, they could create an issue or a pull request for it. For example, a code comment indicated that this code should be removed after the server is updated: “// TODO: remove the code for backward compatible after server updated to the latest code.” - [Pinot-code-comment] Subsequently, a developer duplicated this SATD item by creating a new issue: “...after server update to the latest version, remove the code for backward compatible to get the highest performance.” - [Pinot-pull-summary-910] * Comment → Issue:comment/Pull:comment (D) After documenting an SATD item in code comments, developers may sometimes duplicate it in issue or pull comments. For example, a developer admitted an SATD item in code comments by stating: “// TODO: Include the generated file name in the response to the server” - [Pinot-code-comment] Then they mentioned the documentation of this SATD in a pull request comment: “// Add a TODO to include the generated file name in the response to server” - [Pinot-pull-comment] * Comment → Commit (D/R) When developers document the existence or repayment of SATD in code comments and push those commits to repositories, they sometimes also mention the SATD in relevant commit messages. For instance, developers added a TODO comment about consistency checking: “// TODO: need GraphComputer.Exceptions consistency checks” - [TinkerPop-code-comment] When pushing the code to the repository, they also mentioned the introduction of TODO in the commit message. “Add todo for consistency checks for GraphComputer exceptions.” - [TinkerPop-commit] In addition, the repayment of SATD documented in code comments is also noted in commit messages. For example, a developer created a code comment to indicate unnecessary caching that was optimized: “// avoid unnecessary caching of input...” - [SystemDS-code-comment] The repayment of this SATD was also recorded in a commit message: “Improved rdd checkpoint injection (avoid unnecessary input caching)” - [SystemDS-commit] * Comment[Deleted] → Commit (R) When SATD is repaid and its corresponding code comments are subsequently removed, developers occasionally document the repayment of SATD in commit messages. For example, one code comment mentioned the temporary workaround used to initialize static variables: “[Deleted] // Servlet injection does not always work for servlet container. We use a hacking here to initialize static variables at Spring wiring time.” - [CloudStack-code-comment] After this SATD was repaid, the developer documented the repayment of SATD in a commit message: “Remove temporary hacking and use Official way to wire-up servlet with injection under Spring.” - [CloudStack-commit] * Issue:summary → Pull:summary (D) After an issue is created to solve SATD items, it is common to create a pull request with a similar description to discuss the detailed solution for fixing the SATD. For instance, a developer created an issue to report the problem about expensive tests: “Speed Up Unit Tests” - [Drill-issue-summary-5752] Then, they created another pull request to submit solutions and review code to solve this SATD: “Speed Up Unit Tests add Test Categories” - [Drill-pull-summary-940] There are nine major cases in which related SATD is documented in a second source, either to duplicate it or report its repayment. §.§.§ RQ2.2: How much SATD is related between different sources? To answer this research question, we first train our BERT-based machine learning model using the best settings described in <ref>. We then use the 103 Apache projects described in <ref> to identify the related SATD item pairs using the trained machine learning model. <ref> presents the number and percentage of related SATD items across the four data sources. We note that pairs of sources are highlighted in bold when they have more than 1000 related SATD items. We also note that this automated analysis covers all cases of related SATD items, compared to the nine major cases of the manual analysis discussed in <ref>; to distinguish these nine major cases, we label them in the first column, according to their numbers in <ref>. As we can see, most related SATD items are duplicated/repaid in code comments from various original sources. Specifically, we observe that SATD items are commonly duplicated/repaid in code comments, starting from issue comments, pull comments, issue summaries, and pull summaries (41755, 16173, 8682, and 2509 respectively). Additionally, we note that when starting from issue and pull comments, there is a higher likelihood of duplicating SATD in code comments, whereas from issue and pull summaries, there is more SATD repayment in code comments. After code comments, the commit message is the second most popular source for documenting duplicated/repaid SATD items. Specifically, a large number of related SATD items are documented in commit messages based on information from added code comments, deleted code comments, issue summaries, and pull summaries (5691, 4341, 2359, and 1865 respectively). In contrast to documenting related SATD in code comments, the majority of related SATD in commit messages pertains to SATD repayment rather than SATD duplication. Furthermore, we can see that a certain number of related SATD items are documented from added code comments to issue comments. In addition, a small number of related SATD items are documented in other sources, such as comments and summaries of issues and pull requests. Developers predominantly document related SATD items in code comments, commit messages, and issue comments. Additionally, a small number of related SATD items are documented in comments and summaries of issues and pull requests. § DISCUSSION Based on the findings of our study, we propose the following implications for researchers: * This study proposes a BERT-based deep learning approach for the automated identification of relations between SATD items from four different sources. This subsequently allows investigation of the impact of relations between instances of SATD. One possible direction is to explore whether documenting duplicated SATD leads to a higher likelihood of SATD repayment in the future. Additionally, the identified SATD relations can be utilized by researchers to conduct further studies to better understand SATD repayment. For instance, one could investigate the extent to which SATD repayment is documented, why developers choose to do so, and what the best practices are for documenting related SATD items. Such studies can provide a deeper understanding of the nature of SATD, helping to manage it more efficiently. * Our approach focuses on identifying relations between pairs of SATD items; the approach cannot be used to identify relations among multiple SATD items. Therefore, we suggest that researchers investigate the relations among multiple SATD items by enhancing our approach, or by developing new approaches. * In order to facilitate further research in this field, we make our SATD relation dataset and trained machine learning models publicly available[1]. The former includes 1,000 pairs of SATD items, of which 197 and 390 pairs are classified as SATD duplication and SATD repayment, respectively. Sharing the dataset with the research community enables other researchers to build on and improve the work that we have done, and to develop new methods and tools for identifying SATD relations. * Our study found that relatively small datasets can achieve decent accuracy in identifying relations between SATD items across different sources (see <ref>). However, we also observed that it is relatively more challenging for machine learning models to capture SATD duplication as compared to SATD repayment (see <ref>). Therefore, we recommend that researchers investigate approaches to further improve the accuracy of identifying SATD duplication by augmenting the dataset specifically for SATD duplication or by adopting other machine learning techniques. * While our study has explored the generalizability of our approach across 103 open-source projects, it is important to note that the scope of our study is still limited. Thus, we recommend that researchers investigate the applicability of our approach to other projects, particularly industrial projects. Additionally, if possible, we advise researchers to make their datasets publicly available[1] for use in training new SATD relation identifiers. In addition to the research implications of our study, we also propose implications for software practitioners: * We recommend that tool developers incorporate our SATD relation identifier into their toolkits and dashboards and experiment with it in practice. Specifically, they can use our relation identifier to explore how SATD is propagated and accumulated through different sources, and look for insights for developers and managers. * Our study presents the sequences of documenting related SATD in different sources, which can help practitioners to gain a better understanding of how SATD is created, how it spreads across different sources, and how it is being paid back. This information can help practitioners develop more effective strategies for managing SATD and make more informed decisions about how to prioritize their efforts in reducing technical debt. § THREATS TO VALIDITY §.§ Threats to Construct Validity Threats to Construct Validity concern the correctness of operational measures for the studied subjects. We observed that our dataset of SATD relations is imbalanced. To address this, we chose to use precision, recall, and F1-score as evaluation metrics, rather than accuracy alone. This is to ensure that the performance of our classifier is evaluated in a comprehensive manner and to avoid bias. §.§ Threats to Reliability Threats to Reliability concern potential bias from the researchers in data collection or data analysis. Relations between SATD pairs were identified manually for training machine learning models. To mitigate this threat, the first and second authors independently annotated a sample of 100 SATD pairs and reached an agreement on the classification through discussion. Additionally, the level of agreement as measured by Cohen's Kappa coefficient was +0.785, indicating substantial inter-rater agreement. Furthermore, all data used in this study are publicly available in the replication package[1], allowing for replication and verification of the results. §.§ Threats to External Validity Threats to External Validity concern the generalization of findings. In this study, we identified and predicted SATD relations from 103 open-source projects. Thus, while our findings may be generalizable to other open-source projects of similar size and complexity to the studied Apache projects, we cannot claim broader generalizability. § CONCLUSION In this research, we presented and evaluated methods for automatically identifying relations between instances of SATD across four distinct sources: code comments, issue trackers, commit messages and pull requests. To accomplish this, we first gathered a dataset of 1,000 pairs of SATD items from 103 open-source projects. We then conducted a manual analysis of these pairs of SATD items to identify the relations between them. Using this dataset for training, we compared the predictive performance of two deep learning approaches, BERT-based and CNN-based, and one baseline method, for automatically identifying SATD relations. Finally, we summarized the characteristics of SATD relations with examples and presented the number of various types of SATD relations in 103 open-source projects. IEEEtran
http://arxiv.org/abs/2303.06671v1
20230312142549
An extension of the approximate component mode synthesis method to the heterogeneous Helmholtz equation
[ "Elena Giammatteo", "Alexander Heinlein", "Matthias Schlottbom" ]
math.NA
[ "math.NA", "cs.NA" ]
Superconductivity studied by solving ab initio low-energy effective Hamiltonians for carrier doped CaCuO_2, Bi_2Sr_2CuO_6, Bi_2Sr_2CaCu_2O_8, and HgBa_2CuO_4 Michael Thobias Schmid^1 0000-0003-2724-0621, Jean-Baptiste Morée^1 0000-0002-0710-9880, Youhei Yamaji^2 0000-0002-4055-8792, and Masatoshi Imada^1,3,4 0000-0002-5511-2056 March 30, 2023 ==================================================================================================================================================================================== An extension of the approximate component mode synthesis (ACMS) method to the heterogeneous Helmholtz equation is proposed. The ACMS method has originally been introduced by Hetmaniuk and Lehoucq as a multiscale method to solve elliptic partial differential equations. The ACMS method uses a domain decomposition to separate the numerical approximation by splitting the variational problem into two independent parts: local Helmholtz problems and a global interface problem. While the former are naturally local and decoupled such that they can be easily solved in parallel, the latter requires the construction of suitable local basis functions relying on local eigenmodes and suitable extensions. We carry out a full error analysis of this approach focusing on the case where the domain decomposition is kept fixed, but the number of eigenfunctions is increased. This complements related results for elliptic problems where the focus is on the refinement of the domain decomposition instead. The theoretical results in this work are supported by numerical experiments verifying algebraic convergence for the interface problems. In certain, practically relevant cases, even exponential convergence for the local Helmholtz problems can be achieved without oversampling. Multiscale method, approximate component mode synthesis (ACMS), Helmholtz equation, heterogeneous media, high-frequency 65N12, 65N30, 65N35, 65N55 § INTRODUCTION In this paper, we propose and analyze a multiscale method for the heterogeneous Helmholtz equation -div(a ∇u) - κ^2 u = f in Ω, a ∂_n u - i ωβu =g on Γ_R, u =0 on Γ_D, in a plane region Ω⊂^2. The boundary of Ω is decomposed into sets Γ_D and Γ_R modeling Dirichlet boundary conditions or impedance boundary conditions described by the function g, respectively. The real-valued function β is related to transmission and reflection of the wave described by u. Material properties of the background medium occupying Ω are described by the coefficient functions a and c. Denoting the positive angular frequency as ω, the wavenumber is given by κ=ωc, and any interior sources are modeled by the function f. Heterogeneous Helmholtz equations have many applications, such as modeling the propagation of light in photonic crystals, where u is related to either the transverse-electric or the transverse-magnetic field <cit.>, or seismic imaging <cit.>. §.§ Literature overview Numerical simulations of the Helmholtz equation are challenging due to the highly oscillatory behavior of the solution, in particular, in the case of a high wavenumber κ. The differential operator in the equation is indefinite, which may lead to stability issues for standard discretization approaches such as the classical finite element method (FEM). Generally, convergence can only be achieved under the scale resolution condition, that is, if the mesh size h is scaled with the wavenumber O(1κ). This pre-asympotic behavior is also known as pollution effect <cit.>. In order to reduce this effect, higher-order methods can be employed: in particular, for the hp-FEM, quasi-optimality has been proved in <cit.> under the conditions that the polynomial degree p is at least O(logκ) and that κ hp is sufficiently small. In <cit.>, similar results have been achieved for the heterogeneous Helmholtz equation with piecewise smooth coefficients; however, to the authors' knowledge, no theory for rough coefficients is available yet. Multiscale discretization approaches can be very efficient for problems with heterogeneous or non-smooth coefficients, especially if the variations are on a much smaller scale than the size of the computational domain. Indeed, while classical higher-order finite element methods need to resolve the fine-scale variations, requiring a large number of degrees of freedom, multiscale methods are typically defined on a coarser grid, resulting in significantly smaller systems. In recent years, many multiscale discretization methods have been developed and applied to the heterogeneous Helmholtz equation. The localized orthogonal decomposition (LOD) method, introduced in <cit.>, has successfully been applied to heterogeneous Helmholtz problems with high wavenumbers <cit.>, achieving exponential convergence. More recently, even super-exponential convergence could be shown for a variant of the LOD method in <cit.>. Exponential convergence for highly oscillatory heterogeneous Helmholtz equations has also been obtained in <cit.>, for a multiscale discretization inspired by the multiscale FEM (MsFEM) <cit.>; see also, e.g., <cit.> for an overview on MsFEM. Moreover, nearly exponential error decay has been achieved in <cit.>, using similar ideas as in the multiscale generalized finite element method (Ms-GFEM), first described in  <cit.>. All the aforementioned approaches rely on local oversampling. Furthermore, in the multiscale framework, numerical homogenization techniques have been extended to Helmholtz problems: for instance, in <cit.>, quasi-optimality is obtained for the heterogeneous multiscale method (HMM) <cit.>, which relies on the local periodicity of the media, and in <cit.>, exponential convergence is achieved through homogenization techniques developed in a variational setting. In domain decomposition methods, related discretizations are also often used as coarse spaces to construct preconditioners which are robust with respect to heterogeneous coefficients; see, e.g., <cit.> for applications to scalar elliptic problems or <cit.> for linear elasticity problems. For the application to heterogeneous Helmholtz problems, see, for instance, <cit.>. Let us also refer to <cit.> for an optimized parallel implementation of a multifrontal solver that employs nested dissection based domain decomposition with matrix compression techniques; see <cit.> for a recent work in the context of elliptic equations. Finally, multigrid methods for the heterogeneous Helmholtz problem have been analyzed; see, e.g., <cit.>. In this work, we consider an extension of the approximate component mode synthesis (ACMS) method to Helmholtz problems. The ACMS method has been introduced by Hetmaniuk and Lehoucq in <cit.> as a multiscale discretization for scalar elliptic problems with heterogeneous coefficient functions. It is based on the early component mode synthesis (CMS) method <cit.>, which uses a decomposition of the global approximation space into independent local subspaces and an interface space. The basis functions are defined as eigenmodes of corresponding generalized eigenvalue problems. The global support of the interface basis functions comes at a high computational cost in the construction as well as a dense matrix structure of the interface problem. Hence, the practicability and potential for parallelization of CMS method are rather limited. Therefore, the ACMS method was introduced in order to improve the CMS approach: instead of global interface modes, functions with local support are employed. The basis functions incorporate heterogeneities of the model problem; notably, besides edge modes, this framework uses vertex basis functions of MsFEM <cit.> type. Since the ACMS discretization uses problem-specific shape functions with local support, it can therefore be considered a special finite element method (SFEM); cf. <cit.>. In contrast to other multiscale approaches, such as those previously mentioned <cit.>, the ACMS method is based on a non-overlapping domain decomposition and does not use local oversampling. This makes the method very efficient but generally does not yield exponential convergence. The ACMS method has been further investigated in <cit.>, where a priori error bounds and an a posteriori error indicator for the method have been derived, and in <cit.>, where a parallel implementation in PETSc based on the finite element tearing and interconnecting dual primal (FETI-DP) domain decomposition method as the parallel solver is presented. More recently, a robust spectral coarse space for Schwarz domain decomposition methods based on the ACMS discretization has been introduced in <cit.>; further related works on CMS and ACMS methods include <cit.>. Moreover, to the authors' best knowledge, preliminary but unpublished work on the extension of the ACMS method to wave problems has been carried out by Hetmaniuk and Johnson in the early 2010s. As a multiscale discretization, the ACMS method seems to be well suited for approximating heterogeneous Helmholtz problems. As we will discuss in this work, similar basis functions than in the elliptic case are suitable for the Helmholtz case as well, because the eigenmodes of the Helmholtz and the Laplacian operator are the same. §.§ Our contribution and outline In this paper, we extend the ACMS method to heterogeneous Helmholtz problems. In doing so, we slightly modify the construction of the edge modes and the extension operator. At the same time, we adapt the method to Robin boundary conditions, which are necessary for the definition of many real world-oriented Helmholtz problems. Moreover, in contrast to <cit.> where the number of subdomains in the domain decomposition is increased to obtain convergence, we perform a complementary error analysis focusing on fixing the domain decomposition and increasing the number of (edge) eigenmodes for tackling the local heterogeneities. While the error analysis for the local sub-problems, for which we obtain similar a posteriori error bounds as in <cit.> is rather simple, the error analysis for the interface problem is more sophisticated. The analysis is based on the abstract framework of <cit.>, and relies in particular on the smallness of the so-called adjoint approximability constant; see <ref> and, in particular, <ref> below. We show that, upon using sufficiently many (edge) eigenmodes, the adjoint approximability constant can be made arbitrarily small. Tracing the results of <cit.> allows to further obtain wavenumber explicit bounds. Finally, we present a detailed numerical study of the method using a flexible implementation that, unlike in the numerical results for the ACMS method shown in previous works, also allows for unstructured meshes and domain decompositions. The paper is structured as follows: we introduce the necessary preliminaries for defining and analyzing the ACMS method for Helmholtz problems in <ref>. In particular, we show the variational formulation of the Helmholtz equation, recall the well-posedness results of <cit.>, and illustrate the underlying domain decomposition and function spaces of the ACMS discretization. Then, in <ref>, we present our new variant of the ACMS method for Helmholtz problems along with some theoretical properties. The error analysis of the ACMS method is carried out in <ref>. Finally, we describe our numerical results in <ref> and conclude with some final remarks. § PRELIMINARIES In the following, we introduce the functional analytic setting and recall well-posedness results for the heterogeneous Helmholtz equation. Furthermore, we introduce the domain decomposition used in the ACMS method. §.§ Variational formulation of the Helmholtz equation We denote by L^2(Ω) the Lebesgue space of square-integrable functions v:Ω→ with inner product (u,v)_Ω = ∫_Ω u v dx , and by H^1(Ω) the usual Sobolev space of functions with square-integrable weak derivatives. Corresponding notation is used for other measurable sets besides Ω. Furthermore, we indicate by ⊂ H^1(Ω) functions with vanishing trace on Γ_D⊂∂Ω. Let us introduce the sesquilinear forms ,: ×→ defined by (u,v) =∫_Ω a ∇ u ·∇v dx , (u,v) =(u,v) - (κ^2 u,v)_Ω-i (ωβ u,v)_Γ_R . Then the weak form of the Helmholtz problem <ref> and its adjoint are Find u ∈: (u,v) = F(v), for all v ∈, Find z ∈: (v,z) = G(v), for all v ∈. Here, F:→ and G:→, defined by F(v) = (f,v)_Ω + (g,v)_Γ_R, G(v) = (v,f)_Ω+(v,g)_Γ_R, are antilinear and linear functionals on , respectively. §.§ Well-posedness of the Helmholtz equation We recall the well-posed-ness theory for the Helmholtz equation presented in <cit.>. Thus, we deem the following assumptions valid throughout the paper without explicitly mentioning it. (i) Ω⊂^2 is a connected polygonal domain with piecewise C^2 boundary with convex angles, see <cit.>). Its boundary can be decomposed as ∂Ω=Γ_R∪Γ_D into relatively open disjoint subsets Γ_R, Γ_D⊂∂Ω. (ii) The source terms satisfy f ∈ L^2(Ω) and g∈ H^12(Γ_R). (iii) The coefficient functions a,c ∈ L^∞(Ω) are uniformly positive, i.e., a_min≤ a(x) ≤ a_max and c_min≤ c(x) ≤ c_max for a.e. x∈Ω, where a_min, c_min, a_max, c_max are positive constants. (iv) β∈ L^∞ (Γ_R) with meas( supp(β))>0 and either 0< β or β <0. The analysis employs the norm u_^2=(u,u) induced by the sesquilinear form (u,v)= (u,v) + (κ^2 u ,v)_Ω, defined for u,v∈. In <cit.>, the following result is proved. (i) For all u,v∈, it holds that |(u,v)| ≤ C_u_v_, where the constant C_ =C_(a_min, β_∞, κ_∞) grows quadratically in κ_∞. (ii) There exist unique solutions of <ref>. (iii) If g=0 in <ref>, then there exists a constant C_ stab = C_ stab(a,c,ω, Ω) such that the corresponding solutions u and z satisfy: u_≤ C_ stabf_L^2(Ω), z_≤ C_ stabf_L^2(Ω). §.§ Decomposition of the computational domain Let {}_j=1^J denote a conforming decomposition of Ω into J non-overlapping domains with piecewise smooth boundaries. Furthermore, let Γ = ⋃_j=1^J ∂Ω_i ∖Γ_D denote the domain decomposition interface and the set of all edges of the domain decomposition, where each edge e is an open set with e = ∂Ω_i∩∂ for some i ≠ j. Furthermore, let ={p∈Γ}=Γ∖∪_e∈e be the set of points connecting adjacent edges, which we also refer to as the vertices of the domain decomposition. §.§ Function spaces Denoting the interpolation space between and L^2(e); see <cit.>, we have the interpolation inequality η_≤ C η_L^2(e)^12η_^12 for all η∈; see, e.g., <cit.>. We will also use the Lions–Magenes space , which is defined as an interpolation space between L^2(e) and <cit.>. Therefore, it holds that ⊂ densely <cit.>. In view of <cit.>, if e⊂∂ for some 1≤ j≤ J, functions in can be extended by zero to functions in . Here, denotes the space of traces of functions in ; cf. <cit.>. Lastly, by we denote the space of traces on Γ, i.e., v∈ if, for all 1≤ j≤ J, there exist u_j ∈ such that u_|∂∩Γ=v_|∂. § ACMS METHOD The ACMS method introduced in <cit.> relies on an orthogonal splitting of into interface functions and local functions , j=1,…,J, and on the availability of basis functions with local support; whereas functions in generally have local support, interface basis functions with local support are constructed based on the edges and vertices that form Γ. In <cit.>, orthogonality is characterized by the bilinear form associated to the elliptic problem. The basic idea of our extension of the ACMS method to Helmholtz problems is similar, but `orthogonality' is measured with respect to the sequilinear form . Below we will construct spaces := ⊕ that are either associated to the subdomains or to the interface Γ. In particular, the corresponding basis functions have local support and can be built locally. We now discuss the construction of the bubble space and the interface space in detail. §.§ Bubble space Let us define the local sesquilinear form _j:×→ as in <ref> but with domain of integration instead of Ω. Since _j is Hermitian, we can consider the eigenproblems: for j=1,...,J and i ∈, find (b_i^j,λ_i^j)∈× such that _j(b_i^j,v)= λ_i^j ( κ^2 b_i^j,v)_ for all v ∈. Standard theory ensures that the eigenfunctions {b^i_j}_i form an orthogonal basis for with respect to _j and an orthonormal basis for L^2() with weighted inner product (κ^2 u,v)_, and that λ_i^j>0. Furthermore, we may assume that the eigenvalues λ_i^j are ordered non-decreasingly, i.e., λ_i^j≤λ_l^j for i≤ l. In slight abuse of notation, we may denote by b_i^j ∈ H^1_0(Ω) also the extension of b_i^j ∈ by zero outside of and we call these bubble functions. Associated to the partition {}_j of Ω, let us introduce the infinite-dimensional bubble space = ⊕_j=1^JV^j, with V^j= span{ b_i^j : i∈}. Let S_B=(I_1,…, I_J)∈^J be a multi-index. Then, the finite-dimensional bubble space employed in the ACMS method is defined by: = ⊕_j=1^JV^j_I_j, with V^j_I_j:= span{ b_i^j : 1 ≤ i ≤ I_j }. §.§ Solvability of local Helmholtz problems The interface space introduced below relies on the proper extension of functions defined on the interface Γ. The extension relies on the solvability of local Helmholtz problems with homogeneous Dirichlet conditions. Therefore, in the rest of the manuscript, we additionally assume the following: For all j=1,…,J and for all i∈, let λ_i^j≠ 1. <ref> might be justified by suitably adapting the partition {}_j and by a scaling argument. Next, we establish well-posedness of the local Helmholtz problems. For β^j=inf_i∈{|λ_i^j-1|(λ_i^j+1)}>0, the following estimates hold: inf_u∈sup_v∈_j (u, v)-(κ^2 u, v)_/u_v_ ≥β^j , inf_v∈sup_u∈_j (u, v)-(κ^2 u, v)_/u_v_ ≥β^j . Let u∈ be given. Since {b_i^j}_i is a basis of , we have that u= ∑_i=1^∞ u_i b_i^j with u_i=(κ^2 u, b_i^j)_. Now, let v=∑_i=1^∞ sgn(λ_i^j-1)u_i b_i^j. We note that u_^2=∑_i=1^∞ (λ_i^j+1)|u_i|^2, and v_=u_. Then we have that _j (u, v)-(κ^2 u, v)_ = ∑_i=1^∞ |λ_i^j-1| u_i^2 ≥inf_i∈|λ_i^j-1|/λ_i^j+1u_^2. Hence, the first inequality follows. The second inequality follows similarly. §.§ A harmonic extension operator In order to define the interface space, we need an extension from Γ to Ω, which is obtained by combining the extensions of functions from ∂ to . For a given τ∈, let τ̃∈ be any function satisfying τ̃_|∂=τ. Then, we indicate by τ̃_0∈ the solution to _j (τ̃_0, v)-(κ^2 τ̃_0, v)_ = -(_j(τ̃,v)-(κ^2 τ̃, v)_) for all v∈, which is uniquely defined following from <ref>. We characterize the -harmonic extension j:→ by setting jτ := τ̃+τ̃_0. The extension operator j:→ is bounded, that is, jτ_≤ (1+1β^j)τ̃_, where τ̃∈ is any extension of τ∈. We estimate the right-hand side in <ref> by τ_v_. Then, <ref> yields that τ̃_0_≤τ̃_β^j, and the assertion follows. We note the following orthogonality relation, which is a crucial property for the construction of the ACMS spaces: for all bubble functions b_i^j ∈, we have _j(jτ,b_i^j)-(κ^2jτ,b_i^j)_=0. Next, we construct extensions from local edges and the interface. Assume that e=∂∩∂Ω_i∈ is a common edge of Ω_i and . Let τ∈, which, by restriction, implies τ∈ and τ∈ H^12(∂Ω_i). Since (jτ)_| e=τ_| e= (iτ)_| e, we can introduce the extension operator :→ by (τ)_| = jτ_|∂, for all j = 1,…,J. Moreover, we define :→ via τ = E_0^eτ, where E_0^e: → denotes the extension by zero to the interface Γ. §.§ Vertex based approximation space For any p∈, let φ_p: Γ→ denote a piecewise harmonic function, that is, Δ_eφ_p| e=0 for all e∈, with Δ_e indicating the Laplace operator along the edge e∈, and φ_p(q)=δ_p,q for all p,q∈. The vertex based space is then defined by linear combinations of corresponding extensions: V_ = span{ φ_p : p∈}. For our error analysis, we will employ the nodal interpolant I_ v = ∑_p∈ v(p) φ_p, which is well-defined for functions v:Ω→ that are continuous in all p∈. Moreover, note that the support of the vertex basis functions consists of all subdomains which share the vertex and is therefore local. §.§ Interface space Let us consider e∈ and denote by ∂_e the tangential derivative, i.e., differentiation along e. We define the edge modes as solutions to the following weak formulation of the edge-Laplace eigenvalue problems: for each e∈, for i ∈, find (τ^e_i,λ^e_i)∈× such that (∂_e τ^e_i,∂_e η)_e =λ^e_i ( τ^e_i, η)_e for all η∈. Standard theory ensures that the eigenfunctions {τ^e_i}_i form an orthogonal basis for and an orthonormal basis for L^2(e). We may again assume that the eigenvalues λ_j^e>0 are ordered increasingly. Moreover, we note that the asymptotic behavior of the eigenvalues, according to <cit.>, is λ_i^e ∼( i π/|e|)^2. The corresponding infinite-dimensional interface space is = V_ + ∑_e∈ V^e, V^e = span{τ_i^e : i ∈}. Again, each function in V^e has local support inside the two subdomains adjacent to e. Choosing I_e∈, e∈, we introduce the L^2(e)-projection P^e_I_e:L^2(e)→ V^e as P^e_I_ev=∑_j=1^I_e (v,τ_j^e)_e τ_j^e and denote the range of P^e_I_e by V^e_I_e. Collecting the indices I_e in a multi-index S_Γ, we define the finite-dimensional interface space by = V_ + ∑_e∈ V^e_I_e, which, together with <ref>, completes the construction of the ACMS approximation space in <ref>. We now give some interpolation error estimates. For any e∈ and all w∈, it holds that w-P^e_I_ew_L^2(e)≤1/√(λ_I_e+1)w-P^e_I_ew_. If, additionally, w ∈∩ H^2(e), then there exists a constant C>0 such that w- P^e_I_ew_ ≤C/√(λ_I_e+1^e)Δ_e w-P^e_I_eΔ_e w_L^2(e). Since {τ_j^e}_j form an orthonormal basis of L^2(e), we have that w-P^e_I_ew_L^2(e)^2 = ∑_j≥ I_e+1|(w,τ_j^e)_e|^2≤1/λ_I_e+1w-P^e_I_ew_^2, which proves <ref>. By <ref> and the Poincaré inequality, we similarly have that w-P^e_I_ew_^2 ≤ C_P ∑_j≥ I_e+1λ_j^e |(w,τ_j^e)_e|^2. Using the definition of τ_j^e in <ref> again and performing integration by parts, we obtain (w,τ_j^e)_e = 1/λ_j^e (∂_e w,∂_e τ_j^e)_e = -1/λ_j^e (Δ_e w,τ_j^e)_e, where we used that w, τ_j^e ∈. This concludes the proof of <ref>. Let e∈. Then, there exists a constant C>0 such that inf_v^e∈ V_I_e^e w -I_ w -v^e_ ≤C/√(λ^e_I_e)w_H^32(e) for all w∈ H^32(e), with nodal interpolant I_ w defined in <ref>. By continuity of the embedding ↪ C^0(e), we have that the nodal interpolation operator I_ is bounded, i.e., I_ w_≤ C w_ for all w∈. By choosing v^e=0, we thus have the stability estimate inf_v^e∈ V_I_e^e w -I_ w -v^e_≤ C w_ for all w∈. Employing <ref> and using that w-_ w∈, we also have that inf_v^e∈ V_I_e^e w -I_ w -v^e_≤C/√(λ_I_e+1^e)w_H^2(e) for all w∈ H^2(e). Therefore, we get by interpolation <cit.> that inf_v^e∈ V_I_e^e w -I_ w -v^e_≤C/(λ_I_e+1^e)^14w_H^32(e) for all w∈ H^32(e). Employing <ref> and <ref> and recalling that the best-approximation is realized via the projection P^e_I_e(w-I_ w), we also have that inf_v^e∈ V_I_e^e w -I_ w -v^e_L^2(e) ≤1/(λ^e_I_e)^34w_H^32(e) for all w∈ H^32(e). Therefore, by the interpolation inequality <ref>, the relations <ref> yield <ref>, which concludes the proof. § GALERKIN APPROXIMATION We start by observing that (, v_Γ) = (,v_Γ) -(κ^2 ,v_Γ)+ iβℛ(,v_Γ) = 0, for all ∈ and v_Γ∈, where we used that =0 on Γ_R and that and v_Γ are _j-orthogonal by <ref>. Therefore, the weak Helmholtz problem <ref> is equivalent to: find ∈ and u_Γ∈ such that (,) = F() for all ∈ and (u_Γ,v_Γ) = F(v_Γ) for all v_Γ∈. <ref> implies that is uniquely defined. Since u is uniquely defined by <ref>, we conclude that also u_Γ is uniquely defined. Analogously, the Galerkin approximation corresponding to <ref> is: find ∈ V_S such that (,v_S) = F(v_S) for all v_S ∈ V_S. Equivalently, this can be split into two independent problems, namely a bubble approximation: find ∈ V_B,S_B such that (,v_B,S_B) = F(v_B,S_B) for all v_B,S∈ V_B,S_B; and an interface approximation: find ∈ such that (u_S,Γ,v_S,Γ) = F(v_S,Γ) for all v_S,Γ∈. The Galerkin problem <ref> is well-posed under <ref>, while adjoint approximability is required to analyze the Galerkin problem <ref>; cf. <cit.>. In <ref> below, we prove estimates for the adjoint approximability constant, ensuring that also <ref> is well-posed as long as the number of edge modes is sufficiently large. In the following subsections, we present an error analysis for the two independent approximation problems <ref>. §.§ Error estimates for the bubble approximation For the statement of the approximation result, let us introduce the L^2-projection P^j_I_j:L^2(Ω)→ V_I_j^j, given by P^j_I_jf=∑_i=1^I_j(κ^2 f,b_i^j)_ b_i^j. The error analysis is then straight-forward. Assume f ∈ L^2(Ω) and set f_κ:=f/κ^2. For ∈ and ∈, defined in <ref>, respectively, we have the estimates: κ(-)_L^2(Ω)^2 ≤∑_j=1^J 1/|λ_*^j-1|^2κ (f_κ-P^j_I_jf_κ)_L^2()^2, √(a)∇(-)_L^2(Ω)^2 ≤∑_j=1^J λ_#^j/|λ_#^j-1|^2κ (f_κ-P^j_I_jf_κ)_L^2()^2, where λ_*^j = argmin{|λ_i^j-1|, i≥ I_j+1}, and λ_#^j = argmax{λ_i^j/|λ_i^j-1|^2, i≥ I_j+1}. Since {b_i^j}_i form an orthonormal basis for L^2() with the weighted inner product (κ^2 u,v)_, we may assume the expansion = ∑_j=1^J ∑_i=1^∞ u_B,i^j b_i^j, with u_B,i^j = (κ^2 ,b_i^j)_. By testing <ref> with v_B= b_i^j, for i∈, and observing that (,b_i^j)=_j (,b_i^j) - (κ^2 , b_i^j)_, we infer from <ref> that u_B,i^j = F(b_i^j)/(λ_i^j-1). Consequently, we obtain that = ∑_j=1^J ∑_i=1^I_j u_B,S,i^j b_i^j, with u_B,S,i^j = F(b_i^j)(λ_i^j-1). Therefore, u_B,S,i^j=u_B,i^j for 1≤ i≤ I_j and 1≤ j≤ J. Since b_i^j=0 on ∂Ω, we further have that F(b_i^j) = (f, b_i^j)_Ω. Hence, we conclude that κ(-)_L^2(Ω)^2 =∑_j=1^J ∑_i=I_j+1^∞1/|λ_i^j-1|^2|(f,b_i^j)_|^2, which, by <ref> and the definition of λ_*^j, implies <ref>. Estimate <ref> follows similarly from _j (b_i^j,b_i^j)=λ_i^j and √(a)∇(-)_L^2(Ω)^2 = ∑_j=1^J ∑_i=I_j+1^∞λ_i^j/|λ_i^j-1|^2|(f,b_i^j)_|^2. The bubble error estimates depend on the wavenumber essentially only via λ_i^j, which can be made fully explicit by a scaling argument. Moreover, <ref> becomes a diagonal system, which is easily solvable, also in parallel. Moreover, if f_|=0, then u_ B|=0, and the approximation error vanishes on . §.§ Well-posedness of the interface Galerkin problem Well-posedness of the Galerkin problem and quasi-best approximation results under an adjoint approximability condition follow as in <cit.>. To state the result let us introduce T^*χ=z, mapping χ∈ L^2(Ω) to the solution z∈⊂ of the dual problem (v,z) = (v,χ) for all v∈, which is well-defined due to <ref>. The approximation properties of the interface space are measured by the adjoint approximability constant σ^* = sup_φ∈ L^2(Ω)∖{0}inf_∈T^*( κ^2φ)-_/κφ. With these preparations, we can state the abstract result <cit.> in our setting. Suppose that C_σ^*≤12, where C_ is defined in <ref> and σ^* is the adjoint approximability constant. Then, the Galerkin problem <ref> has a unique solution, and the following estimates hold: u_Γ-_ ≤ 2 C_inf_∈u_Γ - _, κ (u_Γ-) ≤ 2 C_^2 σ^* inf_∈u_Γ - _. §.§ Estimates of the best-approximation error in VGS Quantitative estimates for the interface approximation error follow from localizing the error to single edges and applying the estimates proven in <ref>. Assume that the solution u to <ref> is continuous in all vertices p∈ and u ∈ H^2(e) for all e∈, and denote as the solution to <ref>. Then, u_Γ-_≤∑_e∈C/(λ_I_e+1^e)^34Δ_e u-P^e_I_eΔ_e u_L^2(e) for a constant C>0 independent of u and . According to <ref>, it suffices to estimate the best-approximation error inf_u_Γ-_. By assumption, the nodal interpolant I_ u of u is well-defined and, by construction, we obtain that (u-I_ u)_| e∈. These observations motivate the choice = I_ u + ∑_e∈ P^e_I_e(u-I_ u), with P^e_I_e introduced in <ref>. We then have that u_Γ(p)-(p)=0 for all p∈. Moreover, in view of <ref>, (-)_| e∈⊂. Therefore, the error can be localized to single edges as follows _| - _| = j( u_|∂ - _|∂ ) = ∑_e∈, e⊂∂ ( (u_| e - _| e))_|. From the latter identity and from the definition <ref>, we obtain the following estimate - _^2 ≤∑_j ∑_e∈,e⊂∂ (u_| e- _| e)_|_^2 ≤ (1+κ_∞^2)C max_j(1+1β^j)^2∑_e∈u-_^2, where we used <ref> and equivalence of the -norm to the -norm. The interpolation estimate <ref> then yield the assertion. If the solution has more regularity convergence improves, as long as the derivatives of the edge modes do not grow too quickly, which is true, e.g., if e is a line segment. In addition to the assumptions of <ref>, suppose that u∈ H^3(e) for all e∈. Moreover, assume that there is a constant C>0 such that |∂_eτ_i^e(p)|≤ C √(λ_i^e) for all i∈ and p∈∂ e. Then there is a constant C>0 such that u_Γ-_≤ C ∑_e∈1/λ_I_e+1^e u_H^3(e). In view of <ref> it suffices to bound (Δ_e u,τ_i^e)_e for i ≥ I_e+1. Since -Δ_e τ_i^e=λ_i^eτ_i^e on e by elliptic regularity, integration by parts yields that (Δ_e u,τ_i^e)_e =- 1/λ_i^e (Δ_e u,Δ_eτ_i^e)_e = 1/λ_i^e((∂_e^3 u,∂_eτ_i^e)_e+ [Δ_e u∂_eτ_i^e ]_q^p), where p,q denote the endpoints of e. The assertion then follows from the Cauchy-Schwarz inequality, the continuity of the embedding ↪ C^0(e), <ref> and the assumed bounds on ∂_eτ_i^e. §.§ Estimates for adjoint approximability constant The well-posedness and the error estimates for the interface problem in <ref> relied on the smallness of the adjoint approximability constant σ^* defined in <ref>. In order to estimate σ^* in our setting, we follow the ideas of <cit.>, where they work with piecewise linear finite elements, requiring H^2(Ω)-regularity of the adjoint problem <ref>. Since we need to consider the interface problem only, we can require a weaker H^2-regularity in the vicinity of the interface Γ. Let, for fixed δ>0, Ω_Γ⊂{x∈Γ: dist(x,Γ∪∂Ω)<δ} denote an open neighborhood of Γ∪∂Ω such that ∂Ω_Γ∖∂Ω is smooth. We start with a result similar to <ref> but with slightly weaker regularity assumptions. Let λ^Γ=min_eλ_I_e^e. Then, there exists a constant C>0 such that, for all z∈ H^2(Ω_Γ)∩, it holds that inf_∈z-_≤C/√(λ^Γ)z_H^2(Ω_Γ). In view of <ref> it suffices to estimate inf_v^e∈ V_I_e^e z -I_ z - v^e _ in terms of z_H^2(Ω_Γ). By embedding, z∈ H^2(Ω_Γ) implies that z∈ H^32(e) for all e∈, and applying <ref> yields that inf_∈z-_≤C/√(λ_I_e+1^e)z_H^32(e). Hence, the definition of λ^Γ yields the assertion. Assuming regularity of the coefficients of the Helmholtz problem locally around the interface Γ, we can next estimate the adjoint approximability constant. If a,c∈ C^0,1(Ω_Γ), then there exists a constant C>0 such that σ^* ≤C√(λ^Γ). In view of <ref>, the key for estimating σ^* is to obtain an estimate for inf_∈T^*(κ^2φ)-_ in terms of κφ for arbitrary φ∈ L^2(Ω), where T^*(κ^2φ)∈ is the solution to the adjoint problem <ref>. Similarly to the proof of <cit.>, it can been shown that there exists a constant C_*>0 such that T^*(κ^2 φ)_H^2(Ω_Γ)≤ C_* κφ_L^2(Ω), which employs smoothness of the coefficients on Ω_Γ and elliptic regularity results for T^*(κ^2φ) as well as <ref> for the dual problem. A simple combination of <ref> yields the assertion. Note that the constant C_* in <ref> depends on κ_∞, see <cit.> for details. A consequence of the previous result is that, by using sufficiently many edge modes, the assumptions of <ref> can be verified. Moreover, we obtain the following statement. In addition to the assumptions of <ref> suppose that u∈ H^2+α(e) for all e∈, for α=0,1. Then, for some C>0, it holds κ^2 (-)≤C/(λ^Γ)^54 + α4∑_e∈u_H^2+α(e). Inserting the estimate <ref> for σ^* and the error bounds stated in <ref> (if α=0) or <ref> (if α=1) into <ref> yields the assertion. § NUMERICAL RESULTS We provide numerical experiments to support our theoretical results and show the effectiveness of our approach. Since, in general, we cannot compute the ACMS basis functions in <ref> analytically, we compute them approximately using an underlying finite element discretization that adopts piecewise linear and continuous functions. To do so, we employ a quasi-uniform triangulation of the computational domain Ω into triangles, such that each subdomain is the union of elements of that triangulation; see, for instance, <ref>. We denote the corresponding finite element solution of the Helmholtz problem by u_ FEM. Moreover, the resulting errors are quantified according to <ref>. §.§ Classical Helmholtz example Let Ω=B_1(0) be the unit disc and Γ_R=∂Ω. We first consider the boundary value problem given by <ref> with a(x) = 1, β(x)=1. The source terms f and g are defined such that the problem has the plane wave solution u(x) = exp(-ι k· x), with wave vector k=κ(0.6,0.8) and variable wavenumber κ. In particular, f(x)=0, therefore the solution satisfies u_B=0, and u can be approximated by solving the interface problem <ref> only; see <ref> and also <ref>. We employ a decomposition of Ω as depicted in <ref> (left) with an initial coarse triangulation as shown in <ref> (right), which corresponds to a domain decompositions into J = 8 subdomains. In this domain decomposition, the number of edges in is 12, and the number of vertices in equals 5. The ACMS solution and the finite element solution u_ FEM are computed using uniform refinements of the coarse triangulation; see <ref> (right). §.§.§ Low wavenumber Let us first consider the case of a low wavenumber κ=1. In this setting, we obtain u_≈ 2.5 and u_L^2(Ω)≈ 1.8 for the plane wave solution u. We compare the plane wave solution u with the approximation given by the ACMS method for different underlying finite element discretizations and multi-indices S_Γ, which define the order of the interface approximation space V_Γ,S_Γ introduced in <ref>. Moreover, we use the same value of I_e ∈{2,4,8,…, 64} for each of the 12 edges in . <ref> shows the approximation error of the ACMS method and the corresponding errors for the nodal interpolant I_h(u) for each mesh resolution. We observe that the H^1-error decreases with a rate between 3.5 and 4.0, until it approaches the accuracy of the nodal interpolant I_hu of the underlying finite element mesh. Similarly, the L^2-error decays cubically for sufficiently fine finite element meshes. This is in good agreement with <ref> and the relation λ_i^e ∼ i^2 stated in <ref>. We may conclude that, already with a low number of edge modes I_e≤ 32, or which corresponds to |S_Γ|≤ 384, the ACMS solution achieves the accuracy of the nodal interpolant in the H^1-norm, which employs around 8·10^6 vertices for h≈ 3.4·10^-4. In fact, as shown in <ref>, the ACMS solution converges to the (standard) finite element solution u_ FEM quadratically in the H^1-norm and cubically in the L^2-norm, respectively. §.§.§ Higher wavenumbers We now repeat the previous numerical experiments focusing on the effect of an increasing wavenumber; namely, we test our method for κ=2,4,8,16,32,64,128. Let us mention that <ref> is satisfied for all chosen wavenumbers and that the plane wave solution u changes with κ. In <ref>, we show the convergence of the ACMS method to the finite element approximation u_ FEM and, for comparison, we display the error between the nodal interpolant and the finite element solution. As expected, we can clearly observe a dependency of the error on the wavenumber. For example, for |S_Γ|=1 536, the errors e_0,h and e_1,h grow roughly quadratically in κ. This is less than we would expect in view of <ref>, and we may explain this behavior by the choice of different but equivalent norms. If one is satisfied with the approximation errors achieved by u_ FEM, we may again conclude that the ACMS method can yield good approximations already with a moderate number of degrees of freedom. We note that, by using higher order elements or further mesh refinements, the accuracy of u_ FEM may be increased; see <cit.>. Then, we would expect that the corresponding solution of the ACMS method would also show better accuracy in approximating the exact solution. If, however, approximation in the L^2-norm is the main objective, one could as well resort to other approaches that do not suffer from the pollution effect in the high wavenumber case; see, e.g., <cit.>. §.§ Localized interior source In certain applications, such as in geophysics <cit.>, the source terms of the wave propagation are localized. Therefore, let us study the behavior of the ACMS method for this type of setup. Different from the previous section, let us consider the non-zero source function f(x) = exp(-200 | x- x_c|^2), with x_c=(13,13), κ=1, and g ≡ 0. For this example, no analytical expression of the solution u is available. Thus, we only investigate the convergence of the ACMS method towards the solution of the underlying finite element method, which is justified by the discussion in the previous sections. <ref> shows the results for varying numbers of bubble functions and edge modes. In view of <ref>, we note that ≈ 0 outside the subdomain with x_c∈. Hence, for an accurate approximation, we only need bubble functions in that subdomains . Moreover, the linear system for the bubble component is diagonal and decoupled from the interface part. Hence, the solution coefficient corresponding to a specific bubble basis function can be computed independently from any other ACMS basis function; cf. <ref>. For this highly localized source, we observe spectral convergence to the finite element solution when I_j≥ 32, given a sufficiently high number of edge modes. This can be explained by inspecting the proof of <ref>: using repeatedly <ref>, integration-by-parts and that f and all its derivative are negligible on ∂, we can estimate (f, b_i^j)_ by arbitrary powers of λ_i^j; see also <ref> for similar steps. For a high number of bubble functions, a saturation effect occurs. This can be due to the limited quantity of edge modes or to the fact that the values of higher-order derivatives of f are not negligible anymore. When increasing the selected edge modes while keeping the number of bubble functions fixed, the convergence approaches the predicted quadratic and cubic rates for the H^1- and the L^2-error, respectively. Since the Galerkin problems for the bubble part and the interface are decoupled (see <ref>), the size of the systems to be solved remains comparably small. Therefore, we conclude that, for a moderate number of degrees of freedom, we obtain very good approximations of the finite element solution. §.§ Localized boundary source Next, let us modify the classical Helmholtz example from <ref> such that κ=16, f=0, and g(x)=exp(-200|x-x_c|^2), with x_c=(-1√(2),1√(2)). In <ref>, we display the real and imaginary part of the finite element solution computed on a quasi-uniform mesh with 521 217 vertices, i.e., h≈ 1.3· 10^-3. Although the source is very localized around x_c, the whole domain is excited, indicating the wave-type behavior of the solution. Since f=0 here, we do not need any bubble functions to obtain convergence according to <ref>. As we do not have an analytic solution, we investigate the error between u_ FEM and for varying number of edge modes. The results are shown in <ref>, where we consider the relative errors since the solution values are rather small. As predicted by <ref>, we observe second order convergence for the H^1-error, while convergence is initially slightly faster. The L^2-error shows a similar behavior with a convergence rate approaching third order; cf. <ref>. We again may conclude that we can approximate the highly resolved standard finite element solution using a moderate number of edge modes in the ACMS method. §.§ Periodic structure Let us conclude our numerical experiments with a heterogeneous Helmholtz problem on a domain decomposition as in <ref> (left) with a heterogeneous diffusion coefficient a depicted in <ref> (right). This configuration is similar to the modeling of two-dimensional photonic crystals <cit.>. We choose wavenumber κ=100, interior source f=0, and the localized boundary source g(x)=exp(-ι k· x)exp(-100|x-x_c|^2), with x_c=(0,12) and wave vector k=κ (1,0). The corresponding finite element solution, which has been computed on a quasi-uniform triangulation with 5 330 337 vertices, is shown in <ref>. Since, again, f=0, we only need to study the behavior for varying numbers of edge modes, while the bubble part of the solution is zero. Note that we can choose Ω_Γ defined in <ref> inside the region with a=1; cf. <ref>. The relative H^1- and L^2-errors between the finite element solution and the ACMS solution are listed in <ref>. For |S_Γ|=2 880, which corresponds to the case of 16 modes per edge, the ACMS discretization already yields a good approximation to the highly resolved finite element solution. Moreover, the convergence of the error is initially even better than predicted by our theoretical results for |S_Γ| ≥ 720. § CONCLUSIONS We extended the ACMS method, which has originally been developed for elliptic problems, to the heterogeneous Helmholtz equation. This framework is based on a decomposition into local Helmholtz problems and an interface problem, that can be solved separately. The numerical approximation of those problems is achieved by using basis functions with local support and which can be constructed locally as well. The error analysis developed for the investigated method is based on the abstract framework introduced in <cit.>, and it is possible to trace the wavenumber dependency of the involved constants. We proved error estimates in the H^1- and the L^2-norm, and we obtained algebraic decay in the number of basis functions (modes) being used. In order to be able to apply the framework of <cit.>, we presented estimates for the adjoint approximability constants, which can be understood as a `sufficient resolution' condition for the problem at hand. In order to satisfy this resolution condition, the number of edge modes should be sufficiently large in relation to the wavenumber. Moreover, we showed applicability of the method also if the diffusion coefficient is not smooth, as long as smoothness in a neighborhood of the interface is guaranteed. Finally, we exemplified the theoretical error bounds by numerical experiments, which show the accuracy of the investigated ACMS method for moderate wavenumbers. We constructed the ACMS basis functions using a finite element method, and we observed that the resulting discrete ACMS method approximates well the corresponding finite element solution. Thus, we may conclude that the accuracy of the discrete ACMS method depends on the accuracy of the underlying finite element method, and smaller errors might be achieved by using high-order finite elements. § ACKNOWLEDGMENTS EG and MS acknowledge support by the Dutch Research council (NWO) via grant OCENW.GROOT.2019.071. AH and MS acknowledge support by the 4TU.AMI SRI Bridging Numerical Analysis and Machine Learning. siamplain
http://arxiv.org/abs/2303.07049v1
20230313121451
High-resolution He I 10830 Å narrowband imaging for precursors of chromospheric jets and their quasi-periodic properties
[ "Ya Wang", "Qingmin Zhang", "Zhenxiang Hong", "Jinhua Shen", "Haisheng Ji", "Wenda Cao" ]
astro-ph.SR
[ "astro-ph.SR" ]
1Key Laboratory of Dark Matter and Space Astronomy, Purple Mountain Observatory, CAS, Nanjing, 210023, People's Republic of China 2Xinjiang Astronomical Observatory, CAS, Urumqi, 830011, People's Republic of China 3Big Bear Solar Observatory, New Jersey Institue of Technology, Big Bear City, CA 92314, USA wangya@pmo.ac.cn High-resolution He I 10830 Å narrowband imaging for the precursor of chromospheric jets and the quasi periodic property Y. Wang; Q. Zhang; Z. Hong, et al. Solar jets are well-collimated plasma ejections in the solar atmosphere. They are prevalent in active regions, the quiet Sun, and even coronal holes. They display a range of temperatures, yet the nature of the cool components has not been fully investigated. In this paper, we show the existence of the precursors and quasi-periodic properties for two chromospheric jets, mainly utilizing the He i 10830 Å narrowband filtergrams taken by the Goode Solar Telescope (GST). The extreme ultraviolet (EUV) counterparts present during the eruption correspond to a blowout jet (jet 1) and a standard jet (jet 2), as observed by the Atmospheric Imaging Assembly (AIA) on board the Solar Dynamic Observatory (SDO). The high-resolution He i 10830 Å observation captures a long-lasting precursor for jet 1, signified by a series of cool ejections. They are recurrent jet-like features with a quasi-period of about five minutes. On the other hand, the cool components of jet 2, recurrently accompanied by EUV emissions, present a quasi-periodic behavior with a period of about five minutes. Both the EUV brightening and He i 10830 Å absorption show that there was a precursor for jet 2 that occurred about five minutes before its onset. We propose that the precursor of jet 1 may be the consequence of chromospheric shock waves, since the five-minute oscillation from the photosphere can leak into the chromosphere and develop into shocks. Then, we find that the quasi-periodic behavior of the cool components of jet 2 may be related to magnetic reconnections modulated by the oscillation in the photosphere. High-resolution He I 10830 Å narrowband imaging for chromospheric jets High-resolution He I 10830 Å narrowband imaging for precursors of chromospheric jets and their quasi-periodic properties Ya Wang1; Qingmin Zhang1; Zhenxiang Hong1; Jinhua Shen2; Haisheng Ji1; Wenda Cao3 Received; accepted ========================================================================================================================== § INTRODUCTION Jets are common in the solar atmosphere, occurring from the photosphere to the corona and featuring a range of temperature components <cit.>. They are widely distributed in active regions, quiet regions <cit.>, and polar regions <cit.>. They are beams of plasma moving along an open magnetic field, usually associated with microflares, radio type III bursts, and so on. Jets could also occur in closed-field structures, such as loops <cit.>. Frequent jet activities are considered to be associated with coronal heating, the occurrence of coronal mass ejections (CMEs), filament oscillations, magnetohydrodynamic waves, solar wind, and other phenomena <cit.>. Jets were observed early as Hα surges from ground-based telescopes <cit.>. With space instruments, they have been observed in X-ray and EUV passbands, thus, they have been dubbed X-ray jets <cit.> and EUV jets <cit.>. With improved resolution, many small-scale jet-like events have been reported, such as spicules and dynamic fibrils, possibly formed in the similar mechanism as those of large-scale jets <cit.>. Recent high-resolution observations have revealed numerous transient, small-scale, collimated outflows, denoted as jetlets <cit.>, at the base of coronal plume. These so-called jetlets also have an important role in heating the upper atmosphere <cit.>. Coronal jets can be classified as standard jets and blowout jets <cit.>. These definitions have been given in terms of the morphological description of coronal jets observed by Solar-B pre-launch/X-ray Telescope (Hinode/XRT) <cit.>. Standard jets are typical anemone jets, with λ types or inverted-Y structures in morphology. They are generally interpreted as a small-scale magnetic bipole reconnecting with the ambient open magnetic field <cit.>. The standard jet model can be used to explain X-ray and EUV jets based on the atmospheric layer where the magnetic reconnection had occurred <cit.>. By comparison, blowout jets have mainly five characteristics <cit.>: (1) the core of magnetic arcades is highly sheared, highly deviating from the potential field; (2) an extra jet's spire; (3) magnetic lines that participate in the eruption process of the jet being in front of the magnetic arcades; (4) additional brightenings inside the arch base of jets besides the outside brightenings; and (5) usually accompanied by the eruption of a twisting mini-filament <cit.>. Solar jets are closely related to the evolution of local magnetic structures. Observations show that jets tend to occur above small opposite-polarity magnetic elements and regions of moving magnetic features <cit.>. In addition, a large number of jets are caused by mini-filament eruptions or micro-eruptions that may be triggered by magnetic reconnection, accompanied by magnetic field cancellation <cit.>. High-resolution observations that include magnetic field data are needed to resolve the fine processes for different kinds of jets. Flares, filament eruptions, and CMEs usually have precursors, such as transient small brightenings and the appearance of the so-called sigmoid magnetic structure <cit.>. To understand the mechanism of jets, observations of their early signatures are essential, such as satellite sunspots [The satellite sunspot is defined as polarity reversals near the edges of large-spot penumbrae .<cit.>] <cit.>, mini-filaments <cit.>, coronal bright points <cit.>, and micro-sigmoids <cit.>. Some studies show that the jets associated with satellite sunspots are often closely related to the converging and shearing motions of small opposite-polarity magnetic elements <cit.>. The blowout jets are thought to be driven by a mini-filament eruption, similar to those observed in large-scale filament or CME eruptions <cit.>. In addition, solar jets are also observed being ejected from coronal bright points and small-scale sigmoids, which resemble the large-scale coronal sigmoid being the progenitor of solar eruptions. However, all the early signatures mentioned above are signals from other features, rather than directly from the jets themselves. In this regard, high-resolution observations are strongly needed. As we will see in this paper, high-resolution observations at He i 10830 Å is capable of tracing the precursors of jet eruptions. Solar jets tend to recur in the same place <cit.>. Some of the recurrent jets exhibit a quasi-periodic behavior with periods ranging from several minutes to dozens of minutes. <cit.>. <cit.> analyzed several jets repeatedly occurred in the active region where a pre-existing magnetic flux was canceled by newly emerging flux with opposite flux. <cit.> found a correlation between recurring magnetic cancellation and X-ray jet emission. The recurrent jet emission was caused by chromospheric evaporation flows due to recurring magnetic reconnection. Recurrent jets can also be produced by some moving magnetic features <cit.>. In a previous paper, we discovered a periodic behavior of about five minutes for a small-scale jet, observed in the He i 10830 Å passband <cit.>. In addition, some micro-eruptions observed in the same passband also present a five-minute quasi-periodic behavior <cit.>. High-resolution observations at He i 10830 Å have rarely been used in studying solar jets. The results suggest that previously so-called recurrent EUV jets are related to the photospheric global oscillation if we consider their cool components to be better revealed by high-resolution imaging at 10830 Å. A subsequent question considers whether the five-minute oscillation generally exists in all chromospheric jets and whether it would depend on the type of jet. Furthermore, we asked how the oscillation in the photosphere might affect the chromospheric jets. Before these fundamental questions can be addressed, further studies are certainly needed. With the well-precessed high-resolution He i 10830 Å observations from GST, we selected two chromospheric jets so that we could study their precursors and quasi-periodic properties, and to find similarities among them. In Section 2, we briefly introduce the data and instruments. We present our observation and data analysis in Section 3. Our conclusions and discussions are presented in Section 4. § DATA AND INSTRUMENTS The data set includes narrowband filtergrams (bandpass: 0.5 Å) at He i 10830 Å and broadband filtergrams (bandpass: 10 Å) at TiO 7057 Å obtained from GST <cit.> at Big Bear Solar Observatory (BBSO) on July 22, 2011, observed by <cit.>. The He i 10830 Å data have a pixel size of ∼ 009, a cadence of ∼ 14 s, and a field of view (FOV) of 90×90. While the TiO 7057 Å data have a pixel size of ∼0036 and a cadence of ∼15 s. TiO images provide the photospheric features in the region of jets and can be used for coalignment. The EUV/UV images were observed by the AIA <cit.> on board the SDO, with a pixel size of 0.6. AIA covers six EUV and two UV passbands, with a cadence of 12 s and 24 s, respectively. The magnetograms are obtained from the Helioseismic and Magnetic Imager <cit.> on board the SDO. The hmi.M_-45s data series provided us with full-disk magnetograms along the line of sight with a cadence of 45 s. The photospheric dopplergrams with a cadence of 45 seconds were provided by hmi.V_-45s data series. The full-disk Hα images are obtained from the Global Oscillation Network Group <cit.>, with a pixel size of 1 and a cadence of about 1 minute. GONG has the ability to obtain nearly continuous observations of the Sun on the ground and includes six stations: Big Bear Solar Observatory, High Altitude Observatory, Learmonth Solar Observatory, Udaipur Solar Observatory, Instituto de Astrofísica de Canarias, and Cerro Tololo Interamerican Observatory. We made the alignment through the same features of the moss region based on the Hα and He ii 304 Å images from SDO/AIA. To study small-scale jet events, a precise coalignment among the images of the photosphere, chromosphere, and corona is required. The He i 10830 Å line is optically thin in most quiet regions, which allows the photosphere to be visible as a background. This is a benefit for the coalignment between TiO and He i 10830 Å images. Meanwhile, the coalignment between TiO 7057 Å broadband images and SDO/HMI continuum images was performed by using the same characteristics from sunspots, pores, and bright granules. The remaining offset after coalignment is less than ∼05 <cit.>. § OBSERVATION AND DATA ANALYSIS The two jets occurred in the NOAA active region 11259. Fig. 1 gives an overview of the region of interest with a field of view (FOV) of 60×60. The red boxes in panels (e1) and (e2) indicate the regions where the two jets occurred. White boxes roughly delineate the base boundaries of the two jets. The sunspot is dominated by a negative magnetic field, with some scattered positive polarity fields around it (panels d1 and d2). On the eastern side of the sunspot, there lies a EUV moss region (panel e2), where many periodic small-scale mass ejections of about five minutes, powered by magnetoacoustic oscillations, have been reported <cit.>. The two jets are located on the northern side of the sunspot. §.§ Jet1: Blowout jet and its precursor GST carried out the observation for jet 1 from 20:47:45 UT to 21:34:35 UT, on July 22, 2011. Fig. 2 (a) gives the He i 10830 Å image for jet 1. The EUV images in 131, 171, and 304 Å passbands are presented in Fig. 2 (c-e). The blowout jet has multiple hot ejections and consists of two strands as observed in EUV images. Their speeds are estimated as 62-77 km s^-1 and 122-128 km s^-1, for strands 1 and 2, respectively. The appearance of the jet, as observed in high-resolution He i 10830 Å images, consists of many thin threads that overall form the anemone-like morphology. Based on the EUV light curves given in Fig. 2 (L1), we find that there are two main eruptions about 10 minutes apart. EUV observations show that the jet started at ∼21:17:00 UT, and peaked at 21:21:36 and 21:31:20 UT, respectively. Remarkably, the chromospheric counterpart of the blowout jet possesses a rich precursor stage lasting at least 30 minutes as shown on the time profile of He i 10830 Å in Fig. 2 (L2) from ∼20:47 UT to ∼21:17 UT. The integrated intensity of He i 10830 Å has already started to descrease at 20:47 UT. The enhanced absorption indicates the overpopulation of triplet helium. As shown in Fig. 3 (a1-a5), the precursor presents recurrent jet-like structures. For comparison, we observed only a mass of dark materials on the Hα images obtained from GONG in panels (b1-b5). Except for a brightening at 1600 Å and emission at 304 Å at ∼21:09:29 UT, we found no other signals in all the EUV passbands from SDO/AIA during the precursor stage. The corresponding animation displays the precursor stage clearly. The jet was preceded by slight disturbances observed on the integrated intensity curves of He i 10830 Å. There are five intermittent jet-like features (labeled as “1”-“5” in Fig. 2 (L1)) shown as enhanced absorptions. Each enhanced absorption corresponds to intensified ejections of cool materials around the whole jet region. The corresponding picture is given in Fig. 3 (a1-a5). We performed a Morlet wavelet analysis <cit.> for the detrended He i 10830 Å light curve to determine the period of oscillation (Fig. 4). The wavelet power spectra (Fig. 4c) show the dominant period of about five minutes that is above the 95% significance level. The evolution and eruption of the blowout jet are shown in Figs. 5 and 6. The cool component is observed as a surge in Hα images. For this blowout jet, the cool component is formed in the middle of the two strands, which refer to the hot components of the jet. For comparison, the surge consists of two cool ejections observed at He ii 304 Å. The two cool ejections are also observed at He i 10830 Å, and one ejection experienced a lateral motion (Fig. 6 (a5)). We thus consider how these two cool ejections were formed. The high-resolution observation in He i 10830 Å passband shows that it is the result of an ejection of cool components from the lower atmosphere. In the EUV passbands, this ejection is manifested as two strands at two different locations (Fig. 6), in agreement with the blowout jet model. However, in the He i 10830 Å counterpart, the jet behaves differently. The two-part structure is contained in one anemone-shaped structure with enhanced absorption. Until ∼21:34:20 UT, one ejection has a lateral expansion. At ∼21:28 UT, we observe small dark arcades emerging inside the anemone structure (Fig. 6 (a1)). The emerging was accompanied by brightenings in 1600 Å passband at the same location. The emerging arcades reconnect with the surrounding open magnetic field. The reconnection created a darkened cusp-shaped structure (Fig. 6 (a2)), which was expelled as a cool component along with the hot ejections in EUV images (Fig. 6 (c3-c5)), giving rise to strand 1. We find obvious material motions around the structure before the hot eruption. We believe that the magnetic field of the thin threads with enhanced absorption on the eastern side (pointed by red arrows) plays a part in the magnetic reconnection. During the eruption, we observe brightenings in 1600 Å passband (Fig. 6 (b2-b3)) inside and outside the base of the jet, and even He i 10830 Å brightens at the footpoint. The ejection of the cool component looks like an eruption of a mini-filament in EUV counterparts. However, we see no filament before the eruption of the blowout jet in 304 Å images. The cool materials may come from the lower atmosphere brought up by the emerging magnetic arcades. In addition, we found that strand 2 in the EUV images displays multiple ejections. It has a rotational motion and a lateral expansion at 21:32:20 and 21:34:20 UT, respectively, which can be seen in panels (c4-c5) of Fig. 6 and the corresponding animation. Following the lateral expansion of hot ejections, an extra cool ejection appeared in He i 10830 Å at 21:34:22 UT, as indicated by a white arrow in Fig. 6 (a5). In this evolutionary process, the enhanced absorption turns into emission, as observed as brightenings in front of the arch base of the jet (seen in Fig.6 (a1-a5)). Strand 2 was ejected faster, with a speed reaching more than 120 km s^-1. §.§ Jet2: Standard jet and precursor The second jet (jet 2) is shown in Fig. 7. The jet manifests itself as a EUV bright point with a size of about 2×2 in AIA images. The jet was caused by magnetic reconnection between an emerging granule-sized magnetic element and the ambient magnetic field as studied by <cit.>. Their time profiles of EUV passbands are presented in Fig. 7 (L1). We find that it is quasi-periodic and peaks at 17:42:00 UT. As shown in Fig. 7, the chromospheric jet observed at He i 10830 Å displays enhanced absorption. At the peak time, the morphology of the jet in He i 10830 Å images shows a domelike base with a distinct thin spire. It contains many thin and dark threads, and the width of a separated thread could be about 100 km as reported by <cit.>. Along the ejection labeled by slice 1 in panel (a), we made a time-distance diagram and obtained the speed of the ejection, measured as 119 km s^-1. For the light curves of integrated intensities shown in Fig. 7 (L1-L2), the He i 10830 Å absorption valleys correspond to the emission peaks at 131, 171, and 304 Å passbands. Before the jet was initiated, the jet-like structure in He i 10830 Å images appeared as a precursor, as shown in Fig. 8 (a1). It corresponds to a valley on the lightcurve of He i 10830 Å passband at ∼17:36 UT in Fig. 7 (L2). The EUV counterpart is relatively weak, yet there appeared as a EUV bright point. This phenomenon is similar to the jet-like structure that occurred in the precursor phase of jet 1. However, the precursor phase of jet 1 lasted for half an hour and it appeared only once for jet 2. It is worth noting that the precursor proceeds about five minutes before the eruption of jet 2. The moments of enhanced absorption of the jet or emission of the integrated intensity from the bright point, judging from the absorption valleys or emission peaks, appear at 17:36:00, 17:42:00, 17:45:30, and 17:49:10 UT, which are labeled with numbers from “1” to “4.” We give snapshots at the four moments above at He i 10830 Å, Hα, He ii 304 Å, and 94 Å, as shown in Fig. 8. With the four enhancements of the cool materials, the corresponding EUV bright point was observed, indicating that it was heated to millions of degrees. According to the standard jet model, the material ejection is caused by magnetic reconnection between an emerging arcade and the ambient magnetic field. We also performed a Morlet wavelet analysis of the He i 10830 Å light curve to determine the period of oscillation of jet 2 (Fig. 9a). The wavelet power spectrum (Fig. 9c) shows that the period of about five minutes is above the 95% significance level. To detect their quasi-periodic properties, the time profiles and wavelet power spectrums of the photospheric doppler velocity (when picking out the redshift one that is positive) over the jet region were obtained using the SDO/HMI dopplergrams with a cadence of 45 seconds. Both of the wavelet power spectrums (Fig. 10) during the precursor of jet 1 and the whole process of jet 2 show a period of about five minutes from ∼20:47:56 UT to ∼21:07 UT and 17:35:11 UT to ∼18:00 UT, respectively. In addition, we compared the phase differences between the photospheric doppler velocity and chromospheric jets, with the result shown in Fig. 10 (c1 and c2). The phase differences are different for the two jets. For the precursor of jet 1, the photospheric doppler redshift velocity is ∼107 seconds ahead of the jet oscillation. However, for jet 2, the photospheric doppler velocity lagged behind the jet oscillation by ∼119 seconds. We note that valleys of the chromospheric oscillation observed at He i 10830 Å in Fig. 10 are the peak time of the jets in EUV passbands. On the other hand, the TiO images reflect the photospheric signal well. For the integrated intensity of TiO 7057 Å in the jet region, it presents a quasi-periodic osillation with a period of five minutes as well. § CONCLUSIONS AND DISCUSSIONS In this paper, we analyzed two jets of two different types with the well-processed high-resolution He i 10830 Å narrowband filtergrams taken by GST on July 22, 2011. Aided by EUV observations from AIA and photospheric velocity from HMI on board the SDO spacecraft, as well as the Hα images from the GONG, we studied the precursors, fine structures, multi-temperature components, and the quasi-periodic oscillation of the two jets with two different types. Our main conclusions for the two jets are as follows: * The chromospheric jet 1, of which the EUV counterpart is a blowout jet, possesses a precursor phase that lasted half an hour. The precursor presents jet-like dark and thin threads that come upward recurrently in the region of the blowout jet. The precursor is direct jet phenomenon rather than other features, such as satellite sunspots, mini filaments, or mini-sigmoids. In addition, we find that the precursor is quasi-periodic, with a period of about five minutes. We confirm the five-minute oscillation with both wavelet analysis to its light curve and visible inspection to the recurrent appearance of dark threads in He i 10830 Å images. During the precursor phase, there are few EUV emissions. Two strands in EUV images are observed during the eruption. One of them experiences a rotation motion and a lateral expansion. The cool materials observed as Hα surge experience a lateral motion and split into two cool ejections, which are also observed in He i 10830 and He ii 304 Å passbands. * Jet 2 displays one enhanced absorption about five minutes before the eruption, which can also be regarded as the precursor of the jet. For its EUV counterpart, it presents a coronal bright point. We find a total of four enhanced absorptions in the available data range of He i 10830 Å, which also shows a quasi-periodic property with a period of about five minutes. The five-minute oscillation is confirmed with both wavelet analysis and image inspection. Our key finding is the detection of quasi-periodical oscillations with a characteristic period of about five minutes in the jet-like features that precede the jets. <cit.> found that the vast majority of coronal jets (either single or recurrent) are preceded by slight precursor disturbances observed in the mean intensity, occurring several minutes before each intensive jet ejection. These authors considered these enhancements of brightness as precursors of coronal jets and detected quasi-periodical oscillations with characteristic periods from sub-minutes up to four minutes in the bright point brightness that precedes the jet eruption. <cit.> studied the pre-jet phase of the jets and found quasi-periodic intensity oscillations at their base. The quasi-periodic intensity oscillations have a period of between two and six minutes, and are reminiscent of acoustic or magnetohydrodynamic waves. The value that both jets have in common is their quasi-periodic property, with a period of about five minutes. With regard the possible mechanism of these oscillations, we discuss them below. For the precursor of jet 1, it appears to be similar to the periodicities and oscillations in jet-like observations, as previously reported by several authors <cit.>. <cit.> and <cit.> reported that not all dynamic fibrils that belong to some kind of small-scale jet-like features on the disk show oscillations or recurrence, but a significant number of them do. Most of the power in dynamic fibrils possess periods between four and six minutes. <cit.> also suggested a similar period range in mottles in the enhanced network or weak plages. They suggested that the formation of dynamic fibrils is the result of chromospheric shock waves driven by convective flows and global oscillations in the photosphere and the convection zone. The mechanism was initially proposed by <cit.>. Later, the rebound shock model <cit.> suggests that upward shocks are observed as recurrent jets. In addition, in a stratified medium, a sudden disturbance can make the medium oscillate at a natural frequency close to the acoustic cut-off frequency <cit.>, which can nonlinearly develop into a sequence of upward shocks. These shocks may be observed as recurrent jets. The oscillatory power spectrum of the photospheric driver is dominated by the power at five minutes. The chromosphere filters out waves with periods that are longer than the local acoustic cutoff period. However, the acoustic cutoff depends on the inclination of the magnetic field. In the inclined field, for example, at the edge of a plage region, the photospheric five-minute wave can leak into the chromosphere along the inclined magnetic line, developing into shocks and forming jet-like features. This scenario can be used to interpret the periodic jet-like structure with a period of five minutes in the precursor phase of the blowout jet. However, the driving mechanism of the quasi-periodic property in solar jets is still a subject of debate. They may be different with respect to various magnetic topologies. For the standard jet (jet 2), the quasi-periodic oscillation occurred during the eruption of the jet and we observe brightenings in the EUV images simultaneously. These are the result of magnetic reconnection between magnetic arcades and ambient open magnetic field lines. The quasi-periodic oscillation is more likely due to the magnetic reconnection process modulated by the five-minute oscillation in the photosphere. The quasi-periodic behavior indicates a modulation from p-mode oscillations to the reconnection, which has been modeled numerically by <cit.>. The difference in the phase delay between the photospheric doppler velocity and the ejection of the two jets may indicate different physical mechanisms. For jet 1, the proposed mechanism is based on the finding that the five-minute oscillation can leak into the chromosphere, developing into shocks and forming jet-like features; whereas for jet 2, the quasi-periodic behavior may indicate a modulation from the photospheric oscillation to the magnetic reconnection. On the other hand, it is interesting to discuss the property of the cool material located in the middle of the two hot strands of the blowout jet. It has been widely reported that the eruption of mini-filament triggers jets and numerous observations also have confirmed the result. With regard to our result, we consider whether these cool materials are a mini-filament or cool components of the jets – or a mixture of them. We see no mini-filaments before the eruption of jet 1, at He 304 Å or Hα 6563 Å. This may be due to the limitation of the spatial resolution. In the He 10830 Å passband, they present high-dynamic jet-like features with a periodicity of about five minutes. The formation of the cool ejection possibly shows up with the emerging magnetic arcades from below the photosphere. Thus, it is worth investigating what its appearance is in other wavelengths with high-resolution observations. In this paper, the analysis of five-minute oscillation of the chromospheric jets and their precursors is still limited to case studies. Further investigations of larger jet samples are needed to investigate whether a five-minute oscillation is a common phenomenon in solar jets when considering high-resolution observations from He i 10830 Å imaging and to find out how the oscillation in the photosphere affects these jets. We thank the anonymous referee for his/her constructive comments and suggestions. We thank the team of SDO/AIA and SDO/HMI for providing valuable data. The AIA and HMI data were downloaded via the Joint Science Operations Center. The Hα data from GONG is downloaded via Virtual Solar Observatory. This work is supported by the National Key R&D program of China 2021YFA1600502 (2021YFA1600500). This work is supported by NSFC grants 12003072, 12173092, 12073081, 12273115, and 12273101. Y.W. is supported by the Youth Found of JiangSu No. BK20191108. BBSO operation is supported by NJIT and US NSF AGS-1821294 grant. aaStyle
http://arxiv.org/abs/2303.06828v1
20230313030701
Two-step Band-split Neural Network Approach for Full-band Residual Echo Suppression
[ "Zihan Zhang", "Shimin Zhang", "Mingshuai Liu", "Yanhong Leng", "Zhe Han", "Li Chen", "Lei Xie" ]
eess.AS
[ "eess.AS" ]
[ [ March 30, 2023 ================== This paper describes a Two-step Band-split Neural Network (TBNN) approach for full-band acoustic echo cancellation. Specifically, after linear filtering, we split the full-band signal into wide-band (16KHz) and high-band (16-48KHz) for residual echo removal with lower modeling difficulty. The wide-band signal is processed by an updated gated convolutional recurrent network (GCRN) with U^2 encoder while the high-band signal is processed by a high-band post-filter net with lower complexity. Our approach submitted to ICASSP 2023 AEC Challenge has achieved an overall mean opinion score (MOS) of 4.344 and a word accuracy (WAcc) ratio of 0.795, leading to the 2^nd (tied) in the ranking of the non-personalized track. Acoustic echo cancellation, noise suppression, band-split, two-step network § INTRODUCTION The 4th acoustic echo cancellation (AEC) challenge <cit.> is a flagship event of the ICASSP 2023 signal processing grand challenge, with the aim to benchmark AEC techniques in real-time full-band (48KHz) speech communication. In this challenge, our team has submitted a hybrid approach that combines a linear filter with a neural post-filter to the non-personalized AEC track (i.e., without using target speaker embedding). Since noise-like components usually dominate in higher bands of speech and structured harmonics are mainly found in wide-band signals, we propose a two-step band-split neural network (TBNN) approach to particularly handle full-band residual echo removal on wide-band (16KHz) and high-band (16-48KHz) in a two-step process, as an extension of our previous work <cit.> to better model full-band signals with low complexity. Specifically, the wide-band poster filter (WBPF) is based on the gated convolutional recurrent network (GCRN) <cit.> but with upgraded U^2 encoder <cit.> for better latent feature extraction. We also redesign the data simulation method and the loss function to accommodate full-band signals. According to the results, our system has ranked 2nd place (tied rank) in the non-personalized track with an overall mean opinion score (MOS) of 4.344 and a word accuracy (WAcc) ratio of 0.795. § PROPOSED METHOD §.§ Problem formulation For a typical full-duplex communication system consisting of a microphone and a loudspeaker, the signal model can be expressed as d(n)=s(n)+r(n)+v(n)+z(n) z(n)=h(n) ∗ℱ{x(n)} where the microphone signal d(n) is composed of the near-end speech signal s(n) which may include early reflections, late reverberation r(n), additive noise v(n), and echo signal z(n), where n is the sampling index. The echo signal z(n) is obtained by convolving the echo path h(n) with the nonlinear distorted reference signal x(n), shown in Eq. (<ref>), where ℱ refers to the nonlinear distortions, * refers to convolution. An AEC system aims to cancel z(n) from d(n) given x(n). For complex real-life scenarios, noise v(n) and reverberation r(n) also need to be suppressed. We adopt a time delay estimation (TDE) module based on the sub-band cross-correlation to align the reference signal. Our linear filter uses a sub-band adaptive filtering method based on the NLMS algorithm to estimate the linear echo signal y and the error signal e. §.§ TBNN post-filter The TBNN post-filter takes d, e, and y after a short-time Fourier transform (STFT) as input. The complex-valued input spectra are compressed by a factor of 0.5, stacked by real and imaginary parts, and divided into wide-band signal I_WB and high-band signal I_HB. Considering the complexity of direct full-band modeling and the high-band has less structural information, we use a two-step band-split approach to model full-band signals. The wide-band post-filter (WBPF) first uses spectral mapping to estimate the wide-band output Ŝ_WB. Then the high-band post-filter (HBPF) uses I_HB and priori information Ŝ_WB to predict the complex-valued mask M_HB, which is multiplied by I_HB to obtain the high-band output Ŝ_HB. The backbone of the WBPF module is based on our previous gated convolutional recurrent network (GCRN) <cit.>. But differently, the encoder consists of 5 U^2-Encoder layers as shown in Fig. <ref>(b). U^2-Net <cit.> is a two-level nested U-structure designed to capture more contextual information from different scales (through Residual U-blocks) without significantly increasing the computational cost. Specifically, each U^2-Encoder layer is composed of a gated convolution (GConv) layer, a batch-norm (BN) layer, a PReLU and an UNet-block. The number of input and output channels remains the same. The FTLSTM layer is served as a bottleneck for temporal modeling, as defined in <cit.>. The decoder consists of 5 decoder blocks as shown in Fig. <ref>(c), where TrConv refers to the Transpose-Conv2d layer, and ⊗ refers to multiply. The skip connection (implemented with 1×1 convolution) is applied between the encoder and decoder. We also add a voice activity detection (VAD) module to avoid over-suppression of near-end speech <cit.>. The HBPF module uses three 2D-Conv modules to extract high-band features. Each 2D-Conv module consists of a 2D convolution (Conv2d) layer, an ELU layer, a BN layer and a dropout layer with a 0.25 dropout rate <cit.>. The wide-band output serves as prior information and it is concatenated with the high-band features after feature dimension alignment. Then we use the GRU layer and Conv2d layer to predict the real/imaginary mask, which is applied to the high-band input to obtain the high-band output. §.§ Loss function The loss function is composed of an echo power weighted magnitude loss and a power-law compressed phase aware (PLCPA) loss, our previous work has proved the effectiveness of echo-weighted loss <cit.>. The difference is that we calculate the loss separately for wide-band and high-band. A VAD loss and a masked mean square error (MSE) loss are added as auxiliaries to avoid near-end speech over-suppression. Thus for the wide-band part, the loss is ℒ_WB=ℒ_echo-weighted + ℒ_plcpa + 0.5·ℒ_mask + 0.1·ℒ_vad. For the high-band prediction, the loss is ℒ_HB=ℒ_echo-weighted + ℒ_plcpa + 0.5 ·ℒ_mask. The final loss function is ℒ_final = αℒ_HB + ℒ_WB. Due to the dynamic range difference between high-band and wide-band, we empirically set α=10. § EXPERIMENTS §.§ Dataset The near-end signals are taken from the 4th deep noise suppression (DNS) challenge, and the noises are taken from Freesound and AudioSet. The echo dataset is composed of real recordings and synthetic data. Real recordings are taken from the AEC-Challenge far-end single-talk dataset. We remove the recordings that contain near-end speech, in order to avoid model over-suppression on near-end speech. Synthetic data is generated by convolving room impulse responses (RIRs) with the DNS data. A total of 50,000 RIRs are generated using the HYB method<cit.>, with random room size 5×3×3 to 8×5×4 and rt60 0.2-1.2s. Totally 30% of the near-end speech is convoluted with RIRs to simulate reverbed signals. The total training data has 2000 hours of real-recorded echo and 1000 hours of simulated echo, while SNR randomly ranges from 0dB to 25 dB and the SER randomly ranges from -15dB to 15 dB. The validation and test sets are generated in the same way as above, with 50 hours and 1500 clips, respectively. §.§ Experimental setup Window length and frame shift are 20 ms and 10 ms, respectively and 960-point STFT is applied. For each Conv2d, we use a convolution kernel of (2, 3) and a stride of (1, 2). The FTLSTM configuration is the same as <cit.>. We experiment with two model sizes – the number of Conv2d channels in the encoder/decoder is 80 for the smaller one and 128 for the large one (with -L in the model name). We take our previous GCRN <cit.> for comparison, which is a wide-band model without HBPF and thus our previous subband method <cit.> is adopted to process full-band signal. U^2-based encoder is also tested for GCRN, named as GCRN-U^2. For the proposed TBNN model, the 2D-conv block in the HBPF module has an output channel of 128, the 1D convolution layer (Conv1d) is a point-wise convolution with an output channel of 48, and the GRU layer has a hidden state of 256. We particularly compare the performance of masking and mapping in HBPF. §.§ Results and conclusions We use a 400-hour subset for quick experimentation. As shown in Table <ref>, We have the following conclusions. First, the use of U^2-Encoder can achieve better performance with much fewer parameters compared to simply increasing the channel number (GCRN-U^2 vs. GCRN-L). Second, the proposed TBNN is better than GCRN which mainly focuses on the wide-band signal. Third, masking in HBPF leads to better near-end speech quality as compared with mapping. Finally, by enlarging the model size, TBNN-L-masking obtains the best performance. Thus the model trained with the entire 3000 hours of data is used to process the blind test set as our submission and results are shown in Table <ref>. Our submitted model achieved 2nd place (tied) in the challenge ranking. Its real-time factor (RTF) is 0.35, tested on Intel(R) Xeon(R) E5-2678 v3 @2.50GHz using a single thread, comprising 0.28 for the TBNN post-filter (exported by ONNX) and 0.07 for the time delay estimation and adaptive filter. IEEEbib
http://arxiv.org/abs/2303.06740v1
20230312195234
Fine-tuning Strategies for Faster Inference using Speech Self-Supervised Models: A Comparative Study
[ "Salah Zaiem", "Robin Algayres", "Titouan Parcollet", "Slim Essid", "Mirco Ravanelli" ]
eess.AS
[ "eess.AS", "cs.LG" ]
An energy-efficient GMRES–Multigrid solver for space-time finite element computation of dynamic poro- and thermoelasticity Mathias Anselmann^∗anselmann@hsu-hh.de (corresponding author) , Markus Bause^∗, Nils Margenberg^∗, Pavel Shamko^∗ ^∗ Helmut Schmidt University, Faculty of Mechanical and Civil Engineering, Holstenhofweg 85, 22043 Hamburg, Germany ================================================================================================================================================================================================================================================== § INTRODUCTION
http://arxiv.org/abs/2303.07309v1
20230313173052
An efficient phase-field model of shear fractures using deviatoric stress split
[ "Ehsan Haghighat", "David Santillán" ]
cs.CE
[ "cs.CE" ]
1]Ehsan Haghighat 2]David Santillándavid.santillan@upm.es [1]Department of Civil and Environmental Engineering, Massachusetts Institute of Technology, 77 Massachusetts Ave, Cambridge, 02139, Massachusetts, USA [2]Departamento de Ingenería Civil: Hidráulica, Energía y Medio Ambiente , Universidad Politécnica de Madrid, C/Profesor Aranguren 3, Madrid, 28040, Spain We propose a phase-field model of shear fractures using the deviatoric stress decomposition (DSD). This choice allows us to use general three-dimensional Mohr-Coulomb's (MC) failure function for formulating the relations and evaluating peak and residual stresses. We apply the model to a few benchmark problems of shear fracture and strain localization and report remarkable performance. Our model is able to capture conjugate failure modes under biaxial compression test and for the slope stability problem, a challenging task for most models of geomechanics. An efficient phase-field model of shear fractures using deviatoric stress split [ March 30, 2023 =============================================================================== § INTRODUCTION The shear failure of brittle materials in compression, also known as shear bands or localized strains, are one of the dominant modes of failure in geo-structures. It has recently emerged as an active research topic due to its interest in structural geology and engineering. The growing interest stems from its engineering applications in subsurface energy technologies, including enhanced geothermal energy systems where the hydro-shearing technique is aimed to reactivate and slide the preexisting fracture network to increase the rock mass permeability <cit.>, large-scale CO_2 sequestration in deep saline aquifers <cit.>, impoundment and level changes of artificial water reservoirs of hydropower plants <cit.> and underground natural gas storage facilities <cit.>, where their mechanics are crucial to understanding the stability of faults and hence earthquake mechanisms <cit.>. Other engineering applications include fault and slope stability assessment <cit.>, or the stability of faults during the groundwater injection and production operations <cit.>. The simulation of shear fracturing processes is a challenging task. The finite element method (FEM) has been the dominant numerical method for modeling solids and continua. Classically, two fundamentally different perspectives are proposed to study compressive fractures using FEM: - Discrete fracture models (DFM) that are based on the classical theory of Linear Elastic Fracture Mechanics (LEFM) founded by <cit.>. - Smeared fracture models (SFM) that are based on the classical theory of Continuum Damage Mechanics (CDM) proposed initially by <cit.>. Each class includes extensive literature dating back to the 1960s that is out of the scope of this text to cover comprehensively. Therefore we only point the interested reader to a few primary studies of each class. Within the DFM realm, common approaches include node duplication on fracture interface <cit.>, strong discontinuity approaches <cit.>, and Extended Finite Element Methods (XFEM) <cit.>. These methods require using geometrical algorithms to trace the fracture propagation, which has been found very challenging for generic three-dimensional setups. Such methods are efficient for modeling single fractures. However, they become quickly impractical when dealing with complex fracture nucleation and propagation patterns. As per the SFMs, we can point to continuum damage models (CDM) <cit.>, peridynamic models <cit.>, and phase-field models (PFM) <cit.>, which we discuss next in more details. While early models showed significant mesh dependencies, these models have been used to simulate very complex fracture patterns under realistic conditions. Among this class, phase-field models have been most attractive in recent years due to their thermodynamically sound foundations and their ability to model complex fracture patterns. Phase-field models have been extensively used for modeling brittle, cohesive, and ductile Mode-I fracture patterns, in elastic or poroelastic materials and homogeneous or heterogeneous domains <cit.> <cit.>. Although proposed a simple extension for shear fractures, the applicability of phase-field for modeling shear failure remained virtually untouched until very recently <cit.>. In a detailed study, presented a phase-field formulation of frictional fracture based on theory and using a similar stress decomposition approach to the one proposed by for tensile cracks. The authors validated their model on a set of classical problems as well as various experimental setups <cit.>. In the present study, we propose a phase field model of shear failure that adapts the cohesive model of shear fractures proposed by for deviatoric stress decomposition (DSD) instead of the proposed contact stress decomposition (CSD). Hence, we arrive at an alternative descriptor for the shear fracture orientation (i.e., the α tensor) which is solely based on the deviatoric strain. We adapt the crack driving force to be consistent with the DSD decomposition. The resulting formulation simplifies the damage criterion since it results in damaging the shear modulus. Lastly, the proposed model allows us to use the general forms of the failure functions from the classical plasticity theory and therefore is not limited to Mohr-Coulomb failure model. In what follows, we first briefly describe the original framework based on CSD. We then discuss our generalization proposal. Lastly, we use both frameworks to model a set of benchmark problems. § PHASE-FIELD METHOD In this section, we first describe the general phase-field framework for modeling crack propagation in materials. We then summarize the most recent CSD shear model <cit.>. Finally, we discuss our proposed adjustment for better stability. §.§ Phase-field governing equations Consider the continua Ω∈ℝ^D in D-dimensional space, depicted in <Ref>, with its boundary represented as Γ. The boundary Γ is subjected to Neumann boundary conditions on Γ_t and Dirichlet boundary conditions on Γ_u, where Γ_u ∪Γ_t = Γ and Γ_u ∩Γ_t = ∅. The set of discontinuities in the domain is represented by a discrete surface Γ_d. According to the phase-field formulation, the fracture's discrete surface Γ_d is approximated implicitly as a continuous function over a width l using the Allen-Cahn fracture surface density function γ(d) as γ(d) = 1/c_0 l( w(d) + l^2 ∇ d ^2 ), with c_0 = 4∫_0^1 √(w(l)) dl where d is the phase-field variable, with d=0 presenting the intact part of the domain while d=1 expressing a point on Γ_d. w(d) is the transition function, also known as the dissipation function, defined for cohesive cracks as w(d)=d <cit.>, hence c_0=8/3. Accordingly, a surface integral ∫ ds is approximated using a volume integral as ∫ ds ≈∫γ(d) dv. Given the displacement field u, the small-deformation strain measure =(∇u + ∇u^T)/2, and the crack surface density function γ(d), the total energy of a fractured continua, occupying the domain Ω and bounded by the boundary Γ, shown in <Ref>, is expressed as Ψ = -Ψ^external + Ψ^internal + Ψ^fracture, where, Ψ^external is the work done by the external traction stress τ and body force b, and expressed as Ψ^external = ∫_Γ_tu·τ ds + ∫_Ωu·b dv. The fracture energy, i.e., Ψ^fracture, is the energy dissipated from the system to create a fracture surface Γ_d. Given the energy release rate G_c (per unit fracture length), Ψ^fracture is expressed as Ψ^fracture = ∫_Γ_dG_c  ds ≈∫_ΩG_c γ(d) dv. The stored internal energy of the system Ψ^internal consists of the elastic stored energy in the intact part of the domain and stored energy in the damaged part of the domain, expressed as Ψ^internal = ∫_Ωψ(, d) dv. The internal energy density function ψ(, d) is defined as ψ(,d) = 12 :, which consists of both inactive and damaged counterparts. For the intact part of continuum, i.e., where d=0, the Cauchy stress tensor (, d=0) is expressed using Hook's law as (, d=0) = (κ-2/3μ) ε_v 1 + 2μ, where, κ and μ are bulk and shear moduli of the intact material, respectively, and ε_v is the volumetric strain, expressed as ε_v = (). For the parts of the domain where d > 0, the Cauchy stress tensor is decomposed into inactive part ^I and active part ^A as (, d) = ^I() + ^A(,d) = ^I() + g(d) () + (1-g(d))(). The active part of the stress tensor undergoes the damage process, and g(d) is a degradation function that expresses the stress transition from bulk () to fracture (). We will discuss these in more details in the next sections. Therefore, there are two solution variables associated with the phase-field formulation, the standard displacement field u and the additional phase-field variable d. Taking the variation of Ψ with respect to u and d, and following the standard weak to strong form steps of the FEM <cit.> and phase-field <cit.>, we can arrive at the following governing relations: ∇·(,d) + b = 0, 3G_c/8l(2l^2∇^2 d - 1) - g'(d) H() = 0. The irreversibility of the fracture process is guaranteed with the local history field of maximum stored shear energy H^+() that allows us to solve the constrained minimization of <ref> in a straightforward way <cit.> and avoids unphysical self-healing. H^+() is defined as follows: H^+() = max_s∈[0,t]( H() ), where t is time. <Ref> is then rewritten as follows: 3G_c/8l(2l^2∇^2 d - 1) - g'(d) H^+() = 0. Since Ḣ≥0, non-negative ḋ is guaranteed and, consequently, the irreversibility of the fracture growth. We define H() after describing the stress decomposition approach. In this work, we use the Lorenz degradation function g(d) defined as <cit.>: g(d, p) = (1-d)^2/(1-d)^2 + M/ψ_cd(1+p d) where, M=G_c/(c_0 l) and ψ_c is the critical crack driving force at the material's peak strength, evaluated as ψ_c = -M w'(0)/g'(0). The damage begins to accumulate as soon as elastic stored energy exceeds this critical threshold. Here, we take p=1. §.§ Stress decomposition. Introduction The split of the strain energy density into crack driving and intact components defines the damage mode and fracture pattern. Up to date, two fundamental approaches are available. The approaches of the first class do not take into account the local fracture orientation, whereas the second approaches take into consideration the local crack orientation. The first group of models includes the isotropic model, the volumetric and deviatoric decomposition model, the spectral decomposition model, or the anisotropic models. The isotropic model proposed by where the entire strain energy density is degraded. The volumetric and deviatoric decomposition model proposed by splits the strain tensor into its volumetric and deviatoric components. This approach avoids crack inter-penetration in composites and masonry structures. The fracture is then assumed to be driven by volumetric expansion and deviatoric strains. The spectral decomposition model proposed by splits the strain tensor into its principal components and only tensile components drive the fracture propagation. The anisotropic models are based on the spectral decomposition of the strain tensor using other projections, such as the eigenvalue and eigenvector of the effective stress tensor <cit.>. The second group of approaches take into consideration the local crack orientation. The directional model proposed by  splits the stress tensor into the crack driving and persistent components using the fracture orientation. For each point, a fracture coordinate system is defined and the fracture orientation is obtained from the maximum principal stress direction.   and  computed the fracture orientation from the phase-field gradients. Following this way to compute the fracture direction,  developed a phase field model based on micromechanical modeling, i.e., the macroscopic fracture is modeled as a collection of microscopic fractures. In the following subsections, we describe the contact stress decomposition (CSD), used satisfactorily to simulate shear fractures under confining pressures, and lastly we present our proposal based on the deviatoric stress decomposition (DSD). Both models do not take into account the local fracture orientation. §.§.§ Contact stress decomposition (CSD) Since a compressive fracture behaves like a contact problem, proposed a stress decomposition approach that is closely related to the contact formulation, which we refer here as CSD. It starts by considering a corotational coordinate system on the fracture surface with m and n as tangential and normal vectors to the crack surface, and m along the direction of sliding. Additionally, let us define α = (mn + nm)/2. According to this approach and under the assumption that the fracture remains closed, i.e., no tensile fracture, the only stress component that should undergo damage is the shear stress, and other stress components remain inactive. The bulk shear stress can be expressed as τ̂ = :α = με_γ, where, ε_γ = 2 :α = 2 m··n. Consider the contact shear stress as τ̃. Then, the inactive stress tensor is expressed as ^I = (, d=0) - με_γ α, and the active stress tensor as ^A = τ^A α, where τ^A = με_γ g(d)+ τ̃ (1-g(d)). Here, τ̃ is the residual contact stress while the fracture is fully developed, i.e., d=1. Given the Mohr-Coulomb's failure function as, F = |τ| - σ_ntanϕ - c = 0 with σ_n=n··n as to normal stress on the fracture surface, and c and ϕ as cohesion and friction angle of the intact material, the peak and residual shear stresses are expressed as τ̃_p = c + σ_n tan(ϕ), τ̃_r = c_r + σ_n tan(ϕ_r), where c_r and ϕ_r are residual friction and cohesion at the fully developed failure state. Based on the Mohr-Coulomb failure criterion, the critical plane for the failure is evaluated at two conjugate angles θ = ±(45^∘ - ϕ_r/2) <cit.> with respect to the direction of the maximum principal stress. However, the authors only consider θ = +(45^∘ - ϕ_r/2) <cit.>. This restriction is required otherwise m,n is not uniquely defined. §.§.§ Our proposal: deviatoric stress decomposition (DSD) The total strain tensor can be decomposed into volumetric and deviatoric parts, as = ε_v1 + e. We can also express the Cauchy tensor in terms of the mean confining stress p and the deviatoric stress tensor s as = -p1 + s. Therefore, we can re-write Hook's law for the intact part as <cit.> (, d=0) = -p1 + s = κ ε_v 1 + 2μe. Given the equivalent deviatoric (Mises) stress q = (3/2s:s)^1/2 and the equivalent deviatoric strain ε_q = (2/3e:e)^1/2 and with some algebra, we can write that q = 3με_q. Let us now define the Unit Deviator Tensor α_q as α_q = √(2/3)e/ε_q, where α_q = √(α_q:α_q) = 1, Hook's law can therefore be expressed as σ = -p1 + √(2/3)qα_q, where p = κε_v,   q = 3με_q. Equivalent to the CSD, we can describe the compressive failure in a material as damage in the deviatoric stress component. Therefore, the compressive pressure becomes the inactive part of the stress tensor, i.e., ^I = -p1 = κε_v1, and active stress is described as ^A = q(, d) α_q, where q(, d) = g(d) q̂ + (1-g(d)) q̃_r, where the bulk deviatoric stress is q̂ = 3με_q. This deviatoric stress decomposition allows us to leverage the general form of virtually any failure surface that are described in the classical plasticity theory, including the Mohr-Coulomb failure function. Given the friction angle ϕ and cohesion coefficient c, the general form of the Mohr-Coulomb's failure criterion is expressed as F = R_MCq - ptanϕ - c = 0. Here, R_MC defines the shape of the Mohr-Coulomb's failure surface and is expressed as R_MC = 1/√(3)cosϕsin(Θ + π/3) + 1/3cos(Θ + π/3)tanϕ, where Θ is the Lodè angle, evaluated as cos(3Θ) = (r/q)^3. The invariant r is the third invariant of the deviatoric stress tensor, and is defined as r = (9/2tr(s^3))^1/3. Based on this criterion, we can find the peak and residual Mises stresses as q̃_p = ptanϕ + c/R_MC, q̃_r = ptanϕ_r + c_r/R_MC, with ϕ_r and c_r as the residual values for friction angle and cohesion at the fully damaged state. We can easily replace the non-smooth Mohr-Coulomb surface R_MC with some alternatives <cit.>. In fact, we can potentially pick any alternative failure function available for different materials. §.§ Crack driving force Given τ = με_γ and τ_p = p tanϕ + c = με_γ^p, the crack driving force relations for CSD is derived as <cit.> H = H_t + H_slip where H_t = τ̃_p - τ̃_r/2μ, H_slip = 1/2μ[ (τ̂ - τ̃_r)^2 - (τ̃_p - τ̃_r)^2 ] and they showed that this model is consistent with model. Now, for the deviatoric stress decomposition discussed above, we can revise the crack driving force, given q̂ = 3με_q and q̃_p = (p tanϕ + c)/R_MC = 3με_q^p, as H_t = (q̃_p - q̃_r)^2/6μ, H_slip = 1/6μ[ (q̂ - q̃_r)^2 - (q̃_p - q̃_r)^2 ] . More details on the derivation of H_t and H_slip for CSD approach are provided in <Ref>. §.§ Boundary conditions To have a complete mathematical description of the problem, we lastly need to describe the boundary conditions. Considering <Ref>, the boundary conditions are described as u = u̅, on Γ_u, τ = ·n = τ̅, on Γ_t, ∇ d·n = 0, on Γ, where u̅ and τ̅ are prescribed displacement and traction forces, respectively. The steps used to solve the problem are detailed in Algorithm 1. § APPLICATIONS TO COMPRESSIVE STRAIN LOCALIZATION Here, we consider three reference problems of shear fractures, including direct shear test, biaxial compression test, and slope failure analysis. We show that our model can effectively capture multiple modes of failure concurrently. §.§ Direct shear test Our first example is the direct shear test. We simulate the propagation of a fracture in a long shear apparatus and we compare our results with analytical solutions and Fei and Choo's numerical simulations <cit.>. The setup of the experiment is plotted in <Ref>. The domain is 500 mm long, 100 mm tall, and an initial 10-mm horizontal fracture is carved in the middle of the left boundary. The boundary conditions are: the bottom boundary is fixed, the top boundary is displaced horizontally, and the two lateral boundaries are fixed vertically. We neglect gravity. The material properties are: shear modulus G=10 MPa, Poisson's ratio ν=0.3, cohesion strength c=40 kPa, peak and residual friction angle ϕ=ϕ_r=15^∘, shear fracture energy 𝒢_c=30 J/m^2, and fracture's length-scale l=2 mm. As in the previous works of and , we impose the fracture propagation to be horizontal. Following Fei and Choo's simulations <cit.>, we initialize vertical compressive normal stress to 149 kPa, which results in τ_p=80 kPa and τ_r=40 kPa. We mesh the domain near the fracture path with a mapped squared mesh of size l/4=0.5 mm and the remaining domain with a 1-mm free triangular mesh. The horizontal force-displacement curve is shown in <Ref>. The agreement of the peak and residual forces provided by our numerical simulation is very satisfactory. Theoretically, the peak load, i.e., the peak shear stress times the width of the specimen, is 40 kN, and the output of our simulation is 40.387 kN. In the same way, the theoretical residual load is 20 kN and the output of our simulation is 19.978 kN. We estimate the fracture energy from the force-displacement curve, the shaded area in <Ref>. The output of our model provides a fracture energy equal to 14.6914 J, while the theoretical value is 15 J. Therefore, we report a remarkable agreement between our simulations and expected theoretical values. We analyze the sensitivity of our model to the phase-field length parameter, l. We run several simulations of the direct shear test problem for several values of l, ranging from 1 mm to 10 mm. Results are depicted in <Ref>(a). The force-displacement curves for the four values of l confirm that the model is virtually insensitive to the phase-field length parameter. We check the mesh dependency of our model by running three problems of the long-shear apparatus problem. We fix the ratio length scale parameter to mesh size, l/h, to 20 and we run three simulations for three l- and h-values. Results are plot in <Ref>(b). The curves confirm that the model is insensible to the mesh size. We plot the phase-field distribution at three time steps in <Ref>. The peak load is given for U_x=0.8083 mm, after this value is reached the phase-field has already emerged and propagate along the whole fracture, <Ref> (a). Afterward, the phase-field value intensifies during the softening stage, <Ref> (b), up to the time the fracture is completely developed, <Ref> (c). At this time, the domain is split into two parts. The upper part slips over the bottom one, and the shear stress between both parts is constant and equal to the residual shear stress, τ_r=40 kPa, resulting in a theoretical horizontal force of 20 kN. §.§ Biaxial compression test Our next example is a biaxial compression test. We simulate a laboratory-size specimen under plane strain, different confining pressures and with different residual friction angles. This example allows us to show the ability of the model to simulate the pressure dependence of the peak and residual strengths. We compare our numerical results with peak and residual strengths computed with a mechanical equilibrium model before and after the rupture. The model setup is shown in <Ref>(a). The domain is 80-mm wide and 170-mm tall rectangular. The bottom boundary is supported by rollers, whereas a prescribed vertical displacement is imposed in the top boundary and zero horizontal displacement in the top middle point. The two lateral boundaries are subjected to the confining pressure, p_c, which is constant during the experiment. The material properties are: shear modulus G=10 MPa, Poisson's ratio ν=0.3, cohesion strength c=40 kPa, peak friction angle ϕ=15^∘, shear fracture energy 𝒢_c=30 J/m^2, and fracture's length-scale l=2 mm. We neglect gravity. We simulate three cases of p_c, 50 kPa, 100 kPa, and 200 kPa, and repeat each case with three values of the residual friction angles, ϕ_r=20^∘, 15^∘, and 0^∘. These simulations let us check whether our model captures the pressure dependence of the peak and residual strengths. We discretize the domain with a free triangular mesh with size h=0.2 mm that satisfy l/h=10. We include two typical vertical force-displacement curves in <Ref>(b). The confining pressure is p_c=200 kPa, the peak friction angle is ϕ=20^∘, and we consider two residual friction angles, ϕ_r=20^∘ and 0^∘. Initially, both vertical forces change linearly with the imposed vertical displacement until the peak strength is reached. The peak strength is the same in both models since they have the same p_c, c, and ϕ. Afterward the fracture propagates suddenly across the domain, reaching both lateral boundaries, and the vertical force suddenly sinks. Our numerical model is able to capture the fracture propagation during the transition from the peak to the residual strengths due to the adaptive time step. Moreover, the curves evidence that the phase-field model is able to simulate the residual strength, which depends on the confining pressure, the residual friction angle, and the fracture path. We run several simulations of the biaxial compression problem for several values of l, ranging from 1 mm to 10 mm. The force-displacement curves for the four values of l are included in Figure <ref>. As in the previous problem, the curves for the values of l confirm that the model is virtually insensitive to the phase-field length parameter. The evolution of the phase-field variable for p_c=200 kPa, ϕ=20^∘, and ϕ_r=20^∘, at three time steps is shown in <Ref>. The phase-field is almost zero when the peak strength is reached, <Ref>(a). In fact, due to the isotropic material model and homogeneous stress conditions of the biaxial test, two equally like fracture paths nucleate. This is consistent with the Mohr-Coulomb model. Nevertheless, only of the trajectories evolves and result in the final fracture pattern during the sudden decrease in the peak strength, <Ref>(b). Later, the phase-field variable increases its value along the fracture path up to the residual peak strength is reached, <Ref>(c). We simulate nine cases with several combinations of p_c, ϕ, and ϕ_r values. We also compute the peak and residual strengths applying mechanical equilibrium prior and after the fracture propagation. Given the fracture path, the mechanical equilibrium is illustrated in <Ref>. The total vertical force applied on the top boundary is F_V, the total horizontal force on the left lateral boundary is F_H, and the tangential and normal forces on the fracture path are T and N respectively. We suppose the nucleation and fracture propagation is instantaneous and the fracture path is a straight line. the angle between the fracture path and the vertical axis is θ. Then, at the onset of the fracture propagation, the tangential force on the fracture is: T=L/sinθc+Ntanϕ, and once the fracture is fully developed, the tangential force on the fracture is: T=Ntanϕ_r. The mechanical equilibrium in the vertical direction is given by: V-T cosθ -N sinθ=0, and in the horizontal direction: H+T sinθ -N cosθ=0, where H is: H=p_c L/tanθ. Solving V from Eq. (<ref>), substituting V in Eq. (<ref>) and operating, the vertical force at the onset of the fracture propagation V_p –peak strength– is: V_p=1/cosθ -sinθtanϕ( L · c/sinθ +p_c L/tanθ( cosθ tan ϕ + sinθ) ), and the vertical force once the fracture is fully propagated V_r –residual strength– is: V_r=1/cosθ -sinθtanϕ_r( p_c L/tanθ( cosθ tan ϕ_r + sinθ) ). We compute V_p and V_r for the nine simulated cases. The results are listed in Table <ref>. The agreement between both models is remarkable. §.§ Slope failure analysis As the last example, we consider the problem of slope failure analysis reported in <cit.>. Consider the soil slope shown in <Ref>. The domain is 20 m wide and 10 m tall, with a slope 1:1 on the left side. A 4 m wide rigid footing is placed on the crest of the slope. The slope is first subjected to a body force b=20 kN/m^3, and then these body-force stresses are used as the initial state for the footing loading step. Displacement at the bottom edge is fixed in both directions, while for the right edge, only horizontal displacement is fixed. As the main loading step, a displacement U_y=0.3 m is prescribed in the middle of a rigid foundation, which simulates the effect of a building imposing a stress on the slope. The elastic parameters of the soil include E=10 MPa and ν = 0.4. The initial friction angle and cohesion are ϕ = 16.7^∘ and c=40 kPa, with ϕ_r=10^∘ and c_r = 0 kPa as their respective residual values. The phase-field length scale parameter is set to l = 200 mm, and the domain is discretized using a free triangular mesh with mesh-size 20 mm. The resulting mesh roughly has 1M triangles and 500K vertices. The computational time takes about 12 hours in our desktop machine with i9-10900 processor with 10 cores and 20 threads. Due to the relatively high cohesion and low friction angle, the shear-band formation for this problem is particularly interesting. If we plot the evolution of the Mohr-Coulomb’s failure envelope right before the onset of fractures, as shown in <Ref>-(a), we observe that the failure should onset from both ends of the footing. This fact has also been reported by <cit.>, however, due to the pre-specification of only one orientation angle (θ), the crack formation from the left side was not captured by <cit.>. Therefore, to perform a comparison, we consider two cases: I. Shear band formation only from the right corner of the footing by suppressing the phase field variable to zero (d=0) in the gray region (see <Ref>). II. Free shear-band formation, which results in two patterns from each side followed by coalesces. Additionally, we consider two critical fracture energies of G_c = 10 kJ/m^2 and G_c = 5 kJ/m^2. The final fracture patterns of these two cases are shown in <Ref>. The evolution of phase-field variable for case I, with G_c = 5 kJ/m^2, are plotted for different loading steps in <Ref>. The force-displacement response is plotted in <Ref>-(b). As the reader can find, the proposed formulation captures the peak and residual loads as well as the crack patterns accurately, and the results are consistent with those reported by . The failure surface evaluated using phase-field method and the peak-load is well-aligned with potential failure surfaces and critical load F=0.8MN/m resulting from limit-equilibrium analysis of the slope using the GeoStudio software (see <Ref>-b-d). Lastly, we run a new set of simulations for case II. The results are plotted in <Ref>. As we find, here the model captures first a shear band formation from the left corner of the footing. This is in fact expected because of the stress-free surface of the slope creates a more critical failure condition on the left corner. The propagation of the mode, however, stops because it is directing to Mohr-Coulomb stable regions of the domain. Later, the main failure mode initiates and propagates from the right corner, and collides with the first mode somewhere underneath the footing, which is also consistent with the results of the limit state theories. A final branch is then generated and causes the ultimate failure of the slope. The pick stress, however, does not seem to be very different from those of Case I, as plotted in <Ref>-(b). § CONCLUDING REMARKS We presented a phase-field model of shear fractures using deviatoric stress decomposition (DSD). We validated the model by solving reference problems of shear fractures in geotechnical engineering. Our model has excellent performance. The main advantages of our phase-field approach are: (1) the model does not require re-meshing, (2) nucleation, propagation, and fracture path are automatically computed without the need to track fractures or pre-specify orientations, and (3) fracture joining and branching do not need additional algorithms. For an isotropic Mohr-Coulomb material under homogeneous loading, it has been shown that there are two conjugate surfaces having the same likelihood for shear band formation. In fact, our model captures this for the biaxial compression problem without any intervention. This is the same for the slope stability problem, where our model was able to capture crack initiation from both corners of the foundation. While accurate in peak and residual force calculations, we found that the CSD model of shear fractures is more accurate in capturing such a transition. The study was limited to modeling two-dimensional problems of compressive fracture. However, the proposed formulation is not limited to any dimensions. Therefore, we plan to explore three-dimensional models as a follow-up study. Additionally, pore-fluid consideration is critically important for modeling failure in geomaterials. This is also an area that will be considered next. Additional paths include incorporating rate-and-state friction models that are best suited for modeling geologic systems, and thermal coupling that is important for modeling geothermal systems. § CRACK DRIVING FORCE FOR DEVIATORIC STRESS DECOMPOSITION Reminding that q̂, q̃_p, q̃_r denote the bulk and fractured deviatoric stresses at peak and residual stages, respectively, and q̂ = 3με_q, with ε_q and the deviatoric strain, the crack driving force during a plastic dissipation process as a result of frictional sliding can be expressed as H_slip = ∫_ε_γ^p^ε_γ (q̂ - q̃_r) dε_γ = ∫_ε_γ^p^ε_γ (3με_q - q̃_r) dε_γ = 1/6μ(q̂^2 - q̃_p^2) - q̃_r/3μ(q̂- q̃_p ) = 1/6μ{(q̂ - q̃_r)^2 - (q̃_p - q̃_r)^2 }. Since q = g(d)q̂ + (1-g(d))q̃_r, we will have, H_slip = 1/6μ{(q - q̃_r/g(d))^2 - (q̃_p - q̃_r)^2 }. We observe that the relations are quite similar to those reported by using shear stress split, except that shear stresses and strains are replaced now with deviatoric ones and therefore division by 3μ instead of μ. Noting that total driving energy is expressed as H = H_t + H_slip, re-arranging <ref>, we can write H = {H_t - 1/6μ(q̃_p - q̃_r)^2} + 1/6μ(q - q̃_r/g(d))^2. Now, one can substitute this relation into the phase field PDE <ref>, and with 1D simplifications, integrate the phase field relation, as detailed in <cit.>, to arrive at approximate relations for the evolution of deviatoric stress q as a function damage. Again, since the phase field PDE <ref> and driving force <ref> are very similar to those in <cit.>, all the derivations hold identical and true for the deviatoric stress decomposition. Finally, by imposing length-scale independency to the deviatoric stress evolution, one obtains that H_t = 1/6μ(q̃_p - q̃_r)^2. This completes the derivation of crack driving force relations introduced in <ref>. § DATA AVAILABILITY STATEMENT All data, models, or code generated or used during the study will be made available online at https://github.com/ehsanhaghighat/PhaseField-DSDhttps://github.com/ehsanhaghighat/PhaseField-DSD upon publication. § ACKNOWLEDGEMENTS This research Project has been funded by the Comunidad de Madrid through the call Research Grants for Young Investigators from Universidad Politécnica de Madrid under grant APOYO-JOVENES-21-6YB2DD-127-N6ZTY3, RSIEIH project, research program V PRICIT. Authors acknowledge the help of Mrs. Aida Rezapour (M.Sc., P.Eng.) in preparing slope stability results using the limit equilibrium method. natexlab#1#1 [#1],#1 [Rinaldi et al.(2015)Rinaldi, Rutqvist, Sonnenthal, and Cladouhos]rinaldi2015coupled authorA. P. Rinaldi, authorJ. Rutqvist, authorE. L. Sonnenthal, authorT. T. Cladouhos, titleCoupled THM modeling of hydroshearing stimulation in tight fractured volcanic rock, journalTransport in Porous Media volume108 (year2015) pages131–150. [Rinaldi and Rutqvist(2019)]rinaldi2019joint authorA. P. Rinaldi, authorJ. Rutqvist, titleJoint opening or hydroshearing? Analyzing a fracture zone stimulation at Fenton Hill, journalGeothermics volume77 (year2019) pages83–98. [Andrés et al.(2019)Andrés, Santillán, Mosquera, and Cueto-Felgueroso]andres2019thermo authorS. Andrés, authorD. Santillán, authorJ. C. Mosquera, authorL. Cueto-Felgueroso, titleThermo-poroelastic analysis of induced seismicity at the Basel enhanced geothermal system, journalSustainability volume11 (year2019) pages6904. [Andrés et al.(2022)Andrés, Santillán, Mosquera, and Cueto-Felgueroso]andres2022hydraulic authorS. Andrés, authorD. Santillán, authorJ. C. Mosquera, authorL. Cueto-Felgueroso, titleHydraulic stimulation of geothermal reservoirs: Numerical simulation of induced seismicity and thermal decline, journalWater volume14 (year2022) pages3697. [Vilarrasa and Carrera(2015)]vilarrasa2015geologic authorV. Vilarrasa, authorJ. Carrera, titleGeologic carbon storage is unlikely to trigger large earthquakes and reactivate faults through which CO2 could leak, journalProceedings of the National Academy of Sciences volume112 (year2015) pages5938–5943. [Juanes et al.(2012)Juanes, Hager, and Herzog]juanes2012no authorR. Juanes, authorB. H. Hager, authorH. J. Herzog, titleNo geologic evidence that seismicity causes fault leakage that would render large-scale carbon capture and storage unsuccessful, journalProceedings of the National Academy of Sciences volume109 (year2012) pagesE3623–E3623. [White and Foxall(2016)]white2016assessing authorJ. A. White, authorW. Foxall, titleAssessing induced seismicity risk at co2 storage projects: Recent progress and remaining challenges, journalInternational Journal of Greenhouse Gas Control volume49 (year2016) pages413–424. [Gupta(2002)]gupta2002review authorH. K. Gupta, titleA review of recent studies of triggered earthquakes by artificial water reservoirs with special emphasis on earthquakes in Koyna, India, journalEarth-Science Reviews volume58 (year2002) pages279–310. [McGarr et al.(2002)McGarr, Simpson, Seeber, and Lee]mcgarr2002case authorA. McGarr, authorD. Simpson, authorL. Seeber, authorW. Lee, titleCase histories of induced and triggered seismicity, in: booktitleInternational Handbook of Earthquake and Engineering Seismology, volume volume81A, publisherAcademic Press LTD, year2002, pp. pages647–664. [Rinaldi et al.(2020)Rinaldi, Improta, Hainzl, Catalli, Urpi, and Wiemer]rinaldi2020combined authorA. P. Rinaldi, authorL. Improta, authorS. Hainzl, authorF. Catalli, authorL. Urpi, authorS. Wiemer, titleCombined approach of poroelastic and earthquake nucleation applied to the reservoir-induced seismic activity in the Val d'Agri area, Italy, journalJournal of Rock Mechanics and Geotechnical Engineering volume12 (year2020) pages802–810. [Pampillón et al.(2020)Pampillón, Santillán, Mosquera, and Cueto-Felgueroso]pampillon2020geomechanical authorP. Pampillón, authorD. Santillán, authorJ. C. Mosquera, authorL. Cueto-Felgueroso, titleGeomechanical constraints on hydro-seismicity: Tidal forcing and reservoir operation, journalWater volume12 (year2020) pages2724. [Pampillón et al.(2023)Pampillón, Santillán, Mosquera, and Cueto-Felgueroso]pampillon2023 authorP. Pampillón, authorD. Santillán, authorJ. C. Mosquera, authorL. Cueto-Felgueroso, titleThe role of pore fluids in supershear earthquake ruptures, journalScientific Reports volume13 (year2023) pages398. [Vilarrasa et al.(2021)Vilarrasa, De Simone, Carrera, and Villaseñor]vilarrasa2021unraveling authorV. Vilarrasa, authorS. De Simone, authorJ. Carrera, authorA. Villaseñor, titleUnraveling the causes of the seismicity induced by underground gas storage at Castor, Spain, journalGeophysical Research Letters volume48 (year2021) pagese2020GL092038. [Cueto-Felgueroso et al.(2017)Cueto-Felgueroso, Santillán, and Mosquera]cueto2017stick authorL. Cueto-Felgueroso, authorD. Santillán, authorJ. C. Mosquera, titleStick-slip dynamics of flow-induced seismicity on rate and state faults, journalGeophysical Research Letters volume44 (year2017) pages4098–4106. [Cueto-Felgueroso et al.(2018)Cueto-Felgueroso, Vila, Santillán, and Mosquera]cueto2018numerical authorL. Cueto-Felgueroso, authorC. Vila, authorD. Santillán, authorJ. C. Mosquera, titleNumerical modeling of injection-induced earthquakes using laboratory-derived friction laws, journalWater Resources Research volume54 (year2018) pages9833–9859. [Andrés et al.(2019)Andrés, Santillán, Mosquera, and Cueto-Felgueroso]andres2019delayed authorS. Andrés, authorD. Santillán, authorJ. C. Mosquera, authorL. Cueto-Felgueroso, titleDelayed weakening and reactivation of rate-and-state faults driven by pressure changes due to fluid injection, journalJournal of Geophysical Research: Solid Earth volume124 (year2019) pages11917–11937. [Veveakis et al.(2007)Veveakis, Vardoulakis, and Di Toro]veveakis2007thermoporomechanics authorE. Veveakis, authorI. Vardoulakis, authorG. Di Toro, titleThermoporomechanics of creeping landslides: The 1963 Vaiont slide, northern Italy, journalJournal of Geophysical Research: Earth Surface volume112 (year2007). [Borja et al.(2016)Borja, Choo, and White]borja2016rock authorR. I. Borja, authorJ. Choo, authorJ. A. White, titleRock moisture dynamics, preferential flow, and the stability of hillside slopes, in: booktitleMulti-Hazard Approaches to Civil Infrastructure Engineering, publisherSpringer, year2016, pp. pages443–464. [González et al.(2012)González, Tiampo, Palano, Cannavó, and Fernández]gonzalez20122011 authorP. J. González, authorK. F. Tiampo, authorM. Palano, authorF. Cannavó, authorJ. Fernández, titleThe 2011 Lorca earthquake slip distribution controlled by groundwater crustal unloading, journalNature Geoscience volume5 (year2012) pages821–825. [Tiwari et al.(2021)Tiwari, Jha, Kundu, Gahalaut, and Vissa]tiwari2021groundwater authorD. K. Tiwari, authorB. Jha, authorB. Kundu, authorV. K. Gahalaut, authorN. K. Vissa, titleGroundwater extraction-induced seismicity around Delhi region, India, journalScientific Reports volume11 (year2021) pages1–14. [Griffith(1921)]griffith1921vi authorA. A. Griffith, titleVi. the phenomena of rupture and flow in solids, journalPhilosophical Transactions of the Royal Society of London. Series A volume221 (year1921) pages163–198. [Irwin(1956)]irwin1956onset authorG. R. Irwin, titleOnset of fast crack propagation in high strength steel and aluminum alloys, typeTechnical Report, Naval Research Lab Washington DC, year1956. [Kachanov(1958)]kachanov1958rupture authorL. Kachanov, titleRupture time under creep conditions, journalIzv. Akad. Nauk SSSR volume8 (year1958) pages26–31. [Chan et al.(1970)Chan, Tuba, and Wilson]chan1970finite authorS. Chan, authorI. Tuba, authorW. Wilson, titleOn the finite element method in linear fracture mechanics, journalEngineering Fracture Mechanics volume2 (year1970) pages1–17. [Rybicki and Kanninen(1977)]rybicki1977finite authorE. F. Rybicki, authorM. F. Kanninen, titleA finite element calculation of stress intensity factors by a modified crack closure integral, journalEngineering Fracture Mechanics volume9 (year1977) pages931–938. [Bažant and Cedolin(1979)]bavzant1979blunt authorZ. P. Bažant, authorL. Cedolin, titleBlunt crack band propagation in finite element analysis, journalJournal of the Engineering Mechanics Division volume105 (year1979) pages297–315. [Pietruszczak and Mroz(1981)]pietruszczak1981finite authorS. Pietruszczak, authorZ. Mroz, titleFinite element analysis of deformation of strain-softening materials, journalInternational Journal for Numerical Methods in Engineering volume17 (year1981) pages327–334. [Simo and Ju(1987)]simo1987strain authorJ. C. Simo, authorJ. Ju, titleStrain-and stress-based continuum damage models—I. Formulation, journalInternational Journal of Solids and Structures volume23 (year1987) pages821–840. [Belytschko et al.(1988)Belytschko, Fish, and Engelmann]belytschko1988finite authorT. Belytschko, authorJ. Fish, authorB. E. Engelmann, titleA finite element with embedded localization zones, journalComputer Methods in Applied Mechanics and Engineering volume70 (year1988) pages59–89. [Simo et al.(1993)Simo, Oliver, and Armero]simo1993analysis authorJ. C. Simo, authorJ. Oliver, authorF. Armero, titleAn analysis of strong discontinuities induced by strain-softening in rate-independent inelastic solids, journalComputational Mechanics volume12 (year1993) pages277–296. [Simo and Oliver(1994)]simo1994new authorJ. Simo, authorJ. Oliver, titleA new approach to the analysis and simulation of strain softening in solids, journalFracture and Damage in Quasibrittle Structures (year1994) pages25–39. [Oliver(2000)]oliver2000discrete authorJ. Oliver, titleOn the discrete constitutive models induced by strong discontinuity kinematics and continuum constitutive equations, journalInternational Journal of Solids and Structures volume37 (year2000) pages7207–7229. [Regueiro and Borja(2001)]regueiro2001plane authorR. A. Regueiro, authorR. I. Borja, titlePlane strain finite element analysis of pressure sensitive plasticity with strong discontinuity, journalInternational Journal of Solids and Structures volume38 (year2001) pages3647–3672. [Wells and Sluys(2001)]wells2001three authorG. Wells, authorL. Sluys, titleThree-dimensional embedded discontinuity model for brittle fracture, journalInternational Journal of Solids and Structures volume38 (year2001) pages897–913. [Foster et al.(2007)Foster, Borja, and Regueiro]foster2007embedded authorC. Foster, authorR. Borja, authorR. Regueiro, titleEmbedded strong discontinuity finite elements for fractured geomaterials with variable friction, journalInternational Journal for Numerical Methods in Engineering volume72 (year2007) pages549–581. [Liu and Borja(2008)]liu2008contact authorF. Liu, authorR. I. Borja, titleA contact algorithm for frictional crack propagation with the extended finite element method, journalInternational Journal for Numerical Methods in Engineering volume76 (year2008) pages1489–1512. [Dias-da Costa et al.(2009)Dias-da Costa, Alfaiate, Sluys, and Júlio]dias2009discrete authorD. Dias-da Costa, authorJ. Alfaiate, authorL. Sluys, authorE. Júlio, titleA discrete strong discontinuity approach, journalEngineering Fracture Mechanics volume76 (year2009) pages1176–1201. [Haghighat and Pietruszczak(2015)]haghighat2015modeling authorE. Haghighat, authorS. Pietruszczak, titleOn modeling of discrete propagation of localized damage in cohesive-frictional materials, journalInternational Journal for Numerical and Analytical Methods in Geomechanics volume39 (year2015) pages1774–1790. [Moës et al.(1999)Moës, Dolbow, and Belytschko]moes1999finite authorN. Moës, authorJ. Dolbow, authorT. Belytschko, titleA finite element method for crack growth without remeshing, journalInternational Journal for Numerical Methods in Engineering volume46 (year1999) pages131–150. [Dolbow et al.(2001)Dolbow, Moës, and Belytschko]dolbow2001extended authorJ. Dolbow, authorN. Moës, authorT. Belytschko, titleAn extended finite element method for modeling crack growth with frictional contact, journalComputer Methods in Applied Mechanics and Engineering volume190 (year2001) pages6825–6846. [Moës and Belytschko(2002)]moes2002extended authorN. Moës, authorT. Belytschko, titleExtended finite element method for cohesive crack growth, journalEngineering Fracture Mechanics volume69 (year2002) pages813–833. [Areias and Belytschko(2005)]areias2005analysis authorP. M. Areias, authorT. Belytschko, titleAnalysis of three-dimensional crack initiation and propagation using the extended finite element method, journalInternational Journal for Numerical Methods in Engineering volume63 (year2005) pages760–788. [Song et al.(2006)Song, Areias, and Belytschko]song2006method authorJ.-H. Song, authorP. M. Areias, authorT. Belytschko, titleA method for dynamic crack and shear band propagation with phantom nodes, journalInternational Journal for Numerical Methods in Engineering volume67 (year2006) pages868–893. [Borja(2008)]borja2008assumed authorR. I. Borja, titleAssumed enhanced strain and the extended finite element methods: A unification of concepts, journalComputer Methods in Applied Mechanics and Engineering volume197 (year2008) pages2789–2803. [Sanborn and Prévost(2011)]sanborn2011frictional authorS. E. Sanborn, authorJ. H. Prévost, titleFrictional slip plane growth by localization detection and the extended finite element method (XFEM), journalInternational Journal for Numerical and Analytical Methods in Geomechanics volume35 (year2011) pages1278–1298. [Mikaeili and Schrefler(2018)]mikaeili2018xfem authorE. Mikaeili, authorB. Schrefler, titleXFEM, strong discontinuities and second-order work in shear band modeling of saturated porous media, journalActa Geotechnica volume13 (year2018) pages1249–1264. [Hirmand et al.(2015)Hirmand, Vahab, and Khoei]hirmand2015augmented authorM. Hirmand, authorM. Vahab, authorA. Khoei, titleAn augmented Lagrangian contact formulation for frictional discontinuities with the extended finite element method, journalFinite Elements in Analysis and Design volume107 (year2015) pages28–43. [Kachanov(1986)]kachanov1986introduction authorL. Kachanov, titleIntroduction to continuum damage mechanics, volume volume10, publisherSpringer Science & Business Media, year1986. [Bažant and Lin(1988)]bavzant1988nonlocal authorZ. P. Bažant, authorF.-B. Lin, titleNonlocal smeared cracking model for concrete fracture, journalJournal of Structural Engineering volume114 (year1988) pages2493–2510. [Leroy and Ortiz(1989)]leroy1989finite authorY. Leroy, authorM. Ortiz, titleFinite element analysis of strain localization in frictional materials, journalInternational Journal for Numerical and Analytical Methods in Geomechanics volume13 (year1989) pages53–74. [Ožbolt and BAŽANT(1996)]ovzbolt1996numerical authorJ. Ožbolt, authorZ. P. BAŽANT, titleNumerical smeared fracture analysis: Nonlocal microcrack interaction approach, journalInternational Journal for Numerical Methods in Engineering volume39 (year1996) pages635–661. [Bažant and Jirásek(2002)]bavzant2002nonlocal authorZ. P. Bažant, authorM. Jirásek, titleNonlocal integral formulations of plasticity and damage: survey of progress, journalJournal of Engineering Mechanics volume128 (year2002) pages1119–1149. [Silling(2000)]silling2000reformulation authorS. A. Silling, titleReformulation of elasticity theory for discontinuities and long-range forces, journalJournal of the Mechanics and Physics of Solids volume48 (year2000) pages175–209. [Kilic and Madenci(2009)]kilic2009structural authorB. Kilic, authorE. Madenci, titleStructural stability and failure analysis using peridynamic theory, journalInternational Journal of Non-Linear Mechanics volume44 (year2009) pages845–854. [Silling and Lehoucq(2010)]silling2010peridynamic authorS. A. Silling, authorR. B. Lehoucq, titlePeridynamic theory of solid mechanics, journalAdvances in Applied Mechanics volume44 (year2010) pages73–168. [Agwai et al.(2011)Agwai, Guven, and Madenci]agwai2011predicting authorA. Agwai, authorI. Guven, authorE. Madenci, titlePredicting crack propagation with peridynamics: a comparative study, journalInternational Journal of Fracture volume171 (year2011) pages65–78. [Madenci and Oterkus(2014)]madenci2014peridynamic authorE. Madenci, authorE. Oterkus, titlePeridynamic theory, in: booktitlePeridynamic theory and its applications, publisherSpringer, year2014, pp. pages19–43. [Ren et al.(2016)Ren, Zhuang, and Rabczuk]ren2016new authorH. Ren, authorX. Zhuang, authorT. Rabczuk, titleA new peridynamic formulation with shear deformation for elastic solid, journalJournal of Micromechanics and Molecular Physics volume1 (year2016) pages1650009. [Madenci et al.(2016)Madenci, Barut, and Futch]madenci2016peridynamic authorE. Madenci, authorA. Barut, authorM. Futch, titlePeridynamic differential operator and its applications, journalComputer Methods in Applied Mechanics and Engineering volume304 (year2016) pages408–451. [Kamensky et al.(2019)Kamensky, Behzadinasab, Foster, and Bazilevs]kamensky2019peridynamic authorD. Kamensky, authorM. Behzadinasab, authorJ. T. Foster, authorY. Bazilevs, titlePeridynamic modeling of frictional contact, journalJournal of Peridynamics and Nonlocal Modeling volume1 (year2019) pages107–121. [Song and Khalili(2019)]song2019peridynamics authorX. Song, authorN. Khalili, titleA peridynamics model for strain localization analysis of geomaterials, journalInternational Journal for Numerical and Analytical Methods in Geomechanics volume43 (year2019) pages77–96. [Zhang et al.(2022)Zhang, Zhang, and Liu]zhang2022peridynamic authorH. Zhang, authorX. Zhang, authorY. Liu, titleA peridynamic model for contact problems involving fracture, journalEngineering Fracture Mechanics volume267 (year2022) pages108436. [Francfort and Marigo(1998)]francfort1998revisiting authorG. A. Francfort, authorJ.-J. Marigo, titleRevisiting brittle fracture as an energy minimization problem, journalJournal of the Mechanics and Physics of Solids volume46 (year1998) pages1319–1342. [Bourdin et al.(2000)Bourdin, Francfort, and Marigo]bourdin2000numerical authorB. Bourdin, authorG. A. Francfort, authorJ.-J. Marigo, titleNumerical experiments in revisited brittle fracture, journalJournal of the Mechanics and Physics of Solids volume48 (year2000) pages797–826. [Bourdin et al.(2008)Bourdin, Francfort, and Marigo]bourdin2008variational authorB. Bourdin, authorG. A. Francfort, authorJ.-J. Marigo, titleThe variational approach to fracture, journalJournal of Elasticity volume91 (year2008) pages5–148. [Miehe et al.(2010a)Miehe, Welschinger, and Hofacker]miehe2010thermodynamically authorC. Miehe, authorF. Welschinger, authorM. Hofacker, titleThermodynamically consistent phase-field models of fracture: Variational principles and multi-field fe implementations, journalInternational Journal for Numerical Methods in Engineering volume83 (year2010a) pages1273–1311. [Miehe et al.(2010b)Miehe, Hofacker, and Welschinger]miehe2010phase authorC. Miehe, authorM. Hofacker, authorF. Welschinger, titleA phase field model for rate-independent crack propagation: Robust algorithmic implementation based on operator splits, journalComputer Methods in Applied Mechanics and Engineering volume199 (year2010b) pages2765–2778. [Kuhn and Müller(2010)]kuhn2010continuum authorC. Kuhn, authorR. Müller, titleA continuum phase field model for fracture, journalEngineering Fracture Mechanics volume77 (year2010) pages3625–3634. [Borden et al.(2012)Borden, Verhoosel, Scott, Hughes, and Landis]borden2012phase authorM. J. Borden, authorC. V. Verhoosel, authorM. A. Scott, authorT. J. Hughes, authorC. M. Landis, titleA phase-field description of dynamic brittle fracture, journalComputer Methods in Applied Mechanics and Engineering volume217 (year2012) pages77–95. [Verhoosel and de Borst(2013)]verhoosel2013phase authorC. V. Verhoosel, authorR. de Borst, titleA phase-field model for cohesive fracture, journalInternational Journal for Numerical Methods in Engineering volume96 (year2013) pages43–62. [Borden et al.(2014)Borden, Hughes, Landis, and Verhoosel]borden2014higher authorM. J. Borden, authorT. J. Hughes, authorC. M. Landis, authorC. V. Verhoosel, titleA higher-order phase-field model for brittle fracture: Formulation and analysis within the isogeometric analysis framework, journalComputer Methods in Applied Mechanics and Engineering volume273 (year2014) pages100–118. [Ambati et al.(2015)Ambati, Gerasimov, and De Lorenzis]ambati2015phase authorM. Ambati, authorT. Gerasimov, authorL. De Lorenzis, titlePhase-field modeling of ductile fracture, journalComputational Mechanics volume55 (year2015) pages1017–1040. [Santillán et al.(2017a)Santillán, Mosquera, and Cueto-Felgueroso]santillan2017phase authorD. Santillán, authorJ. C. Mosquera, authorL. Cueto-Felgueroso, titlePhase-field model for brittle fracture. Validation with experimental results and extension to dam engineering problems, journalEngineering Fracture Mechanics volume178 (year2017a) pages109–125. [Santillán et al.(2017b)Santillán, Juanes, and Cueto-Felgueroso]santillan2017b authorD. Santillán, authorR. Juanes, authorL. Cueto-Felgueroso, titlePhase field model of fluid-driven fracture in elastic media: Immersed-fracture formulation and validation with analytical solutions, journalJournal of Geophysical Research: Solid Earth volume122 (year2017b) pages2565–2589. [Santillán et al.(2018)Santillán, Juanes, and Cueto-Felgueroso]santillan2018phase authorD. Santillán, authorR. Juanes, authorL. Cueto-Felgueroso, titlePhase field model of hydraulic fracturing in poroelastic media: Fracture propagation, arrest, and branching under fluid injection and extraction, journalJournal of Geophysical Research: Solid Earth volume123 (year2018) pages2127–2155. [Santillán et al.(2017)Santillán, Mosquera, and Cueto-Felgueroso]santillan2017fluid authorD. Santillán, authorJ.-C. Mosquera, authorL. Cueto-Felgueroso, titleFluid-driven fracture propagation in heterogeneous media: Probability distributions of fracture trajectories, journalPhysical Review E volume96 (year2017) pages053002. [Aldakheel et al.(2021)Aldakheel, Noii, Wick, and Wriggers]Aldakheel2021 authorF. Aldakheel, authorN. Noii, authorT. Wick, authorP. Wriggers, titleA global–local approach for hydraulic phase-field fracture in poroelastic media, journalComputers & Mathematics with Applications volume91 (year2021) pages99–121. [Seles et al.(2021)Seles, Aldakheel, Tonkovic, Soric, and Wriggers]Seles2021 authorA.K. Seles, authorF. Aldakheel, authorZ.  Tonkovic, authorJ. Soric, authorP. Wriggers titleA general phase-field model for fatigue failure in brittle and ductile solids, journalComputational Mechanics volume67 (year2021) pages1431–1452. [Wu et al.(2020)Wu, Nguyen, Nguyen, Sutula, Sinaie, and Bordas]wu2020phase authorJ.-Y. Wu, authorV. P. Nguyen, authorC. T. Nguyen, authorD. Sutula, authorS. Sinaie, authorS. P. Bordas, titlePhase-field modeling of fracture, journalAdvances in Applied Mechanics volume53 (year2020) pages1–183. [Lancioni and Royer-Carfagni(2009)]lancioni2009variational authorG. Lancioni, authorG. Royer-Carfagni, titleThe variational approach to fracture mechanics. A practical application to the French Panthéon in Paris, journalJournal of Elasticity volume95 (year2009) pages1–30. [Bryant and Sun(2018)]bryant2018mixed authorE. C. Bryant, authorW. Sun, titleA mixed-mode phase field fracture model in anisotropic rocks with consistent kinematics, journalComputer Methods in Applied Mechanics and Engineering volume342 (year2018) pages561–584. [Zhou et al.(2019)Zhou, Zhuang, and Rabczuk]zhou2019phase authorS. Zhou, authorX. Zhuang, authorT. Rabczuk, titlePhase field modeling of brittle compressive-shear fractures in rock-like materials: A new driving force and a hybrid formulation, journalComputer Methods in Applied Mechanics and Engineering volume355 (year2019) pages729–752. [Fei and Choo(2020)]fei2020phase authorF. Fei, authorJ. Choo, titleA phase-field model of frictional shear fracture in geologic materials, journalComputer Methods in Applied Mechanics and Engineering volume369 (year2020) pages113265. [Palmer and Rice(1973)]palmer1973growth authorA. C. Palmer, authorJ. R. Rice, titleThe growth of slip surfaces in the progressive failure of over-consolidated clay, journalProc. R. Soc. Lond. A volume332 (year1973) pages527–548. [Hu et al.(2020)Hu, Guilleminot, and Dolbow]hu2020phase authorT. Hu, authorJ. Guilleminot, authorJ. E. Dolbow, titleA phase-field model of fracture with frictionless contact and random fracture properties: Application to thin-film fracture and soil desiccation, journalComputer Methods in Applied Mechanics and Engineering volume368 (year2020) pages113106. [Fei and Choo(2021)]fei2021double authorF. Fei, authorJ. Choo, titleDouble-phase-field formulation for mixed-mode fracture in rocks, journalComputer Methods in Applied Mechanics and Engineering volume376 (year2021) pages113655. [Kuhn et al.(2015)Kuhn, Schlüter, and Müller]kuhn2015degradation authorC. Kuhn, authorA. Schlüter, authorR. Müller, titleOn degradation functions in phase field fracture models, journalComputational Materials Science volume108 (year2015) pages374–384. [Geelen et al.(2019)Geelen, Liu, Hu, Tupek, and Dolbow]geelen2019phase authorR. J. Geelen, authorY. Liu, authorT. Hu, authorM. R. Tupek, authorJ. E. Dolbow, titleA phase-field formulation for dynamic cohesive fracture, journalComputer Methods in Applied Mechanics and Engineering volume348 (year2019) pages680–711. [Hughes(2012)]hughes_fem_book_2012 authorT. J. Hughes, titleThe finite element method: linear static and dynamic finite element analysis, publisherCourier Corporation, year2012. [Belytschko et al.(2014)Belytschko, Liu, Moran, and Elkhodary]belytschko_fem_book_2014 authorT. Belytschko, authorW. K. Liu, authorB. Moran, authorK. Elkhodary, titleNonlinear finite elements for continua and structures, publisherJohn Wiley & sons, year2014. [Lorentz et al.(2011)Lorentz, Cuvilliez, and Kazymyrenko]lorentz2011convergence authorE. Lorentz, authorS. Cuvilliez, authorK. Kazymyrenko, titleConvergence of a gradient damage model toward a cohesive zone model, journalComptes Rendus Mécanique volume339 (year2011) pages20–26. [Lorentz(2017)]lorentz2017nonlocal authorE. Lorentz, titleA nonlocal damage model for plain concrete consistent with cohesive fracture, journalInternational Journal of Fracture volume207 (year2017) pages123–159. [Amor et al.(2009)Amor, Marigo, and Maurini]amor2009regularized authorH. Amor, authorJ.-J. Marigo, authorC. Maurini, titleRegularized formulation of the variational brittle fracture with unilateral contact: Numerical experiments, journalJournal of the Mechanics and Physics of Solids volume57 (year2009) pages1209–1229. [Wu et al.(2020)Wu, Nguyen, Zhou, and Huang]wu2020variationally authorJ.-Y. Wu, authorV. P. Nguyen, authorH. Zhou, authorY. Huang, titleA variationally consistent phase-field anisotropic damage model for fracture, journalComputer Methods in Applied Mechanics and Engineering volume358 (year2020) pages112629. [Steinke and Kaliske(2019)]steinke2019phase authorC. Steinke, authorM. Kaliske, titleA phase-field crack model based on directional stress decomposition, journalComputational Mechanics volume63 (year2019) pages1019–1046. [Strobl and Seelig(2016)]strobl2016constitutive authorM. Strobl, authorT. Seelig, titleOn constitutive assumptions in phase field approaches to brittle fracture, journalProcedia Structural Integrity volume2 (year2016) pages3705–3712. [Strobl and Seelig(2015)]strobl2015novel authorM. Strobl, authorT. Seelig, titleA novel treatment of crack boundary conditions in phase field models of fracture, journalPamm volume15 (year2015) pages155–156. [Liu et al.(2021)Liu, Cheng, Ziaei-Rad, and Shen]liu2021micromechanics authorY. Liu, authorC. Cheng, authorV. Ziaei-Rad, authorY. Shen, titleA micromechanics-informed phase field model for brittle fracture accounting for unilateral constraint, journalEngineering Fracture Mechanics volume241 (year2021) pages107358. [Zhang et al.(2022)Zhang, Jiang, and Tonks]zhang2022assessment authorS. Zhang, authorW. Jiang, authorM. R. Tonks, titleAssessment of four strain energy decomposition methods for phase field fracture models using quasi-static and dynamic benchmark cases, journalMaterials Theory volume6 (year2022) pages1–24. [Pietruszczak(2010)]pietruszczak_plasticity_book_2010 authorS. Pietruszczak, titleFundamentals of plasticity in geomechanics, publisherCrc Press Boca Raton, FL, year2010. [Borja(2013)]borja_plasticity_book_2013 authorR. I. Borja, titlePlasticity, volume volume2, publisherSpringer, year2013.
http://arxiv.org/abs/2303.06973v1
20230313101755
Catalog of noninteracting tight-binding models in one dimension with two energy bands
[ "Edward McCann" ]
cond-mat.mes-hall
[ "cond-mat.mes-hall", "cond-mat.dis-nn" ]
ed.mccann@lancaster.ac.uk Physics Department, Lancaster University, Lancaster, LA1 4YB, United Kingdom We classify Hermitian tight-binding models describing noninteracting electrons on a one-dimensional periodic lattice with two energy bands. To do this, we write a generalized Rice-Mele model with two orbitals per unit cell, including all possible complex-valued long-range hoppings consistent with Hermicity. We then apply different forms of time-reversal, charge-conjugation and chiral symmetry in order to constrain the parameters, resulting in an array of possible models in different symmetry classes. For each symmetry class, we define a single, canonical form of the Hamiltonian and identify models that are related to the canonical form by an off-diagonal unitary transformation in the atomic basis. The models have either symmorphic or nonsymmorphic nonspatial symmetries (time T, chiral and charge-conjugation). The nonsymmorphic category separates into two types of state of matter: an insulator with a ℤ_2 topological index in the absence of nonsymmorphic time-reversal symmetry or, in the presence of nonsymmorphic time-reversal symmetry, a metallic state. The latter is an instance of Kramer's degeneracy with one degeneracy point in the Brillouin zone as opposed to no degeneracy points in symmorphic systems with T^2 = 1 and two in symmorphic systems with T^2 = - 1. Catalog of noninteracting tight-binding models in one dimension with two energy bands Edward McCann March 30, 2023 ===================================================================================== § INTRODUCTION The study of the topological properties of materials according to the ten-fold way classification of nonspatial symmetries (time-reversal, charge-conjugation and chiral) <cit.> has expanded to include materials with nonsymmorphic crystal symmetries <cit.> which combine a nonprimitive lattice translation with either a mirror reflection or a rotation <cit.>. Recently, nonprimitive lattice translations have been incorporated into nonsymmorphic nonspatial symmetries <cit.>. A particular example is that of three-dimensional antiferromagnetic topological insulators with nonsymmorphic magnetic symmetry <cit.> (i.e., nonsymmorphic time-reversal symmetry). In one dimension, the Su-Schrieffer-Heeger (SSH) model <cit.> is probably the simplest example of a topological insulator <cit.> and, as such, it has been studied extensively <cit.> and realized experimentally in different platforms <cit.>. The SSH model has alternating hopping strengths and may be considered as a particular phase of the Rice-Mele model <cit.> which has alternating onsite energies as well as alternating hopping strengths. Surprisingly, it was recently shown that a phase of the Rice-Mele model which has alternating onsite energies but constant hopping strengths, the charge-density-wave (CDW) model <cit.>, is an example of a system exhibiting nonsymmorphic chiral symmetry. It is natural to wonder how many different symmetry classes may be realized in minimal models (one-dimensional models with only two energy bands), to determine the form of such models in the atomic basis, and, particularly, to ask whether it is possible to find further examples with nonsymmorphic nonspatial symmetries including nonsymmorphic time-reversal symmetry. In this paper, we answer these questions by writing down a generalized Rice-Mele model with two electronic orbitals per unit cell, including all possible complex-valued long-range hoppings consistent with Hermicity. We then apply different forms of nonspatial symmetries in order to constrain the parameters, resulting in an array of possible models in different symmetry classes. Within random matrix theory <cit.>, it is common to write generic matrices representing symmetry classes <cit.> and this is also possible with continuous Dirac Hamiltonians <cit.>. Here, we focus on tight-binding models in both position and reciprocal space. Our results are summarized in Table <ref>. The first column indicates the Cartan label of the symmetry class taken from the ten-fold way classification <cit.>. Columns labeled T^2, C^2, S^2 show the form of time-reversal, charge-conjugation and chiral symmetry, respectively, where a zero indicates an absence of symmetry and `NS' indicates a nonsymmorphic symmetry. For systems with nonsymmorphic symmetries, we adopt the classification of Ref. <cit.> whereby the symmetry class is assigned by neglecting the nonsymmorphic symmetries (as if `NS' were replaced by a zero), and, subsequently, the nonsymmorphic symmetries are used to subdivide the symmetry classes. This is why there are three (sub)classes with nonsymmorphic symmetry labeled as class A. The column labeled `No.' in Table <ref> indicates the number of distinct models in the symmetry class. We consider distinct models to be related by off-diagonal unitary transformations (from the atomic basis), whereas models related by diagonal gauge transformations are not considered to be distinct. For example, the three distinct models in the BDI class are well known: the SSH model <cit.>, the Creutz model <cit.> and the Shockley sp orbital model <cit.>. The number of models in each class may be deduced simply by considering possible combinations of Pauli spin matrices, as described later. Although there are distinct models within a typical symmetry class, they may be related by unitary transformations and, thus, it is possible to write them all in a single `canonical' form <cit.> as indicated in the column `Canonical'. For classes with chiral symmetry, the canonical form is written in the basis in which the chiral symmetry operator is diagonal <cit.>, which we refer to as the `chiral' basis. The final column in Table <ref> shows the state of matter of members of the symmetry class, and Fig. <ref> shows representative band structures for classes with time-reversal, charge-conjugation and chiral symmetry. For two energy bands E_± (k), chiral symmetry imposes E_±(k) = - E_∓(k) and time-reversal symmetry imposes E_±(-k) = E_±(k), Fig. <ref>. The states of matter agree with predictions of the tenfold way classification for the symmorphic models <cit.> and with the classification of Ref. <cit.> for nonsymmorphic models. Exceptions are the symmorphic DIII and the nonsymmorphic D class which we find are both gapless due to the presence of time-reversal symmetry with Kramer's degeneracy and only two orbitals, as opposed to a four-orbital Bogoliubov de Gennes representation <cit.>. With two bands, there are also not enough degrees of freedom to realize the CII (chiral symplectic) symmetry class <cit.>. Table <ref> shows that the nonsymmorphic category separates into only two types of state of matter: an insulator with a ℤ_2 topological index <cit.> in the absence of nonsymmorphic time-reversal symmetry or, in the presence of nonsymmorphic time-reversal symmetry, a metallic state <cit.>. The latter is an instance of Kramer's degeneracy with one degeneracy point in the Brillouin zone, Fig. <ref>(d), (f), as opposed to no degeneracy points in symmorphic systems with T^2 = 1 and two in symmorphic systems with T^2 = - 1, Fig. <ref>(e). In Section <ref> we describe the generalized Rice-Mele model <cit.> which is a periodic tight-binding model with two orbitals per unit cell. We consider a time-independent and Hermitian Hamiltonian describing noninteracting fermions and excluding superconducting pairing. In the main text, we describe nearest-neighbor coupling, but we generalize to include hoppings of all ranges in Appendix <ref>. Section <ref> describes the symmetries that are applied to the generalized Rice-Mele model in order to constrain the parameter values and identify models within each symmetry class. The rest of the paper considers each symmetry class in turn, with symmorphic models with chiral symmetry in Section <ref> and without chiral symmetry in Section <ref>. Nonsymmorphic models with chiral symmetry are discussed in Section <ref>, those without chiral symmetry in Section <ref>. The paper ends with a brief conclusion, Section <ref>. Appendix <ref> discusses the role of spatial-inversion symmetry, which is not the focus of the classification in the main text. § METHODOLOGY §.§ Generalized Rice-Mele model In position space for a system of J atoms with open boundary conditions, we consider a generalized Rice-Mele model <cit.> Hamiltonian, Fig. <ref>, as a J × J Hermitian matrix in a basis of atomic orbitals, H =[ ϵ_0 + u v e^i ϕ_v t_AA e^i ϕ_AA t_3 e^i ϕ_3; ve^-i ϕ_v ϵ_0 -u we^i ϕ_w t_BBe^i ϕ_BB; t_AA e^-i ϕ_AA we^-i ϕ_w ϵ_0 + u v e^i ϕ_v; t_3e^-i ϕ_3 t_BBe^-i ϕ_BB ve^-i ϕ_v ϵ_0 -u; ] , where we write the matrix for just J = 4 atoms. As in the usual Rice-Mele model <cit.>, there are alternating onsite energies parameterized by u and alternating nearest-neighbor hoppings v and w. In addition, we include a uniform contribution ϵ_0 to the onsite energy, next-nearest couplings t_AA and t_BB, and third-nearest coupling t_3. All parameters, other than the onsite energies ϵ_0 ± u, are complex, with phases explicitly written in Eq. (<ref>). There are two different orbitals per unit cell, labeled A and B. With lattice constant a, we consider an A orbital to be separated by distance s from the next B orbital to the right, which is then separated by distance a-s from the next A to the right, Fig. <ref>. The Bloch Hamiltonian in k space written in the type II or `canonical' representation <cit.> with A and B Bloch orbitals is H (k,s) = · d (k,s) , d_0 (k,s) = ϵ_0 + t_AAcos (ka + ϕ_AA) + t_BBcos (ka + ϕ_BB) , d_x (k,s) = v cos (ks + ϕ_v) + w cos [k(a-s) + ϕ_w] + t_3 cos [k(a+s) + ϕ_3] , d_y (k,s) = - v sin (ks + ϕ_v) + w sin [k(a-s) + ϕ_w] - t_3 sin [k(a+s) + ϕ_3] , d_z (k,s) = u + t_AAcos (ka + ϕ_AA) - t_BBcos (ka + ϕ_BB) , with = (I,σ_x,σ_y,σ_z) and d = (d_0,d_x,d_y,d_z), where σ_i are Pauli matrices and I is the 2 × 2 identity matrix. We can write H (k,s) = U (k,s) H (k,0) U^† (k,s) , where U (k,s) = [ e^iks/2 0; 0 e^-iks/2 ] , and H (k,0) coincides with the Hamiltonian written in the type I or `periodic' representation <cit.> Our aim is to describe all models with nearest-neighbor coupling. We include next-nearest couplings t_AA and t_BB, and third-nearest coupling t_3 because they become nearest-neighbor in the limit of intracell spacing s=0. We consider only 0 ≤ s ≤ a/2 without loss of generality, so do not include third-nearest coupling between an A orbital and the second B orbital to its left. Note, however, that it is straightforward to include all orders of coupling as described in Appendix <ref>. The Hamiltonian (<ref>) in position space does not explicitly depend on the distances a and s although, in a real physical system, one would expect the values of the tight-binding parameters to depend on the distances a and s. However, we are not interested in the numerical values of the parameters, but general constraints on the existence of their real and imaginary parts. Thus, we treat the generalized Rice-Mele model as a toy model with no contraints initially on the values of the tight-binding parameters other than that the Hamiltonian is Hermitian and, in particular, the tight-binding parameters are considered to be independent of a and s. In general, the generalized Rice-Mele model, Eqs. (<ref>,<ref>), does not satisfy spatial inversion, chiral, time-reversal, or charge-conjugation symmetry; we apply chiral, time-reversal, or charge-conjugation symmetry in order to place some further constraints on the tight-binding parameters. We nominally describe spinless electrons, although the cases with time-reversal symmetry T^2 = -1 may be interpreted as describing spinful electrons, Sections <ref> and <ref>. §.§ Symmetries We consider the non-spatial symmetries of chiral symmetry (S), time-reversal symmetry (T), and charge-conjugation symmetry (C). In k space, they are expressed as chiral: U_S^† (k,s) H (k,s) U_S (k,s) = - H (k,s) , time: U_T^† (k,s) H^∗ (k,s) U_T (k,s) = H (-k,s) , charge: U_C^† (k,s) H^∗ (k,s) U_C (k,s) = - H (-k,s) , space: U_P^† (k,s) H (k,s) U_P (k,s) = H (-k,s) , where U_S, U_T, U_C, and U_P are unitary matrices with U_S (k,s) U_S (k,s) = I , U_T (k,s) U_T^∗ (-k,s) = ± I , U_C (k,s) U_C^∗ (-k,s) = ± I . These three conditions are written in shorthand as S^2 = 1, T^2 = ± 1, and C^2 = ± 1. The operators are related as U_S (k,s) =U_C^∗ (k,s) U_T (-k,s) <cit.>. In addition to the three non-spatial symmetries, we also include spatial-inversion symmetry (P) for completeness. Although it is not our focus, many of the models we discuss will satisfy spatial-inversion symmetry <cit.>, and we describe it in more detail in Appendix <ref>. Using the unitary transformation (<ref>,<ref>) relating H(k,s) to H(k,0), we can write U_S (k,s) = U(k,s) U_S (k,0) U^† (k,s) , U_T (k,s) = U^† (k,s) U_T (k,0) U (k,s) , U_C (k,s) = U^† (k,s) U_C (k,0) U (k,s) , U_P (k,s) = U (k,s) U_P (k,0) U (k,s) . Note that the different forms of these transformations are due to the presence or absence of complex conjugation and inversion of k in the definitions of the symmetries, Eqs. (<ref>)-(<ref>). Given an energy eigenvalue equation H(k,s) ψ_± (k,s) = E_±(k) ψ_± (k,s) for two energy bands E_±(k) and eigenstates ψ_± (k,s), the effect of the symmetries is chiral: E_±(k) = - E_∓(k) , time: E_±(-k) = E_±(k) , charge: E_±(-k) = - E_∓(k) , space: E_±(-k) = E_±(k) . For symmorphic models, symmetry operators U_S, U_T, U_C, U_P, when present, are independent of k for intracell distance s=0 (or, equivalently, when using the type I or `periodic' representation <cit.>). For nonsymmorphic symmetries, the symmetry operators are independent of k for intracell distance s=a/2 because this implicitly takes into account a spatial translation by half of the unit cell a; when transformed back to s=0 using Eqs. (<ref>)-(<ref>), they acquire a k dependence. For the two band models we consider, the k independent symmetry operators may be represented as either Pauli matrices or the identity matrix, as appropriate <cit.>. Application of chiral symmetry requires d_0 and one of the other components, d_i for i=x, y, or z, to be zero whereas time-reversal and charge-conjugation symmetries require each component of the d vector to be either even or odd functions of the wave vector k. In position space, the symmetry operations are written as chiral: 𝒮^† H 𝒮 = - H , 𝒮𝒮 = I , time: 𝒯^† H^∗𝒯 = H , 𝒯𝒯^∗ = ± I , charge: 𝒞^† H^∗𝒞 = - H , 𝒞𝒞^∗ = ± I , space: 𝒫^† H 𝒫 = H , where 𝒮, 𝒯, 𝒞, and 𝒫 are unitary matrices, and 𝒮 =𝒯^∗𝒞. For systems with symmorphic symmetries, 𝒮, 𝒯, 𝒞 act locally within a unit cell and may be represented by J × J matrices S_x, S_y or S_z, acting in the atomic basis as S_x = [ 0 1 0 0 ⋯ 0 0; 1 0 0 0 ⋯ 0 0; 0 0 0 1 ⋯ 0 0; 0 0 1 0 ⋯ 0 0; ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 0 0 ⋯ 0 1; 0 0 0 0 ⋯ 1 0; ] . S_y = [ 0 -i 0 0 ⋯ 0 0; i 0 0 0 ⋯ 0 0; 0 0 0 -i ⋯ 0 0; 0 0 i 0 ⋯ 0 0; ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 0 0 ⋯ 0 -i; 0 0 0 0 ⋯ i 0; ] , S_z = [ 1 0 0 ⋯ 0 0; 0 -1 0 ⋯ 0 0; 0 0 1 ⋯ 0 0; ⋮ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 0 ⋯ 1 0; 0 0 0 ⋯ 0 -1; ] . Operations 𝒯 and 𝒞 may also be represented by a J × J identity matrix, I. When representing chiral symmetry 𝒮, operator S_z (or σ_z in k space) is usually referred to as sublattice symmetry. Note that we refer to chiral symmetry as any unitary operator 𝒮 satisfying Eq. (<ref>), and, in the atomic basis, this may include S_x or S_y as well as S_z. In these cases (when symmorphic), it is possible to perform a unitary transformation from the atomic basis to the chiral basis in which 𝒮 is represented by S_z. Spatial inversion symmetry (parity) 𝒫 is non-local and may be represented by J × J matrices P_x, P_y, P_z, or P_I, where P_x = [ 0 0 0 ⋯ 0 1; 0 0 0 ⋯ 1 0; ⋮ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 1 ⋯ 0 0; 0 1 0 ⋯ 0 0; 1 0 0 ⋯ 0 0 ] , P_y = [ 0 0 0 ⋯ 0 1; 0 0 0 ⋯ -1 0; ⋮ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 -1 ⋯ 0 0; 0 1 0 ⋯ 0 0; -1 0 0 ⋯ 0 0 ] , P_z = [ 0 0 0 0 ⋯ 1 0; 0 0 0 0 ⋯ 0 -1; ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 1 0 ⋯ 0 0; 0 0 0 -1 ⋯ 0 0; 1 0 0 0 ⋯ 0 0; 0 -1 0 0 ⋯ 0 0 ] , P_I = [ 0 0 0 0 ⋯ 1 0; 0 0 0 0 ⋯ 0 1; ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 1 0 ⋯ 0 0; 0 0 0 1 ⋯ 0 0; 1 0 0 0 ⋯ 0 0; 0 1 0 0 ⋯ 0 0 ] . Nonsymmorphic symmetry involves a translation T_a/2 <cit.> by the atomic spacing a/2, T_a/2 = [ 0 1 0 0 ⋯ 0 0; 0 0 1 0 ⋯ 0 0; 0 0 0 1 ⋯ 0 0; 0 0 0 0 ⋯ 0 0; ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 0 0 ⋯ 0 1; 1 0 0 0 ⋯ 0 0; ] . It could also be expressed as a matrix product T_a/2 S_z of sublattice symmetry S_z (<ref>) with T_a/2, T_a/2 S_z = [ 0 -1 0 0 ⋯ 0 0; 0 0 1 0 ⋯ 0 0; 0 0 0 -1 ⋯ 0 0; 0 0 0 0 ⋯ 0 0; ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 0 0 ⋯ 0 1; 1 0 0 0 ⋯ 0 0; ] , where T_a/2 S_z is written for an odd number of atoms, J. These two possibilities correspond to σ_x or σ_y, respectively, in k space. For symmorphic models in position space, symmetries generally only hold for an even number of atoms, J, unless the matrix representing the symmetry is diagonal. An example is the SSH model <cit.> for which time-reversal (I), charge-conjugation (S_z), and chiral (S_z) symmetry are all diagonal, so they hold for an odd number of atoms; spatial inversion symmetry (P_x) does not hold in the SSH model for an odd number of atoms, however. For nonsymmorphic models in position space, nonspatial symmetries are represented either by nonsymmorphic operations, T_a/2 or T_a/2 S_z, or by diagonal ones, I or S_z (e.g. it is possible to combine symmorphic time with nonsymmorphic charge-conjugation and chiral symmetries). Thus, they nominally apply to systems with either even or odd numbers of atoms, except that, in both instances, the ends of a system with open boundary conditions break the nonsymmorphic symmetry <cit.>. Spatial inversion symmetry for nonsymmorphic models in position space is represented by P_x or P_y, and its presence, for a given symmetry class, depends on whether the number of atoms is even or odd as indicated in Table <ref>. Symmorphic models are labeled H_S,n^(i,j,ℓ) where n indicates the Cartan label of the symmetry class, Table <ref>. Index i = I,x,y,z indicates the form of time-reversal symmetry as either the identity matrix (I) in both k and position space, or a Pauli spin matrix σ_i in k space and matrix S_i in position space; likewise index j = I,x,y,z for charge-conjugation symmetry and ℓ = x,y,z for chiral symmetry (for which the unit matrix is not possible). Nonsymmorphic models are labeled H_NS,n^(i,j,ℓ) where n indicates the Cartan label and index i = I,x,y,z indicates the form of time-reversal symmetry as either the identity matrix (I) in both k and position space, Pauli spin matrix σ_x in k space and matrix T_a/2 in position space, Pauli spin matrix σ_y in k space and matrix T_a/2S_z in position space, or Pauli spin matrix σ_z in k space and matrix S_z in position space; likewise index j = I,x,y,z for charge-conjugation symmetry, and index ℓ = x,y,z for chiral symmetry (for which the unit matrix is not possible). § SYMMORPHIC MODELS WITH CHIRAL SYMMETRY §.§ Symmetry class AIII with T^2 = 0, C^2 = 0, S^2 = 1 All versions of chiral symmetry require d_0 = 0. From Eq. (<ref>), this may be satisfied with ϵ_0 = 0, t_BB = - t_AA and ϕ_BB = ϕ_AA. Hence, with d_0 = 0, we consider H (k,s) = · d (k,s) , d_x (k,s) = v cos (ks + ϕ_v) + w cos [k(a-s) + ϕ_w] + t_3 cos [k(a+s) + ϕ_3] , d_y (k,s) = - v sin (ks + ϕ_v) + w sin [k(a-s) + ϕ_w] - t_3 sin [k(a+s) + ϕ_3] , d_z (k,s) = u + 2t_AAcos (ka + ϕ_AA) , with d = (0,d_x,d_y,d_z). We begin by considering models with symmorphic chiral symmetry only (i.e., generally no time-reversal or charge-conjugation symmetry) which belong to the AIII (chiral unitary) symmetry class. To identify such models, we determine the cases for which H(k,0) satisfies chiral symmetry (<ref>) with U_S (k,0) being independent of k. We find there are three such models, corresponding to U_S (k,0) = σ_z, σ_y, or σ_x, and denoted H_S,AIII^(0,0,z), H_S,AIII^(0,0,y), H_S,AIII^(0,0,x), respectively, Fig. <ref>. The values of the tight-binding parameters for each model are summarized in Table <ref>. Note that we could consider a more general form of chiral symmetry with U_S (k,s=0) consisting of a linear combination of Pauli matrices, but this would lead to a more constrained version of the Hamiltonians that we already consider, so we exclude this possibility The three models, H_S,AIII^(0,0,i), i = x,y,z, are distinct in the atomic basis, but they are all equivalent after a similarity transformation into the chiral basis, i.e., the basis in which the chiral operator is Ũ_S (k,0) = σ_z in k space. For each model we identify the unitary operator R for which the similarity transformation may be expressed as H̃_S,AIII^(0,0,i) (k,0) = R^† H_S,AIII^(0,0,i)(k,0) R ≡·d̃ , so that the Hamiltonian H̃_S,AIII^(0,0,i) (k,0) is written in the canonical form where d̃_x and d̃_y are represented by the Fourier series of arbitrary, real 2π periodic functions (with d̃_z = 0), as shown in Table <ref>. This canonical form has chiral symmetry Ũ_S (k,0) = σ_z in k space (S_z in position space). Table <ref> shows how the tight-binding parameters of the three models correspond to x_n, x̃_n, y_n, ỹ_n of the canonical form, Table <ref>. Energies eigenvalues are E_±(k) = ±√(d̃_x^2 + d̃_y^2), and the system is generally an insulator. Since spatial-inversion symmetry is broken, the spectrum generally isn't an even function of k. As d̃_x and d̃_y are arbitrary, real 2π periodic functions, the path of the d̃ vector in the d̃_x-d̃_y plane defines an integer ℤ winding number, in agreement with expectations from the tenfold way classification <cit.>. We describe the winding number in more detail in Section <ref>. In the following, we briefly describe each model, H_S,AIII^(0,0,i), i = x,y,z, in more detail. Chiral symmetry U_S (k,0) = σ_z demands that d_z (k,0) = 0. For arbitrary k, this requires u=0 and t_AA = 0, yielding H_S,AIII^(0,0,z) (k,s) = · d^(z) (k,s) where d_x^(z) (k,s) = v cos (ks + ϕ_v) + w cos [k(a-s) + ϕ_w] + t_3 cos [k(a+s) + ϕ_3] , d_y^(z) (k,s) = - v sin (ks + ϕ_v) + w sin [k(a-s) + ϕ_w] - t_3 sin [k(a+s) + ϕ_3] , d_z^(z) (k,s) = 0 . This can be viewed as a generalized version of the SSH model <cit.>: arbitrary, complex A-B hoppings are allowed as long as all A-A or B-B hoppings are absent, as shown schematically in Fig. <ref>(a) for intracell spacing s=0. It is an unusual case because U_S (k,s) = σ_z is independent of k for all intracell spacing s, including s ≠ 0. In position space, chiral symmetry is given by S_z, Eq. (<ref>). Note that we include hopping t_3 because, for s=0, it is a nearest-neighbor hopping, Fig. <ref>(a) (and the generalization to longer-range hopping is straightforward, Appendix <ref>). In the absence of t_3 or longer range hoppings, i.e., with only v̅ = ve^iϕ_v and w̅ = we^iϕ_w, then it is possible to gauge away the phases ϕ_v and ϕ_w <cit.>, giving the conventional SSH model in symmetry class BDI, Fig. <ref>(b). Chiral symmetry U_S (k,0) = σ_y demands that d_y = 0. This can be achieved with ϕ_v = 0, t_3 = w and ϕ_3 = ϕ_w, yielding H_S,AIII^(0,0,y) (k,0) = · d^(y) (k,0) where d_x^(y) (k,0) = v + 2 w cos (ka + ϕ_w) , d_y^(y) (k,0) = 0 , d_z^(y) (k,0) = u + 2t_AAcos (ka + ϕ_AA) . This can be viewed as a generalized version of the Creutz ladder <cit.>, Fig. <ref>(c). Note that it is possible to find H_S,AIII^(0,0,y) (k,s) for arbitrary s using the unitary transformation (<ref>). This can be transformed to the canonical form, Table <ref>, with parameters given in Table <ref> using R=R_y R_r, where R_y = 1/√(2)[ 1 1; i -i ] , and R_r = diag (1,i). Here, R_y transforms to the chiral basis and R_r rotates the d_x-d_y plane around the d_z axis. In the atomic basis in position space, a transformation to the chiral basis is H̃_S,AIII^(0,0,y) = ℛ_r^†ℛ_y^† H_S,AIII^(0,0,y)ℛ_y ℛ_r where ℛ_y =1/√(2)[ 1 1 0 0 0 ⋯; i -i 0 0 0 ⋯; 0 0 1 1 0 ⋯; 0 0 i -i 0 ⋯; 0 0 0 0 1 ⋯; ⋮ ⋮ ⋮ ⋮ ⋮ ⋱ ] , and ℛ_r = diag (1,i,1,i,1,i,…). With this transformation, H̃_S,AIII^(0,0,y) is of the same general (canonical) form as H_S,AIII^(0,0,z). Chiral symmetry U_S (k,0) = σ_x demands that d_x = 0 which can be achieved with ϕ_v = π/2, t_3 = - w and ϕ_3 = ϕ_w, yielding H_S,AIII^(0,0,x) (k,0) = · d^(x) (k,0) where d_x^(x) (k,0) = 0 , d_y^(x) (k,0) = - v + 2 w sin (ka + ϕ_w) , d_z^(x) (k,0) = u + 2t_AAcos (ka + ϕ_AA) . This can be viewed as a generalized version of the Shockley sp orbital model <cit.>, Fig. <ref>(e). It can be transformed to the canonical form, Table <ref>, with parameters given in Table <ref> using R=R_x, where R_x = 1/√(2)[ 1 1; 1 -1 ] . In the atomic basis in position space, a transformation to the chiral basis is H̃_S,AIII^(0,0,x) = ℛ_x^† H_S,AIII^(0,0,x)ℛ_x where ℛ_x =1/√(2)[ 1 1 0 0 0 ⋯; 1 -1 0 0 0 ⋯; 0 0 1 1 0 ⋯; 0 0 1 -1 0 ⋯; 0 0 0 0 1 ⋯; ⋮ ⋮ ⋮ ⋮ ⋮ ⋱ ] . With this transformation, H̃_S,AIII^(0,0,x) is of the same general (canonical) form as H_S,AIII^(0,0,z). §.§ Symmetry class BDI with T^2=1, C^2=1, S^2=1 We apply time-reversal symmetry (<ref>) to the three models with chiral symmetry described in Section <ref>. We consider U_T (k,0) to be independent of k, and this means that U_T (k,0) = I, σ_x or σ_z (for which T^2 = +1), or U_T (k,0) = σ_y (for which T^2 = -1). Then, with definite chiral symmetry and time-reversal symmetry, we determine the form of charge-conjugation symmetry U_C using U_S (k,0) =U_C^∗ (k,0) U_T (-k,0), where C^2 = ± 1. We then group models in the same symmetry class together, beginning with the BDI (chiral orthogonal) class, T^2 = 1, C^2 = 1, S^2 = 1. In this class, the canonical form of the Bloch Hamiltonian H̃_S,BDI (k,0) = ·d̃ is given in Table <ref> where d̃_x is represented as an even-in-k 2π periodic function, d̃_y is an odd 2π periodic function, and d̃_z = 0, where parameters x_n and ỹ_n are real. Note that a form with d̃_x odd and d̃_y even is equivalent <cit.>, because it is related by a rotation of the d̃_x-d̃_y axes about d̃_z. Ref. <cit.> expressed the SSH model in an equivalent form with d̃_x + i d̃_y written as a complex Fourier series. The canonical form has time-reversal symmetry U_T (k,0) = I, charge-conjugation symmetry U_C (k,0) = σ_z, and chiral symmetry U_S (k,0) = σ_z. Energy eigenvalues are E_± (k) = ±√(d̃_x^2 + d̃_y^2), and the system is generally an insulator, Fig. <ref>(a). The path of the d̃ vector in the d̃_x-d̃_y plane defines an integer ℤ winding number W, in agreement with expectations from the tenfold way classification <cit.>. As a hypothetical example, Fig. <ref>(a) shows the band structure when the system is dominated by second order terms x_2, ỹ_2 in the canonical form, Table <ref>, and Fig. <ref>(b) shows the corresponding path of the d̃ vector with a winding number of W = 2. In position space, one can set S = S_x, S_y, or S_z with T = I, S_x, or S_z and C = I, S_x, or S_z, and search for combinations of them; there are only six possibilities because T≠ S_y, C≠ S_y, Table <ref>. Of these, three are related by diagonal gauge transformations as seen by multiplying two of S, T, or C by S_z (which is diagonal). The three remaining distinct models have all been discussed widely in previous literature: H_S,BDI^(I,z,z) is the SSH model <cit.>, H_S,BDI^(x,z,y) is the Creutz ladder <cit.>, and H_S,BDI^(I,x,x) is the Shockley sp orbital model <cit.>, as shown schematically in Fig. <ref>. They are distinct in the sense that the unitary transformation from the atomic basis to the canonical form, Table <ref>, is off-diagonal (<ref>,<ref>). The three models related by diagonal gauge transformations correspond to an additional version of each of the distinct three such that their A-B hopping parameters are imaginary rather than real, Table <ref>. Formally, the diagonal transformation in the atomic basis in position space has a period of 2a, ℛ_i =[ 1 0 0 0 0 ⋯; 0 -i 0 0 0 ⋯; 0 0 -1 0 0 ⋯; 0 0 0 i 0 ⋯; 0 0 0 0 1 ⋯; ⋮ ⋮ ⋮ ⋮ ⋮ ⋱ ] , so that H_S,BDI^(z,I,z) = ℛ_i^† H_S,BDI^(I,z,z)ℛ_i, with a flip of sign of t_3, etc. Table <ref> shows how the tight-binding parameters of the models correspond to x_n, ỹ_n of the canonical form, Table <ref>. Since each model consists of nearest-neighbor only, x_n = ỹ_n = 0 for n ≥ 2, the winding number W can only take two values (0 or 1) <cit.>. In terms of the canonical form, Table <ref>, it is given by W = 0 |x_0| > 2 |x_1| , 1 |x_0| < 2 |x_1| , and the system is gapless if |x_0| = 2 |x_1|. Expressions for x_0, x_1 in terms of tight-binding parameters for different models may be read off Table <ref>. For example, for the SSH model, H_S,BDI^(I,z,z), then W = 1 if |v| < |w+t_3|. It is straightforward to generalize the models to longer range hoppings, as described in Appendix <ref>, and terms beyond nearest-neighbor hopping in the SSH model have been described previously <cit.>. Note that the spinless Kitaev chain <cit.> also belongs to the BDI symmetry class, but we do not discuss it here because superconducting pairing is not included in the generalized Rice-Mele model (<ref>,<ref>). In the atomic basis in position space, edge states will be located on different atomic sites in the three models. Given an eigenstate ψ_SSH of the SSH model, H_S,BDI^(I,z,z), a corresponding state in the Creutz ladder, H_S,BDI^(x,z,y), is ℛ_y ℛ_r ψ_SSH and in the Shockley sp orbital model, H_S,BDI^(I,x,x), it is ℛ_x ψ_SSH. The SSH model is usually considered for t_3 =0, which, according to Table <ref>, is equivalent to t_AA = w in the Creutz ladder and t_AA = -w in the Shockley sp orbital model. Then, in the fully dimerized limit of v=0, one can see from Fig. <ref>(b) that there will be an edge state fully localized on the left most A atom in the SSH model <cit.>. Owing to the off-diagonal transformations to the bases of the other models, such a state will be shared equally between the left-most A and left-most B atom in the same limit of the Creutz ladder (v=0) and the Shockley sp orbital model (u=0), Fig. <ref>(d) and (f). As an illustration, Fig. <ref>(c) shows the energy levels in position space of the SSH model, H_S,BDI^(I,z,z), as a function of parameter t_3^' with t_3 = t_5 = 0. With these choices, parameters of the canonical form are x_0 = 2v, x_1 = ỹ_1 = w and x_2 = ỹ_2 = t_3^'. With w=1 and v=0.2, then there is a phase transition from winding number W=2 for t_3^' >1 to W=1 for t_3^' < 1. As shown in Fig. <ref>(c) and (d), these phases support four zero-energy edge states for t_3^' >1 and two zero-energy edge states for t_3^' < 1. §.§ Symmetry class DIII with T^2=-1, C^2=1, S^2=1 Models with chiral symmetry S^2=1, time T^2=-1, and charge conjugation C^2=1 are in the DIII symmetry class which is usually associated with a Bogoliubov de Gennes Hamiltonian. This symmetry class must have time T = S_y. There are three possibilities for chiral symmetry, S= S_x, S_y, or S_z, giving three models, Table <ref>. However, multiplying S and C by S_z shows that one of them is trivially related to another by a diagonal gauge transformation. Thus, there are two distinct models (H_S,DIII^(y,x,z) and H_S,DIII^(y,z,x)) as shown schematically in Fig. <ref>. They are distinct in the sense that the unitary transformation relating them is off-diagonal. Model H_S,DIII^(y,z,x) has an additional version H_S,DIII^(y,I,y) that is the one related by a trivial, diagonal transformation such that its A-B hopping parameters are imaginary rather than real, Table <ref>. In this class, the canonical form of the Bloch Hamiltonian H̃_sym (k,0) = ·d̃ is where both d̃_x and d̃_y are represented by odd-in-k 2π periodic functions, Table <ref>, parameters x̃_n and ỹ_n are real, and d̃_z (k,0) = 0. Table <ref> shows how the tight-binding parameters of the three models correspond to x̃_n, ỹ_n of the canonical form, Table <ref>. Since each model consists of nearest-neighbor only, x̃_n = ỹ_n = 0 for n ≥ 2, although it is straightforward to generalize to longer range hoppings, as described in Appendix <ref>. Energy eigenvalues are E_± (k) = ±√(d̃_x^2 + d̃_y^2). Owing to Kramer's degeneracy (with T^2=-1), states at k=0 and k= ±π/a are degenerate because these k values are time-reversal invariant. As there are only two bands and the bands are degenerate, the system is gapless, Fig. <ref>(e). As a representative of this symmetry class, let us briefly discuss H_S,DIII^(y,x,z), Fig. <ref>(a). With only nearest-neighbor coupling, ± we^± iϕ_w, the model is simply two disconnected linear chains; higher-order hopping is required to couple the chains, Table <ref>. As time T^2 = -1, the A atoms can be considered as spin-up electrons and the B atoms as spin-down electrons, with the coupling (± we^± iϕ_w) describing spin-orbit coupling <cit.> between them, H_S,DIII^(y,x,z) (k,0) = [ 0 -2iwe^iϕ_wsin (ka); 2iwe^-iϕ_wsin (ka) 0 ] . Owing to the presence of chiral symmetry, there is no coupling between spins of the same orientation (A-A or B-B) here, however it has been taken into account previously <cit.> as d_0 (k,0) = 2t cos (ka) for nearest-neighbor A-A and B-B hopping with parameter t = t_AA = t_BB. §.§ Symmetry class CI with T^2=1, C^2=-1, S^2=1 Models with chiral symmetry S^2=1, time T^2=1, and charge conjugation C^2=-1 are in the CI symmetry class which is usually associated with a Bogoliubov de Gennes Hamiltonian. In this class, the canonical form of the Bloch Hamiltonian H̃_sym (k,0) = ·d̃ is where both d̃_x and d̃_y are represented by even-in-k 2π periodic functions, Table <ref>, parameters x_n and y_n are real, and d̃_z (k,0) = 0. Energy eigenvalues are E_± (k) = ±√(d̃_x^2 + d̃_y^2), and the system is generally an insulator, Fig. <ref>(c). In agreement with expectations from the tenfold way classification <cit.>, it is topologically trivial. As a hypothetical example, Fig. <ref>(a) shows the band structure for typical parameter values using the canonical form, Table <ref>, and Fig. <ref>(b) shows the corresponding path of the d̃ vector in the d̃_x-d̃_y plane. It traces an open path for -π < ka ≤ 0 and then reverses along the same path for 0 < ka ≤π to end at the original starting point. Note the dips in the band structure at ka ≈±π/2 arising from higher-order terms in the canonical form, Table <ref>, which would result in van Hove singularities in the density of states. This symmetry class must have charge conjugation C = S_y. There are three possibilities for chiral symmetry, S= S_x, S_y, or S_z, giving three models, Table <ref>. However, multiplying S and T by S_z shows that one of them is trivially related by a diagonal gauge transformation. Thus, there are two distinct models (H_S,CI^(x,y,z) and H_S,CI^(I,y,y)) as shown schematically in Fig. <ref>. They are distinct in the sense that the unitary transformation relating them is off-diagonal. Model H_S,CI^(I,y,y) has an additional version H_S,CI^(z,y,x) that is the one related by a trivial, diagonal transformation such that its A-B hopping parameters are imaginary rather than real, Table <ref>. Table <ref> shows how the tight-binding parameters of the three models correspond to x_n, y_n of the canonical form, Table <ref>. Since each model consists of nearest-neighbor only, x_n = y_n = 0 for n ≥ 2, although it is straightforward to generalize to longer range hoppings, as described in Appendix <ref>. Although we only consider systems with two energy bands, these models fall into a Bogoliubov de Gennes symmetry class (CI) which nominally has four components. In Ref. <cit.>, the generic 4 × 4 Hamiltonian representing class CI is actually block diagonal with a single 2 × 2 block representing spin-up electrons and spin-down holes (say). Comparison with the form of H_S,CI^(I,y,y) shows that we may interpret the chain of A atoms (with onsite energies -u and A-A hopping t_AA) as mimicking the spin-up electrons and the chain of B atoms (with onsite energies u and B-B hopping -t_AA) as mimicking the spin-down holes. § SYMMORPHIC MODELS WITHOUT CHIRAL SYMMETRY §.§ Symmetry class A with T^2 = 0, C^2 = 0, S^2 = 0 We now consider symmorphic models without chiral symmetry. Symmetry class A is described by the generalized Rice-Mele model Eqs. (<ref>,<ref>), and the corresponding expression with tight-binding parameters of all ranges is given in Eqs.(<ref>)-(<ref>). For intracell spacing s=0, Eq. (<ref>) shows that, without any symmetry constraints, each component of the d vector at s=0 may be written as an arbitrary real Fourier series of a 2π-periodic function. Energies eigenvalues are E_±(k) = d̃_0 ±√(d̃_x^2 + d̃_y^2 + d̃_z^2), and the system is generally an insulator. Since time-reversal and spatial-inversion symmetries are absent, the spectrum generally isn't an even function of k. We write the canonical form for this class as H_sym,A (k,s) = ·d̃ (k,s) where d̃_0 (k,0) = a_0/2 + ∑_n=1^∞[ a_n cos (kna) + ã_nsin (kna) ] , d̃_x (k,0) = x_0/2 + ∑_n=1^∞[ x_ncos (kna) + x̃_nsin (kna) ] , d̃_y (k,0) = y_0/2 + ∑_n=1^∞[ y_ncos (kna) + ỹ_nsin (kna) ] , d̃_z (k,0) = z_0/2 + ∑_n=1^∞[ z_ncos (kna) + z̃_nsin (kna) ] , where all the parameters are real. This canonical form expresses the fact that, without any symmetry constraints, each component of the d vector may be written as an arbitrary real Fourier series of a 2π-periodic function of ka. With nearest-neighbor parameters only, the parameters from the canonical form (<ref>)-(<ref>) may be read from Eqs. (<ref>,<ref>), e.g. a_0 = 2 ϵ_0, z_0 = 2u, wherein parameters of second order or above are zero due to the nearest-neighbor approximation. §.§ Symmetry class AI with T^2 = 1, C^2 = 0, S^2 = 0 Models with time-reversal symmetry T^2 = 1, but no charge-conjugation or chiral symmetry are in the AI (orthogonal) class. There are three possibilities, T= I, S_x, or S_z, giving three models, Table <ref>. However, multiplying T by S_z shows that one of them is trivially related to another by a diagonal gauge transformation. Thus, there are two distinct models (H_S,AI^(I,0,0) and H_S,AI^(x,0,0)) as shown schematically in Fig. <ref>. They are distinct in the sense that the unitary transformation relating them is off-diagonal. Model H_S,AI^(I,0,0) has an additional version H_S,AI^(z,0,0) such that its A-B hopping parameters are imaginary rather than real, Table <ref>. The canonical form for this class, Table <ref>, may be written as for class A with d̃_0 (k,0), d̃_x (k,0), and d̃_z (k,0) as even functions of k, and d̃_y (k,0) odd, i.e., set ã_n = x̃_n = y_n = z̃_n = 0 in Eqs. (<ref>)-(<ref>). Then, time reversal symmetry is given by T= I. Relations of the tight-binding parameters for each model to the canonical form are given in Table <ref>, where H_S,AI^(x,0,0) is rotated by R_y^-1 and H_S,AI^(z,0,0) is rotated by R_y. Energies eigenvalues are E_±(k) = d̃_0 ±√(d̃_x^2 + d̃_y^2 + d̃_z^2), and the system is generally an insulator. With time-reversal symmetry, the spectrum is an even function of k. §.§ Symmetry class AII with T^2 = -1, C^2 = 0, S^2 = 0 Models with time-reversal symmetry T^2 = -1, but no charge-conjugation or chiral symmetry are in the AII (symplectic) class. There are is only one possibility, T= S_y, giving H_S,AII^(y,0,0), Table <ref> and Fig. <ref>(e). The canonical form for this class, Table <ref>, may be written as for class A with d̃_0 (k,0) as an even function of k, and d̃_x (k,0), d̃_y (k,0), d̃_z (k,0) as odd functions, i.e., set ã_n = x_n = y_n = z_n = 0 in Eqs. (<ref>)-(<ref>). Relations of the tight-binding parameters for H_S,AII^(y,0,0) to the canonical form are given in Table <ref>. Energies eigenvalues are E_±(k) = d̃_0 ±√(d̃_x^2 + d̃_y^2 + d̃_z^2). Owing to Kramer's degeneracy (with T^2=-1), states at k=0 and k= ±π/a are degenerate because these k values are time-reversal invariant. As there are only two bands and the bands are degenerate, the system is gapless. §.§ Symmetry class D with T^2 = 0, C^2 = 1, S^2 = 0 Models with charge-conjugation symmetry C^2 = 1, but no time-reversal or chiral symmetry are in the D class. There are three possibilities, C= I, S_x, or S_z, giving three models, Table <ref>. However, multiplying C by S_z shows that one of them is trivially related to another by a diagonal gauge transformation. Thus, there are two distinct models (H_S,D^(0,x,0) and H_S,D^(0,z,0)) as shown schematically in Fig. <ref>. They are distinct in the sense that the unitary transformation relating them is off-diagonal. Model H_S,D^(0,z,0) has an additional version H_S,D^(0,I,0) such that its A-B hopping parameters are imaginary rather than real, Table <ref>. The canonical form for this class, Table <ref>, may be written as for class A with d̃_z (k,0) as an even function of k, and d̃_0 (k,0), d̃_x (k,0), and d̃_y (k,0) as odd functions, i.e., set a_n = x_n = y_n = z̃_n = 0 in Eqs. (<ref>)-(<ref>). Then, charge-conjugation symmetry is given by C= S_x. Relations of the tight-binding parameters for each model to the canonical form are given in Table <ref>, where H_S,D^(0,z,0) is rotated by R_x and H_S,D^(0,I,0) is rotated by R_y. Energy eigenvalues are E_±(k) = d̃_0 ±√(d̃_x^2 + d̃_y^2 + d̃_z^2) and the system is generally an insulator. With charge-conjugation symmetry, E_±(-k) = - E_∓(k). Despite the absence of chiral symmetry, the constraint of charge-conjugation symmetry protects a ℤ_2 topological index <cit.> in class D in accord with predictions of the tenfold way classification <cit.>. It may be interpreted in terms of the three-dimensional path of (d̃_x, d̃_y, d̃_z ) for -π < ka ≤π <cit.>. With the canonical form, Table <ref>, components d̃_x and d̃_y are odd functions of a 2π-periodic function. Thus, the closed path begins and ends on either the north or south pole of the Bloch sphere, d̃_z (-π) = d̃_z (π) = z_0/2 + ∑_n=1^∞ (-1)^n z_n, and it is also at either the north or south pole at k=0, d̃_z (0) = z_0/2 + ∑_n=1^∞ z_n. The ℤ_2 topological index, ν_2, may be defined <cit.> as ν_2 = 0 sgn [ d̃_z (π) ] = sgn [ d̃_z (0) ] , 1 sgn [ d̃_z (π) ] = - sgn [ d̃_z (0) ] . This can be written in terms of the canonical form including all orders of hopping using the expression for d̃_z, ν_2 = 0 |z_0/2 + ∑_m=1^∞ z_2m| > |∑_m=0^∞ z_2m+1| , 1 |z_0/2 + ∑_m=1^∞ z_2m| < |∑_m=0^∞ z_2m+1| , For nearest-neighbor terms only (first order), the expression for ν_2 simplifies as ν_2 = 0 |z_0| > 2 |z_1| , 1 |z_0| < 2 |z_1| , and the system is gapless if |z_0| = 2 |z_1|. Expressions for z_0 and z_1 in terms of tight-binding parameters for different models may be read off Table <ref>. For example, for H_S,D^(0,x,0), then ν_2 = 1 if |u| < |2t_AAcosϕ_AA|. As an illustration, Fig. <ref>(a) shows the energy levels in position space of model H_S,D^(0,x,0), as a function of phase ϕ_AA with u = √(2), t_AA = 1, w=1, and ϕ_w = π/4. With these choices, the index ν_2 = 1 if |cosϕ_AA | > 1 / √(2), i.e., for 0 < ϕ_AA < π/4, 3π/4 < ϕ_AA < 5π/4 and 7π/4 < ϕ_AA < 2π. As shown in Fig. <ref>, this phase supports two zero energy edge states as opposed to none for ν_2 = 0. The edge states have weight on both the A and B sites, unlike the SSH model, Fig. <ref>(d). Note that this model doesn't have chiral symmetry, so d_0 ≠ 0, and the whole spectrum tends to oscillate with ϕ_AA, Fig. <ref>(a). §.§ Symmetry class C with T^2 = 0, C^2 = -1, S^2 = 0 Models with charge-conjugation symmetry C^2 = -1, but no time-reversal or chiral symmetry are in the C class. There is only one possibility, C= S_y, giving H_S,C^(0,y,0), Table <ref> and Fig.<ref>(f). The canonical form for this class, Table <ref>, may be written as for class A with d̃_0 (k,0) as an odd function of k, and d̃_x (k,0), d̃_y (k,0), d̃_z (k,0) as even functions, i.e., set a_n = x̃_n = ỹ_n = z̃_n = 0 in Eqs. (<ref>)-(<ref>). Relations of the tight-binding parameters for H_S,C^(0,y,0) to the canonical form are given in Table <ref>. Energy eigenvalues are E_±(k) = d̃_0 ±√(d̃_x^2 + d̃_y^2 + d̃_z^2). The system is generally an insulator and, with charge-conjugation symmetry, E_±(-k) = - E_∓(k). § NONSYMMORPHIC MODELS WITH CHIRAL SYMMETRY §.§ Nonsymmorphic symmetry class A with T^2 = 0, C^2 = 0, S^2 = NS The two possibilities for a nonsymmorphic nonspatial symmetry, T_a/2 and T_a/2 S_z, suggest that there are two possible models with nonsymmorphic chiral symmetry (only), Table <ref>. However, they are related by a trivial, diagonal gauge transformation because S_z is diagonal; thus, there is only one distinct model in subclass A with S^2 = NS. The models written in the atomic basis may be identified explicitly using the generalized Rice-Mele Hamiltonian (<ref>) with d_0 = 0. For the Bloch Hamiltonian H(k,s), nonsymmorphic chiral symmetry corresponds to cases for which H(k,a/2) satisfies chiral symmetry (<ref>) with U_S (k,a/2) being independent of k. In principle, there are three such models, corresponding to U_S (k,a/2) = σ_z, σ_y, or σ_x. However, chiral symmetry U_S (k,s) = σ_z is independent of the intracell spacing s because it and U (k,s), Eq.(<ref>), are diagonal. Thus, U_S (k,s) = σ_z is included as symmorphic chiral symmetry yielding H_S,AIII^(0,0,z) (k,s), the generalized SSH model. Thus, there are two general nonsymmorphic models: H_NS,A^(0,0,y) with U_S (k,a/2) = σ_y in k space and T_a/2 S_z in position space, H_NS,A^(0,0,x) with U_S (k,a/2) = σ_x and T_a/2. The values of the tight-binding parameters for each model are summarized in Table <ref>. Considering one of these models in position space with an even number of atoms and periodic boundary conditions (thus, satisfying chiral symmetry), then, when we change to the chiral basis, the resulting Hamiltonian is block diagonal, with 2 × 2 blocks, but it is no longer a periodic lattice (with a period of a); this is why analysis of the generalized Rice-Mele model with U_S (k,a/2) = σ_z is unable to realise a nonsymmorphic model. Although the symmetry operators for intracell spacing s=a/2 are independent of k, they acquire k dependences when written for zero intracell spacing s=0 (or, equivalently, when written in the type I or `periodic' representation <cit.>) according to Eqs. (<ref>)-(<ref>). For example, for H_NS,A^(0,0,y), U_S (k,a/2) = σ_y translates as U_S (k,0) = [ 0 -i e^-ika/2; i e^ika/2 ] . The canonical form H_NS,A (k,a/2) = ·d̃ of the Hamiltonian is given in Table <ref> with d̃_z (k,a/2) = 0. Component d̃_x is an arbitrary, real 2π periodic function of ka whereas d̃_y has a period of 4π <cit.>. In the canonical form, chiral symmetry is given by σ_z. Model H_NS,A^(0,0,y) (k,a/2) can be transformed to the canonical form, Table <ref>, using R=R_y, Eq. (<ref>), and H_NS,A^(0,0,x) (k,a/2) can be transformed to the canonical form using R=R_x, Eq. (<ref>). The canonical form in Table <ref> is written for intracell spacing s=a/2, but it may be written for s=0 using the unitary transformation Eqs. (<ref>,<ref>). In terms of tight-binding parameters, nonsymmorphic models (Tables <ref> and <ref>) have definite relationships between nearest-neighbor hopping parameters w and v (generalizing to t_2n+1^' and t_2n+1 for hoppings of arbitrary order, Appendix <ref>). Symmorphic models (Tables <ref> and <ref>) either have no particular relation between different hopping parameters or third-nearest neighbor hopping t_3 is related to next-nearest hopping w (generalizing to t_2n+1 and t_2n-1^' for hoppings of arbitrary order, Appendix <ref>). In this symmetry class, energy eigenvalues are given by E_±(k) = ±√(d̃_x^2 + d̃_y^2), and the system is generally an insulator. Since time-reversal and spatial-inversion symmetries are absent, the spectrum generally isn't an even function of k, but chiral symmetry imposes E_±(k) = - E_∓(k). As d̃_y at s=a/2 has a period of 4π, the path of the d̃ vector in the d̃_x-d̃_y plane is not closed and it is not possible to define a winding number. However, it is possible to identify a ℤ_2 topological index μ_2 <cit.> by counting whether the number of times the trajectory crosses the negative d̃_x axis is even (μ_2=0) or odd (μ_2=1) for 0 ≤ ka < 2 π. The end point of the trajectory must have the same d̃_x value as the start point, and a negated value of d̃_y. Thus, it is impossible to change the ℤ_2 topological index by adiabatically changing parameters in order to move the start and end points or to adjust the trajectory, as long as the origin is avoided. For nearest-neighbor terms only (x_0, x_1, x̃_1, β_0, and β̃_0 only), an expression for the ℤ_2 topological index, μ_2, may be found by examining the sign of d̃_x at the point when d̃_y = 0 (i.e., when β_0 cos (ka/2) + β̃_0 sin (ka/2) = 0). This gives μ_2 = 0 f > 0 , 1 f < 0 , f = x_0/2 (β_0^2 + β̃_0^2) - x_1 (β_0^2 - β̃_0^2) - 2 x̃_1 β_0 β̃_0 , and the system is gapless if f = 0. Expressions for the parameters x_0, x_1, x̃_1, β_0, and β̃_0 in terms of tight-binding parameters for the two models may be read off Table <ref>. For example, for H_NS,A^(0,0,y), then μ_2 = 1 if u < 2t_AAcos (ϕ_AA - 2 ϕ_v). The ℤ_2 topological index, μ_2, is discussed in more detail in Section <ref>. As stated above, there is only one distinct model because H_NS,A^(0,0,y) and H_NS,A^(0,0,x) are related by a diagonal transformation in the atomic basis in position space, H_NS,A^(0,0,x) = ℛ_d H_NS,A^(0,0,y)ℛ_d, where the transformation has period 2a, ℛ_d =[ 1 0 0 0 0 ⋯; 0 1 0 0 0 ⋯; 0 0 -1 0 0 ⋯; 0 0 0 -1 0 ⋯; 0 0 0 0 1 ⋯; ⋮ ⋮ ⋮ ⋮ ⋮ ⋱ ] , and this may require reversing the sign of some parameters (e.g. t_AA). Thus, in terms of models which are distinguished by off-diagonal transformations in the atomic basis, there is actually only one, H_NS,A^(0,0,y), which is sketched in Fig. <ref>(a). This model, H_NS,A^(0,0,y), can be viewed as a generalized version of the CDW model <cit.> with alternating onsite energies and constant nearest-neighbor hopping v̅ = v exp(i ϕ_v). Second-nearest neighbor hopping (if included) also alternates as t̅_AA = t_AAexp(i ϕ_AA) for A-A hopping and -t̅_AA = - t_AAexp(i ϕ_AA) for B-B hopping. It may be generalized to include arbitrary-range hoppings, Table <ref>. §.§ Nonsymmorphic symmetry class AI with T^2 = 1, C^2 = NS, S^2 = NS We now consider nonsymmorphic chiral symmetry in systems with charge-conjugation C and time-reversal T symmetries, too. If chiral symmetry S is nonsymmorphic, then one (and only one) of C and T must be, too. If we consider that S and C are nonsymmorphic, each described by T_a/2 or T_a/2 S_z, then there are four possibilities, Table <ref>, with T being symmorphic (T^2 = 1) for each of them. However, only one of these is distinct as can be seen by multiplying the symmetry operators by S_z. To identify models in the atomic basis corresponding to each of these possibilities, we apply time-reversal symmetry (<ref>) to the models with chiral symmetry described in Section <ref>. For the Bloch Hamiltonian, we consider U_T (k,a/2) to be independent of k, i.e. U_T (k,a/2) = I, σ_x, σ_y or σ_z. Then, with definite chiral symmetry and time-reversal symmetry, we determine the form of charge-conjugation symmetry U_C using U_S (k,a/2) =U_C^∗ (k,a/2) U_T (-k,a/2). Thus, the four models with T=1, C= NS, S= NS (label `NS' indicates nonsymmorphic) are listed in Table <ref>. In this class, the canonical form of the Bloch Hamiltonian H̃_NS,AI (k,a/2) = ·d̃ can be written as in Table <ref> with d̃_z (k,a/2) = 0. Values of the tight-binding parameters of each model in terms of the parameters of the canonical form are given in Table <ref>. Energy eigenvalues are E_± (k) = ±√(d̃_x^2 + d̃_y^2), and the system is generally an insulator, Fig. <ref>(b). As described in Section <ref>, d̃_y (k,a/2) has a period of 4π and it is not possible to define a winding number, but there is a ℤ_2 topological index μ_2 <cit.>. This is defined by counting whether the number of times the trajectory crosses the negative d̃_x axis is even (μ_2=0) or odd (μ_2=1) for 0 ≤ ka < 2 π. An example is shown with band structure in Fig. <ref>(a), where we note that the higher-order terms in the canonical form, Table <ref>, produce strong features in the band structure at ka ≈±π/2 which would result in van Hove singularities in the density of states. The path of the corresponding d̃ vector is in Fig. <ref>(b) showing the trajectory crossing the negative d̃_x axis once, indicating a ℤ_2 topological index of value μ_2 = 1 for this choice of parameters. The canonical form, Table <ref>, shows that d̃_y (π/a,a/2) = 0 so the path must cross the d̃_x axis at k = π/a. The end point of the trajectory must have the same d̃_x value as the start point, and a negated value of d̃_y. With these constraints, it is impossible to change the ℤ_2 topological index by adiabatically changing parameters in order to move the start and end points or to adjust the trajectory, as long as the origin is avoided. For nearest-neighbor terms only (x_0, x_1 and β_0 only), the ℤ_2 topological index, μ_2, may be simplified as μ_2 = 0 x_0 > 2 x_1 , 1 x_0 < 2 x_1 , and the system is gapless if x_0 = 2 x_1. Expressions for x_0, x_1 in terms of tight-binding parameters for different models may be read off Table <ref>. For example, for H_NS,AI^(I,y,y), then μ_2 = 1 if u < 2t_AA. The one distinct model, H_NS,AI^(I,y,y), is the CDW model <cit.> with alternating onsite energies and constant nearest-neighbor hopping v, Fig. <ref>(a). Second-nearest neighbor hopping (if included) also alternates as t_AA for A-A hopping and - t_AA for B-B hopping. For the nonsymmorphic cases, the Bloch Hamiltonian is not 2π periodic in ka, and there is ambiguiity in the choice of the canonical form, Table <ref>: here, we have chosen a `cosine' representation d̃_y (k,a/2) = ∑_n=0^∞ p_n cos[ ka (n+1/2 ) ], but it is equally valid to choose a `sine' representation d̃_y (k,a/2) = ∑_n=0^∞p̃_n sin[ ka (n+1/2 ) ] as the two are related by the diagonal, gauge transformation R_d, Eq. (<ref>), in position space. Fig. <ref>(b) shows the model schematically in position space after the transformation R_d H_NS,AI^(I,y,y) R_d, and the transformation introduces alternating nearest-neighbor hopping ± v (this is equivalent to model H_NS,AI^(I,x,x)). On Fourier transforming to k space, the original model, Fig. <ref>(a), yields the cosine representation, E_cos (k) = ±√([u + 2t_AAcos(ka)]^2 + [2vcos(ka/2)]^2), as plotted in Fig. <ref>(c). However, the transformed model, Fig. <ref>(b), gives the sine representation, E_sine (k) = ±√([u - 2t_AAcos(ka)]^2 - [2vsin(ka/2)]^2), as plotted in Fig. <ref>(e). The two representations describe the same physical states E_sine (k + π /a) = E_cos (k) as can be seen by the fact they both give the same spectrum upon zone folding at ka = ±π/2, Fig. <ref>(d). In this symmetry class, both chiral symmetry S and charge-conjugation C are nonsymmorphic, Table <ref>, and one may wonder whether this symmetry class has C^2 = 1 or C^2 = -1. There are models (H_NS,AI^(I,x,x) and H_NS,AI^(z,x,y)) where C = σ_x in k space and C = T_a/2 in position space. Hence C^2 = T_a/2^2 = T_a is not the identity matrix as such but describes translation by a unit cell (of length a) which is a symmetry of the lattice. However, there are also models (H_NS,AI^(I,y,y) and H_NS,AI^(z,y,x)) where C = σ_y in k space and C = T_a/2 S_z in position space. Since T_a/2 and S_z anticommute, then C^2 = T_a/2 S_z T_a/2 S_z = - T_a/2^2 = - T_a. So, there appears to be both cases (C^2 = 1 or C^2 = -1), even though, as described above, all four models are equivalent (related by diagonal gauge transformations). Thus, we choose to identify this symmetry (sub)class by C^2 = NS rather than C^2 = 1 or C^2 = -1. Note that the apparent ambiguity (C^2 = 1 or C^2 = -1) is recognised as ambiguity in the sign, ϵ_σ, of a product of symmetry operators in the classification of Ref. <cit.>, and the classification does not depend on such ambiguity. In the next section, we describe a similar situation with nonsymmorphic time-reversal symmetry, and show how the two apparently contradicting cases (of T^2 = 1 and T^2 = -1) give a consistent implementation of Kramer's degeneracy. §.§ Nonsymmorphic symmetry class D with T^2=NS, C^2 = 1, S^2 = NS If we now choose S and T to be nonsymmorphic, each described by T_a/2 or T_a/2 S_z, then there are also four possibilities, Table <ref>, with C being symmorphic (C^2 = 1) for each of them. Again, one of these (e.g. H_NS,D^(x,z,y)) is distinct as can be seen by multiplying the symmetry operators by S_z. Model H_NS,D^(x,z,y), Fig. <ref>(a), has real nearest-neighbor hopping v, but imaginary and alternating second-neighbor hopping ± i t_AA. The canonical form of the Bloch Hamiltonian H̃_NS,D (k,a/2) = ·d̃ is given in Table <ref> with d̃_z (k,a/2) = 0. Values of the tight-binding parameters of each model in terms of the parameters of the canonical form are given in Table <ref>. Energy eigenvalues are E_± (k) = ±√(d̃_x^2 + d̃_y^2), and the system is generally gapless, Fig. <ref>(d). Here, we have chosen the `cosine' representation d̃_y (k,a/2) = ∑_n=0^∞ p_n cos[ ka (n+1/2 ) ], but it is equally valid to choose a `sine' representation d̃_y (k,a/2) = ∑_n=0^∞p̃_n sin[ ka (n+1/2 ) ] as the two are related by the diagonal, gauge transformation R_d, Eq. (<ref>), in position space. Fig. <ref>(b) shows the model schematically in position space after the transformation R_d H_NS,D^(x,z,y) R_d, and the transformation introduces alternating nearest-neighbor hopping ± v (this is equivalent to model H_NS,D^(y,z,x)). On Fourier transforming to k space, the original model, Fig. <ref>(a), yields the cosine representation, E_cos (k) = ±√(4t_AA^2sin^2(ka) + 4v^2cos^2(ka/2)), as plotted in Fig. <ref>(c). However, the transformed model, Fig. <ref>(b), gives the sine representation, E_sine (k) = ±√(4t_AA^2sin^2(ka) + 4v^2sin^2(ka/2)), as plotted in Fig. <ref>(e). The two representations describe the same physical states E_sine (k + π /a) = E_cos (k) as can be seen by the fact they both give the same spectrum upon zone folding at ka = ±π/2, Fig. <ref>(d). In each of the band plots, Fig. <ref>(c), (d), (e), there is a single degeneracy point in the spectrum <cit.>, and the system is gapless. We find that Kramer's degeneracy does not hold in general (most states are not degenerate with their time-reversed pair), but there is a single point which is doubly degenerate. To show this, let us briefly summarise the argument for Kramer's degeneracy. We denote the time-reversal operator as T(k) = U_T (k) K where U_T (k) ≡ U_T (k,s=0) is a unitary operator and K is the complex conjugation operator. We explicitly include the possiblity of k dependence and consider zero intracell separation s=0. Then, for two states | ψ (k) ⟩ and | ϕ (k) ⟩, ⟨ T(k) ψ (k) | T(k) ϕ (k) ⟩ = ⟨ U_T (k) ψ^∗ (k) | U_T (k) ϕ^∗ (k) ⟩ , = ⟨ψ^∗ (k) | U_T^† (k) U_T (k) ϕ^∗ (k) ⟩ , = ⟨ϕ (k) | ψ (k) ⟩ , using U_T^† (k) U_T (k) = I and ⟨ψ | ϕ⟩^∗ = ⟨ϕ | ψ⟩. Substituting ϕ (k) ≡ T(k) ψ (k) into Eq. (<ref>), ⟨ T(k) ψ (k) | ψ (k) ⟩ = ⟨ T(k) ψ (k) | T^2(k) ψ (k) ⟩ . The right side may be written as ⟨ T(k) ψ (k) | T^2(k) ψ (k) ⟩ = ⟨ T(k) ψ (k) | U_T (k) U_T^∗ (k) ψ (k) ⟩ . If U_T (k) U_T^∗ (k) = - I, then ⟨ T(k) ψ (k) | T^2(k) ψ (k) ⟩ = - ⟨ T(k) ψ (k) | ψ (k) ⟩ . Comparison with Eq. (<ref>) requires that U_T (k) U_T^∗ (k) = - I ⇒ ⟨ T(k) ψ (k) | ψ (k) ⟩ = 0 . This means that every state has an orthogonal time-reversed partner which is at the same energy, and that k values that are time-reversal invariant are points of degeneracy. Note that there is a subtle difference between the requirement (<ref>) on the operator to represent time reversal, U_T (k) U_T^∗ (-k) = ± I, and the requirement (<ref>) for Kramer's degeneracy, U_T (k) U_T^∗ (k) = - I. In the symmorphic symmetry classes AII and DIII, U_T (k) = σ_y is independent of k, and U_T U_T^∗ = - I. Thus, every state has a degenerate partner, and there are degeneracy points at time-reversal invariant k values (k=0 and k= ±π/a). When time is nonsymmorphic, U_T (k) is dependent on k; while U_T (k) U_T^∗ (-k) = ± I for all k, Kramer's degeneracy U_T (k) U_T^∗ (k) = - I is only satisfied for certain k values. The form of U_T (k) depends on the representation of the nonsymmorphic terms in the d̃ vector. For the cosine representation, U_T (k,a/2) = σ_x and Eq. (<ref>) shows that U_T (k) = [ 0 e^ika/2; e^-ika/2 0 ] , ⇒ U_T (k) U_T^∗ (k) = [ e^ika 0; 0 e^-ika ] , so this is equal to -1 for ka=±π only; this is the location of the degeneracy point in Fig. <ref>(c). For the sine representation, U_T (k,a/2) = σ_y and U_T (k) = [ 0 -i e^ika/2; i e^-ika/2 0 ] , ⇒ U_T (k) U_T^∗ (k) = [ - e^ika 0; 0 - e^-ika ] , so this is equal to -1 for k = 0 only, Fig. <ref>(e). Regardless of the representation (e.g. see Fig. <ref>(d) for the zone-folded band structure), Kramer's degeneracy of the nonsymmorphic time-reversal symmetry dictates that there is one degeneracy point as opposed to none in the symmorphic case with T^2 = 1 and two in the symmorphic case with T^2 = - 1. §.§ Nonsymmorphic symmetry class AIII with T^2=NS, C^2=NS, S^2=1 Finally, we can choose C and T to be nonsymmorphic, each described by T_a/2 or T_a/2 S_z. In this case there are only two possibilities, Table <ref>, because 𝒮 = I is not possible; for both possibilities 𝒮 = S_z (S^2=1). Again, only one model is distinct, e.g. H_NS,AIII^(x,y,z), Fig. <ref>(b). To find the form of the models in position space, with 𝒮 = S_z, we begin by considering the generalized SSH Bloch Hamiltonian H_S,AIII^(0,0,z) (k,s) and apply time-reversal symmetry, considering U_T (k,a/2) to be independent of k. The canonical form of the Bloch Hamiltonian H̃_NS,AIII (k,a/2) = ·d̃ with d̃_z (k,a/2) = 0 is given in Table <ref>, which is the cosine represenation. Note that the sine representation would have d̃_x (k,a/2) = ∑_n=0^∞α̃_n sin[ ka (n+1/2 ) ] and d̃_y (k,a/2) = ∑_n=0^∞β̃_n sin[ ka (n+1/2 ) ]. Energy eigenvalues are E_± (k) = ±√(d̃_x^2 + d̃_y^2), and the system is generally gapless, Fig. <ref>(f), due to nonsymmorphic time-reversal symmetry and Kramer's degeneracy, as described in Section <ref>. § NONSYMMORPHIC MODELS WITHOUT CHIRAL SYMMETRY §.§ Nonsymmorphic symmetry class A with T^2=NS, C^2 =0, S^2 = 0 To explicitly confirm that the presence of a single degeneracy point is due to Kramer's degeneracy with nonsymmorphic time-reversal symmetry, we construct a model with nonsymmorphic time-reversal symmetry only, i.e. no chiral, charge-conjugation or spatial inversion symmetry. We begin from the full model with d_0 ≠ 0, Eqs. (<ref>,<ref>) and set the intracell spacing s=a/2. We can choose U_T (k,a/2) = σ_x (𝒯 = T_a/2 in position space) yielding the cosine representation and model H_NS,A^(x,0,0), Table <ref>, or U_T (k,a/2) = σ_y (𝒯 = T_a/2 S_z) giving the sine representation and model H_NS,A^(y,0,0). Only one of these is distinct, e.g. H_NS,A^(x,0,0), because H_NS,A^(y,0,0) is related to it by the diagonal transformation ℛ_i, Eq. (<ref>). Model H_NS,A^(x,0,0) is shown schematically in Fig. <ref>(c). For the canonical form, we use the cosine representation, Table <ref>. Table <ref> shows values of the tight-binding parameters for the two models and the corresponding values of the parameters a_n, α_n, β_n, and z̃_n of the canonical form, Table <ref>. Band energies are E_± (k) = d̃_0 ±√(d̃_x^2 + d̃_y^2 + d̃_z^2). Owing to the nonsymmorphic time-reversal symmetry and Kramer's degeneracy, there is a single degeneracy point (at ka = π in the canonical form, Table <ref>). §.§ Nonsymmorphic symmetry class A with T^2=0, C^2 =NS, S^2 = 0 To complete the description of nonsymmorphic models, we conclude with models having nonsymmorphic charge-conjugation symmetry (only). Again, we begin from the full model with d_0 ≠ 0, Eqs. (<ref>,<ref>) and set the intracell spacing s=a/2. We can choose U_C (k,a/2) = σ_y (𝒞 = T_a/2 S_z in position space) yielding the cosine representation and model H_NS,A^(0,y,0), Table <ref>, or U_C (k,a/2) = σ_x (𝒞 = T_a/2) giving the sine representation and model H_NS,A^(0,x,0). Only one of these is distinct, e.g. H_NS,A^(0,y,0), because H_NS,A^(0,x,0) is related to it by the diagonal transformation ℛ_i, Eq. (<ref>). Model H_NS,A^(0,y,0) is shown schematically in Fig. <ref>(d). For the canonical form, we use the cosine representation, Table <ref>. Table <ref> shows values of the tight-binding parameters for the two models and the corresponding values of the parameters ã_n, α_n, β_n, and z_n of the canonical form, Table <ref>. Band energies are E_± (k) = d̃_0 ±√(d̃_x^2 + d̃_y^2 + d̃_z^2), and the form of d̃_z shows that this is generally insulating. K theory predicts <cit.> that this class has a ℤ_2 topological index even in the absence of time-reversal or chiral symmetry. The description of the ℤ_2 index in the presence of nonsymmorphic chiral symmetry <cit.>, discussed in Sections <ref> and <ref>, may be generalized to the canonical form, Table <ref>. Now, we consider the trajectory for 0 ≤ ka < 2 π in three-dimensional space with Cartesian axes d̃_x, d̃_y, d̃_z, and count whether the number of times the trajectory crosses the negative d̃_z axis is even (μ_2=0) or odd (μ_2=1). The ℤ_2 index may be defined because of contraints on the trajectory as described by the canonical form, Table <ref>: d̃_x (π/a,a/2) = d̃_y (π/a,a/2) = 0 so the path must cross the d̃_z axis at k = π/a; the end point of the trajectory must have the same d̃_z value as the start point, with negated values of d̃_x and d̃_y. With these constraints, it is impossible to change the ℤ_2 index by adiabatically changing parameters in order to move the start and end points or to adjust the trajectory, as long as the origin is avoided. For nearest-neighbor terms only (z_0, z_1, α_0 and β_0 only), the ℤ_2 topological index, μ_2, may be simplified as μ_2 = 0 z_0 > 2 z_1 , 1 z_0 < 2 z_1 , and the system is gapless if z_0 = 2 z_1. Expressions for z_0, z_1 in terms of tight-binding parameters for the two models may be read off Table <ref>. For example, for H_NS,A^(0,y,0), then μ_2 = 1 if u < 2 t_AAcosϕ_AA. § CONCLUSION We considered noninteracting, one-dimensional tight-binding models on a periodic lattice with two energy bands. For each symmetry class, Table <ref>, we identified distinct models in the atomic basis in position space and showed that they may be written in a unified canonical form. Generally, states of matter were found to be in agreement with predictions of the tenfold way classification for the symmorphic models <cit.> and with the classification of Ref. <cit.> for nonsymmorphic models. Exceptions arise because we only consider systems with two bands: they are the symmorphic DIII and the nonsymmorphic D class which we find are both gapless due to the presence of time-reversal symmetry with Kramer's degeneracy. With two bands, there are also not enough degrees of freedom to realize the CII (chiral symplectic) symmetry class <cit.>. In principle, however, our approach could be extended to include more than two orbitals per unit cell or to incorporate superconducting pairing, yielding a four-orbital Bogoliubov de Gennes representation. We described models with nonsymmorphic nonspatial symmetries and found that they separate into only two types of state of matter: an insulator with a ℤ_2 topological index <cit.> in the absence of nonsymmorphic time-reversal symmetry or, in the presence of nonsymmorphic time-reversal symmetry, a metallic state <cit.>. The models identified in the atomic basis in position space provide a recipe for experimental realization of examples of each symmetry group in a relatively simple way with only two orbitals per cell, and there are a variety of different platforms for physical synthesis of one-dimensional tight-binding models including engineered atomic lattices <cit.> and cold atoms in optical lattices <cit.>. All relevant data presented in this paper can be accessed <cit.>. The author thanks S. T. Carr, C. Y. Leung, A. Romito and H. Schomerus for helpful discussions. § LONG-RANGE HOPPINGS We generalize the Rice-Mele model (<ref>) to include all possible long-range couplings, d_0 (k,s) = ϵ_0 + ∑_n=1^∞[ t_2ncos (nka + ϕ_2n ) + t_2n^'cos (nka + ϕ_2n^' ) ] , d_x (k,s) = ∑_n=0^∞[ t_2n+1cos [k (na + s) + ϕ_2n+1] + t_2n+1^'cos [ k((n+1)a - s) + ϕ_2n+1^'] ] , d_y (k,s) = ∑_n=0^∞[ - t_2n+1sin [k (na + s) + ϕ_2n+1] + t_2n+1^'sin [ k((n+1)a - s) + ϕ_2n+1^'] ] , d_z (k,s) = u + ∑_n=1^∞[ t_2ncos (nka + ϕ_2n ) - t_2n^'cos (nka + ϕ_2n^' ) ] , where t_2n and t_2n^' are A-A and B-B hoppings with phases ϕ_2n and ϕ_2n^', t_2n+1 and t_2n+1^' are A-B hoppings with phases ϕ_2n+1 and ϕ_2n+1^', for integer n. In terms of the nearest-neighbor parameters in the main text, t_2 = t_AA, t_2^' = t_BB, ϕ_2 = ϕ_AA, ϕ_2^' = ϕ_BB, t_1 = v, t_1^' = w, ϕ_1 = ϕ_v, ϕ_1^' = ϕ_w. For symmorphic models without chiral symmetry, application of time-reversal or charge-conjugation symmetry requires that each component d_i is an even or odd function of k at s=0, resulting in the same models as described in the main text with all hoppings as listed in Table <ref>. For nonsymmorphic models without chiral symmetry, we consider intracell spacing s=a/2, and they are listed in Table <ref>. Chiral symmetry imposes d_0=0 and one of the other components must be zero, too. With d_0 = 0, then ϵ_0 = 0, t_2n^' = - t_2n and ϕ_2n^' = ϕ_2n. Then, for symmorphic models, we consider s=0 and simplify as d_x (k,0) = v cosϕ_v + ∑_n=1^∞[ t_2n+1cos (kna + ϕ_2n+1) + t_2n-1^'cos ( kna + ϕ_2n-1^') ] , d_y (k,0) = - v sinϕ_v + ∑_n=1^∞[ - t_2n+1sin (kna + ϕ_2n+1) + t_2n-1^'sin ( kna + ϕ_2n-1^') ] , d_z (k,0) = u + 2 ∑_n=1^∞ t_2ncos (nka + ϕ_2n ) , using t_1 = v and ϕ_1 = ϕ_v. Applying chiral and time-reversal symmetries introduces constraints on the parameters giving the models discussed in the main text for nearest-neighbor hopping and listed in Table <ref> including all long-range hoppings. For nonsymmorphic models, we consider s=a/2 and simplify as d_x (k,a/2) = ∑_n=0^∞[ t_2n+1cos (ka[n+12] + ϕ_2n+1) + t_2n+1^'cos ( ka[n+12] + ϕ_2n+1^') ] , d_y (k,a/2) = ∑_n=0^∞[ - t_2n+1sin (ka[n+12] + ϕ_2n+1) + t_2n+1^'sin ( ka[n+12] + ϕ_2n+1^') ] , d_z (k,a/2) = u + 2 ∑_n=1^∞ t_2ncos (nka + ϕ_2n ) . Again, application of chiral and time-reversal symmetries introduces constraints on the parameters giving the models discussed in the main text for nearest-neighbor hopping and listed in Table <ref> including all long-range hoppings. § SPATIAL-INVERSION SYMMETRY AND QUANTIZED ZAK PHASE The catalog of tight-binding models in the main text, Table <ref>, is based on the ten-fold way classification of nonspatial symmetries (time-reversal, charge-conjugation and chiral) <cit.> . An alternative approach is to classify models based on spatial-inversion symmetry <cit.> as described by Eq. (<ref>). We consider the generalized Rice-Mele model, Eqs. (<ref>,<ref>,<ref>,<ref>), and apply spatial-inversion symmetry in the form of U_P = I, σ_x, σ_y, or σ_z. This forces the individual components of the d vector to be either even or odd with respect to k. With intracell spacing s=0, there are four models, denoted H_S,A^(U_P=i) for i = I, σ_x, σ_y, or σ_z with parameters listed in Table <ref>. In position space, these models satisfy spatial inversion (<ref>) with 𝒫 = P_I, P_x, P_y, or P_z, respectively, for an even number of atoms, J. For model H_S,A^(U_P=I) with U_P=I, all four components of the d vector are even with respect to k. Apart from component d_0, this is the same as class C with U_C^2 = -1 described in the main text, Table <ref>. Hence, as with class C, H_S,A^(U_P=I) will be an insulator with a single phase only. Of the three models H_S,A^(U_P=i) for i = σ_x, σ_y, or σ_z, only two of them (H_S,A^(U_P=σ_x) and H_S,A^(U_P=σ_z)) are distinct in the atomic basis because H_S,A^(U_P=σ_y) is a version of H_S,A^(U_P=σ_x) with imaginary A-B coupling parameters and is thus related to it by a diagonal gauge transformation. With these models, component d_0 is an even function of k, one of the other components is also even and the other two are odd. They may be rotated into the same canonical form using rotations such as R_x or R_y. Apart from component d_0, they have the same form as class D with U_C^2 = 1 described in the main text, Table <ref>. Like class D, they are insulators with a ℤ_2 topological index. In the context of one-dimensional systems with spatial inversion symmetry, the ℤ_2 index is Zak phase quantized to either 0 or π <cit.>. With intracell spacing s=a/2, application of U_P = σ_x or σ_y just reproduces models H_S,A^(U_P=σ_x) and H_S,A^(U_P=σ_y) discussed above. Application of U_P = I or σ_z produces two models denoted H_NS,A^(U_P=I) and H_NS,A^(U_P=σ_z), with tight-binding parameters listed in Table <ref>. In position space, these models satisfy spatial inversion (<ref>) with 𝒫 = P_x (for U_T = I) or P_y (for U_T = σ_z), for an odd number of atoms, J. We label these models as `NS' even though the symmetry is not nonsymmorphic, because the form of the Hamiltonian is similar to that of the nonsymmorphic ones, i.e., they also have definite relationships between hoppings t_2n+1^' and t_2n+1, Table <ref>. Only one of these models is distinct, H_NS,A^(U_P=I), because H_NS,A^(U_P=σ_z) is related to it by the diagonal transformation ℛ_d, Eq. (<ref>). Apart from component d_0 (which is even), H_NS,A^(U_P=I) has the same form as class A with U_C^2 = NS described in the main text, Table <ref>. Like this class, H_NS,A^(U_P=I) describes an insulator with a ℤ_2 topological index (the quantized Zak phase). One can subsequently refine the classification by applying time-reversal or charge-conjugation symmetry which will also place requirements on components of the d vector to be even or odd functions of k. In situations where these constraints clash with those of spatial-inversion symmetry, the component must be set equal to zero. With time-reversal symmetry, the resulting models would be like those with chiral symmetry but with d_0 ≠ 0. For example, applying U_T = I to model H_S,A^(U_P=σ_x) requires d_z =0 with d_x being even and d_y odd, similar to class BDI, Table <ref> (with d_0 ≠ 0). 99 wigner51 E. P. Wigner, Proc. Camb. Philos. Soc. 47, 790 (1951). wigner58 E. P. Wigner, Ann. Math. 67, 325 (1958). dyson62a F. J. Dyson, J. Math. Phys. 3, 140 (1962). gade93 R. Gade, Nucl. Phys. B 398, 499 (1993). verbaarschot93 J. J. M. Verbaarschot and I. Zahed, Phys. Rev. Lett. 70, 3852 (1993). verbaarschot94 J. Verbaarschot, Phys. Rev. Lett. 72, 2531 (1994). altland97 A. Altland and M. R. Zirnbauer, Phys. Rev. B 55, 1142 (1997). schnyder08 A. P. Schnyder, S. Ryu, A. Furusaki, and A. W. W. Ludwig, Phys. Rev. B 78, 195125 (2008). kitaev09 A. Kitaev, AIP Conf. Proc. 1134, 22 (2009). ryu10 S. Ryu, A. P. Schnyder, A. Furusaki, and A. W. W. Ludwig, New J. Phys. 12, 065010 (2010). chiu16 C.-K.Chiu, J. C. Y. Teo, A. P. Schnyder, and S. Ryu, Rev. Mod. Phys. 88, 035005 (2016). liu14 C.-X. Liu, R.-X. Zhang, and B. K. VanLeeuwen, Phys. Rev. B 90, 085304 (2014). shiozaki14 K. Shiozaki and M. Sato, Phys. Rev. B 90, 165114 (2014). young15 S. M. Young and C. L. Kane, Phys. Rev. Lett. 115, 126803 (2015). wang16 Z. Wang, A. Alexandradinata, R. J. Cava, and B. A. Bernevig, Nature 532, 189 (2016). shiozaki16 K. Shiozaki, M. Sato, and K. Gomi, Phys. Rev. B 93, 195413 (2016). kruthoff17 J. Kruthoff, J. de Boer, J. van Wezel, C. L. Kane, and R.-J. Slager, Phys. Rev. X 7, 041069 (2017). herrera22 M. A. J. Herrera and D. Bercioux, Commun. Phys. 6, 42 (2023). lax74 M. Lax, Symmetry principles in solid state and molecular physics (Wiley-Interscience, 1974). mong10 R. S. K. Mong, A. M. Essin, and J. E. Moore, Phys. Rev. A 81, 245209 (2010). otrokov19 M. M. Otrokov et al., Nature 576, 416 (2019). gong19 Y. Gong et al., Chin. Phys. Lett. 36, 076801 (2019). zhang19 D. Zhang, M. Shi, T. Zhu, D. Xing, H. Zhang, and J. Wang, Phys. Rev. Lett. 122, 206401 (2019). niu20 C. Niu, H. Wang, N. Mao, B. Huang, Y. Mokrousov, and Y. Dai, Phys. Rev. Lett. 124, 066401 (2020). fang15 C. Fang and L. Fu, Phys. Rev. B 91, 161105(R) (2015). shiozaki15 K. Shiozaki, M. Sato, and K. Gomi, Phys. Rev. B 91, 155120 (2015). zhao16 Y. X. Zhao and A. P. Schnyder, Phys. Rev. B 94, 195109 (2016). arkinstall17 J. Arkinstall, M. H. Teimourpour, L. Feng, R. El-Ganainy, and H. Schomerus, Phys. Rev. B 95, 165109 (2017). marques19 A. M. Marques and R. G. Dias, Phys. Rev. B 100, 041104(R) (2019). brzezicki20 W. Brzezicki and T. Hyart, Phys. Rev. B 101, 235113 (2020). allen22 R. E. J. Allen, H. V. Gibbons, A. M. Sherlock, H. R. M. Stanfield, and E. McCann, Phys. Rev. B 106, 165409 (2022). yang22 Y. Yang, H. C. Po, V. Liu, J. D. Joannopoulos, L. Fu, and M. Soljačić, Phys. Rev. B 106, L161108 (2022). ssh79 W. P. Su, J. R. Schrieffer, and A. J. Heeger, Phys. Rev. Lett. 42, 1698 (1979). ssh80 W. P. Su, J. R. Schrieffer, and A. J. Heeger, Phys. Rev. B 22, 2099 (1980). hasan10 M. Z. Hasan and C. L. Kane Rev. Mod. Phys. 82, 3045 (2010). asboth16 J. K. Asbóth, L. Oroszlány, and A. Pályi, A Short Course on Topological Insulators (Springer, Switzerland, 2016). cayssol21 J. Cayssol and J.-N. Fuchs, J. Phys. Mater. 4, 034007 (2021). takayama80 H. Takayama, Y. R. Lin-Liu, and K. Maki, Phys. Rev. B 21, 2388 (1980). kivelson83 S. Kivelson, Phys. Rev. B 28, 2653 (1983). fulga11 I. C. Fulga, F. Hassler, A. R. Akhmerov, and C. W. J. Beenakker, Phys. Rev. B 83, 155429 (2011). chen11 K. T. Chen and P. A. Lee, Phys. Rev. B 84, 113111 (2011). gangadharaiah12 S. Gangadharaiah, L. Trifunovic, and D. Loss, Phys. Rev. Lett. 108, 136803 (2012). pershoguba12 S. S. Pershoguba and V. M. Yakovenko, Phys. Rev. B 86, 075304 (2012). li14 L. Li, Z. Xu, and S. Chen, Phys. Rev. B 89, 085111 (2014). guo16 H.-M. Guo, Sci. China Phys. Mech. 59, 637401 (2016). velasco17 C. G. Velasco and B. Paredes, Phys. Rev. Lett. 119, 115301 (2017). bercioux17 D. Bercioux, O. Dutta, and E. Rico, Ann. Phys. 529, 1600262 (2017). rhim17 J.-W. Rhim, J. Behrends, and J. H. Bardarson, Phys. Rev. B 95, 035421 (2017). rhim18 J.-W. Rhim, J. H. Bardarson, and R.-J. Slager, Phys. Rev. B 97, 115143 (2018). liu18 T. Liu and H. Guo, Phys. Lett. A 382, 3287 (2018). munoz18 F. Munoz, F. Pinilla, J. Mella, and M. I. Molina, Sci. Rep. 8, 17330 (2018). perezgonzalez19 B. Pérez-González, M. Bello, Á. Gómez-León, and G. Platero, Phys. Rev. B 99, 035146 (2019). chen20 B.-H. Chen and D.-W. Chiou, Phys. Lett. A 384, 126168 (2020). scollon20 M. Scollon and M. P. Kennett, Phys. Rev. B 101, 144204 (2020). pletyukhov20 M. Pletyukhov, D. M. Kennes, K. Piasotski, J. Klinovaja, D. Loss, and H. Schoeller, Phys. Rev. Research 2, 033345 (2020). lin20 Y.-T. Lin, D. M. Kennes, M. Pletyukhov, C. S. Weber, H. Schoeller, and V. Meden, Phys. Rev. B 102, 085122 (2020). vanmiert20 G. van Miert and C. Ortix, npj Quantum Mater. 5, 63 (2020). han20 S.-H. Han, S.-G. Jeong, S.-W. Kim, T.-H. Kim, and S. Cheon, Phys. Rev. B 102, 235411 (2020). chen21 H.-T. Chen, C.-H. Chang, and H.-c. Kao, Chin. J. Phys. 72, 50 (2021). fuchs21 J.-N. Fuchs and F. Piéchon, Phys. Rev. B 104, 235428 (2021). kim12 T.-H. Kim and H. W. Yeom, Phys. Rev. Lett. 109, 246802 (2012). cheon15 S. Cheon, T.-H. Kim, S.-H. Lee, and H. W. Yeom, Science 350, 182 (2015). shim15 H. Shim, G. Lee, J.-M. Hyun, and H. Kim, New J. Phys. 17, 093026 (2015). kim17 T.-H. Kim, S. Cheon, and H. W. Yeom, Nat. Phys. 13, 444 (2017). drost17 R. Drost, T. Ojanen, A. Harju, and P. Liljeroth, Nat. Phys. 13, 668 (2017). lee19 G. Lee, H. Shim, J.-M. Hyun, and H. Kim, Phys. Rev. Lett. 122, 016102 (2019). huda20 M. N. Huda, S. Kezilebieke, T. Ojanen, R. Drost, and P. Liljeroth, npj Quantum Mater. 5, 17 (2020). kiczynski22 M. Kiczynski, S. K. Gorman, H. Geng, M. B. Donnelly, Y. Chung, Y. He, J. G. Keizer, and M. Y. Simmons, Nature 606, 694 (2022). atala13 M. Atala, M. Aidelsburger, J. T. Barreiro, D. Abanin, T. Kitagawa, E. Demler, and I. Bloch, Nat. Phys. 9, 795 (2013). przysiezna15 A. Przysiezna, O. Dutta, and J. Zakrzewski, New J. Phys. 17, 013018 (2015). meier16 E. J. Meier, F. A. An, and B. Gadway, Nat. Commun. 7, 13986 (2016). meier18 E. J. Meier, F. A. An, A. Dauphin, M. Maffei, P. Massignan, T. L. Hughes, and B. Gadway, Science 362, 929 (2018). cooper19 N. R. Cooper, J. Dalibard, and I. B. Spielman, Rev. Mod. Phys. 91, 015005 (2019). kang2020 J. H. Kang, J. H. Han, and Y Shin, New J. Phys. 22, 013023 (2020). ricemele82 M. J. Rice and E. J. Mele, Phys. Rev. Lett. 49, 1455 (1982). creutz99 M. Creutz, Phys. Rev. Lett. 83, 2636 (1999). shockley39 W. Shockley, Phys. Rev. 56, 317 (1939). vanderbilt93 D. Vanderbilt and R. D. King-Smith, Phys. Rev. B 48, 4442 (1993). canonicalnote For each symmetry class, we can write all models in the same canonical form using unitary transformations. In some cases, the canonical form is not unique, e.g. for class BDI, Table <ref>, we have chosen d̃_x even and d̃_y odd, but one could also choose d̃_x odd and d̃_y even. For nonsymmorphic systems, there is a `cosine' or a `sine' representation, as described in the main text: this corresponds to the occasional ambiguity in the sign, ϵ_σ, of a product of symmetry operators in Ref. <cit.>. budich13 J. C. Budich and E. Ardonne, Phys. Rev. B 88, 134523 (2013). li16 L. Li, C. Yang, and S. Chen, Eur. Phys. J. B 89, 195 (2016). matveeva22 P. Matveeva, T. Hewitt, D. Liu, K. Reddy, D. Gutman, and S. T. Carr, Phys. Rev. B 107, 075422 (2023). bena09 C. Bena and G. Montambaux, New J. Phys. 11, 095003 (2009). symmetrynotes The condition U_S (k,s) =U_C^∗ (k,s) U_T (-k,s) may sometimes yield irrelevant additional factors (e.g. of `i') appearing as products with the Pauli spin matrices; we neglect such factors. kitaev01 A. Y. Kitaev, Phys.-Usp. 44, 131 (2001). bychkovrashba84 Y. A. Bychkov and E. I. Rashba, J. Phys. C 17, 6039 (1984). mii14 T. Mii, N. Shima, K. Kano, and K. Makoshi, J. Phys. Soc. Jpn. 83, 064706 (2014). hughes11 T. L. Hughes, E. Prodan, and B. A. Bernevig, Phys. Rev. B 83, 245132 (2011). zak89 J. Zak, Phys. Rev. Lett. 62, 2747 (1989). datanote https://doi.org/10.17635/lancaster/researchdata/597https://doi.org/10.17635/lancaster/researchdata/597
http://arxiv.org/abs/2303.06860v1
20230313050825
View Adaptive Light Field Deblurring Networks with Depth Perception
[ "Zeqi Shen", "Shuo Zhang", "Zhuhao Zhang", "Qihua Chen", "Xueyao Dong", "Youfang Lin" ]
cs.CV
[ "cs.CV", "eess.IV" ]
^1School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China ^2Beijing Key Laboratory of Traffic Data Analysis and Mining, Beijing, China ^3CAAC Key Laboratory of Intelligent Passenger Service of Civil Aviation, Beijing, China shenzeqi,zhangshuo,19281058,19281062,19281063,yflin@bjtu.edu.cn The Light Field (LF) deblurring task is a challenging problem as the blur images are caused by different reasons like the camera shake and the object motion. The single image deblurring method is a possible way to solve this problem. However, since it deals with each view independently and cannot effectively utilize and maintain the LF structure, the restoration effect is usually not ideal. Besides, the LF blur is more complex because the degree is affected by the views and depth. Therefore, we carefully designed a novel LF deblurring network based on the LF blur characteristics. On one hand, since the blur degree varies a lot in different views, we design a novel view adaptive spatial convolution to deblur blurred LFs, which calculates the exclusive convolution kernel for each view. On the other hand, because the blur degree also varies with the depth of the object, a depth perception view attention is designed to deblur different depth areas by selectively integrating information from different views. Besides, we introduce an angular position embedding to maintain the LF structure better, which ensures the model correctly restores the view information. Quantitative and qualitative experimental results on synthetic and real images show that the deblurring effect of our method is better than other state-of-the-art methods. View Adaptive Light Field Deblurring Networks with Depth Perception Zeqi Shen^1,2, Shuo Zhang^1,2,3, Zhuhao Zhang^1, Qihua Chen^1,Xueyao Dong^1, Youfang Lin^1,2,3 Received: date / Accepted: date ==================================================================================================== § INTRODUCTION There are many reasons for image blur, such as camera shake and object motion. Image blur seriously affects the visual quality of images and the performance of some common computer vision tasks such as tracking <cit.>, SLAM <cit.>, and object detection <cit.>. Therefore, how to remove the image blur effectively and efficiently has attracted extensive attention from researchers. In recent years, with the rapid development of deep learning, some well-designed single image deblurring algorithms <cit.> have made remarkable progress. The single image blur can be modeled as: I_B(x,y) =∫_P^t_x,yI^t_S(x,y) dt, where I_B(x,y) denotes the blurred image, I^t_S(x,y) denotes the sharp image, P^t_x,y denotes the motion path of the pixel (x,y) within the exposure time t. The goal of the deblurring task is to recover I_S from I_B. With the maturity of commercial Light Field (LF) cameras, which can obtain images from different views through one shot, researchers and enterprises have paid more attention to Light Field images (LFs). Limited by hardware equipment, it is easy to cause image blur when shooting LFs, which limits the application scene of LFs. Therefore, the progress of LF deblurring task can promote the development of various LF applications such as virtual reality <cit.>, salient object detection <cit.>, 3D reconstruction <cit.> and depth estimation <cit.>. In this paper, we use 4D function L(u,v,x,y)∈ℝ^U× V× X× Y to represent LFs, where (u,v) and (x,y) are the angular and spatial coordinates, respectively. If we fixed (u,v), the Sub-Aperture Image (SAI) I_u,v can be obtained. If we fixed (x,y), the Micro-lens Images M_x,y can be obtained. Different from the single image blur, the LF blur can be modeled as: L_B(u,v,x,y) =∫_P^t_u,v,x,yL^t_S(u,v,x,y) dt, where L_B(u,v,x,y) denotes the blurred LFs, L^t_S(u,v,x,y) denotes the sharp LFs, P^t_u,v,x,y denotes the motion path of the pixel (x,y) in view (u,v) within the exposure time t. Compared with the single image, which has only spatial dimension (x,y), the LFs have extra angular dimension (u,v). Therefore, the blur phenomenon in LFs is more complex than the single image. Fig. <ref> is an example of LF deblurring task. On one hand, when the light field camera moves, the motion path of each view relative to the object is different, so the blur degree of each view is also different. On the other hand, similar to a single image, objects with different depths produce different degrees of blur, i.e., blur is more serious in pixels with small depth and less in pixels with large depth. Single image methods <cit.> are possible ways to deal with LF deblurring task. However, for the LF blur is affected by the views and depth, if the single image methods are directly applied to the LF deblurring task, i.e., dealing with each view independently, their results cannot maintain the LF structure. Since the LFs are collected regularly in the angular dimension, the LFs have the consistent structure, i.e., the correspondence between different views. Furthermore, since the single image methods cannot effectively utilize the LF angular and depth information, their results are still blurred in some blur areas. Although the LFs with abundant angular information has greater potential to deal with this problem, LF deblurring methods <cit.> are still in their infancy. Traditional methods <cit.> are often time-consuming. Although the LF method <cit.> based on deep learning process images quickly, they destroy the LF consistent structure, because the LFs are divided into multiple groups in their network. By analyzing the current research status of the single image and LF methods, we summarize three urgent problems in the LF deblurring task: 1) How to deal with the problem of different blur degrees in different views. 2) How to solve the different blur degrees caused by different depths in the same view. 3) How to maintain the LF consistency. In this paper, based on the above problems we find and summarize, we propose a novel end-to-end learning-based framework. For the different blur degrees in different views, our method calculates the exclusive convolution kernels for different views to perceive and deal with the corresponding blur. For the pixels with different blur degrees from different depths, the mixed range between the sharp pixel we want to recover and the other view pixels is different in the corresponding micro-lens image. Therefore, we designed a depth perception view attention for micro-lens images to pick out the sharp pixel information, which is mixed in other view pixels. Then the sharp images are restored pixel by pixel based on implicit depth information. Besides, an angular position embedding is applied to depth perception view attention to maintain the LF consistency. Our main contributions can be summarized: * We propose a novel view adaptive spatial convolution to deblur the different views, which automatically adapts to the blur degree of different views. * We design a novel depth perception view attention to restore sharp images pixel by pixel, which deals with the different blurs caused by different depths. Besides, the angular position embedding is applied to maintain the LF consistency. * Quantitative and qualitative experimental results on synthetic and real images show that our method is superior to other state-of-art methods. § RELATED WORK This section will introduce the related works from single image and LF methods. Since the application scenarios of the blind methods are more widely than unblinded methods, we only analyze the blind deblurring method that the blur kernel is unknown. §.§ Single Image Deblurring Method In the past few decades, single image deblurring task has been studied extensively and remarkable achievements have been achieved. Traditional methods remove image blur by various prior knowledge such as color <cit.>, gradient  <cit.>, dark channel  <cit.>,and L0 regularization <cit.>. However, these methods are often computationally complex and cannot achieve satisfactory results on complex real datasets.  <cit.> are the pioneers to solve the deblurring problem based on deep learning, and made remarkable progress. Following these pioneers, multi-scale convolution <cit.> and Recurrent Neural Networks <cit.> are applied to model the spatial variation blur kernel in dynamic scenes. Inspired by the success of Generative Adversarial Networks,  <cit.> generated the sharp images more in line with human visual perception. Although the single image methods are very effective for processing single image deblurring, the LF blur is different from single image. The single image methods have some limitations in processing LFs: 1) The single image methods do not use the abundant angular information in LFs, so that the depth information is missing during the deblurring processing. By contrast, our LF method makes full use of depth information by combining complementary information from all views in LFs, so that the blur boundaries in different depths can be better handled. 2) Using the single image methods to deal with each view separately cannot maintain the LF angular structure very well, which will break the corresponding relationships between views in LFs. By contrast, we process all views at one time, which maintains the LF structure well. §.§ LF Deblurring Method The LFs belong to multi-images, but it is different from other multi-image types such as video and stereo images. Although these methods <cit.> are excellent in dealing with blur in their field, we do not describe them in detail for their image types are different with us. With the maturity of the commercialization of light field cameras, a variety of applications based on light fields have been brought. Although LFs have been widely studied in the fields of super-resolution <cit.> and depth estimation <cit.>, there is little research on LF deblurring. Dansereau et al. <cit.> first proposed the non-blind LF deblurring method based on the known camera motion. Srinivasan et al. <cit.> are the first to model the 3-DOF camera motion and proposed a blind LF deblurring method on a 3-DOF dataset. Different from 3-DOF camera motion, 6-DOF methods  <cit.> deal with the LF deblurring task on the 6-DOF motion. However, the computational complexity of these traditional methods is too high, and the deblurring effect is seriously limited by the estimation of camera motion. The existing LF deblurring method  <cit.> based on deep learning does not make full use of the LF spatial and angular structure. Since the LFs are divided into multiple groups, the LF structure is destroyed. Different from them, the LFs are input as a whole in our method. Therefore, the restoration results of all views are obtained only by one calculation, which effectively maintains the LF structure. § MOTIVATION Inspired by stereo deblurring scenes <cit.>, we found there are two characteristics of blurred LFs, which are useful for the LF deblurring task. On one hand, the blur degree of the same object is different in different views. On the other hand, the blur degree of different objects with various depths is also different. Fig. <ref> is a schematic diagram of blurred LFs to explain the two characteristics. For convenience, we only show two cameras in Fig. <ref>, which can be easily extended to the case of LF. In Fig. <ref> (a), the building is on the same vertical line as one of the cameras and the light emitted from the building reaches the image plane after passing through the camera lens. We suppose the camera moves in a simple straight line along the Y-axis. As the two cameras move along the Y-axis, the position that the light of the building reaches on the left image plane x1 does not change, but on the right image plane, the position change from x3 to x2. For more complex rotational motion, this phenomenon will be more obvious. Therefore, the blur degree of the building in different views is different since the different relative motion between the different view cameras and the object. If we share the parameters of the convolution kernel for all views when designing the model, the model uses the same convolution kernel to deal with different blur degrees, which is unreasonable. Noting this, we design a novel view adaptive spatial convolution, which dynamically calculates the exclusive convolution kernel for each view without significantly increasing the parameters. The detail is introduced in Sec. <ref>. In Fig. <ref> (b), the person and the building have different depths. As the camera move along the X-axis, the position that the light of the building reaches on the image changes from x1 to x5, while the position that the light of the person reaches on the image changes from x4 to x1. As we can see from Fig. <ref> (b), x5-x1 is less than x1-x4, which means that when the camera moves, the blur degree of the objects with different depths is different. Generally, the blur degree of objects with a small depth is large, and the blur degree of objects with a large depth is small. To make full use of the LF angular information, we introduce the micro-lens image. In the micro-lens image, the sharp pixel we want to recover is mixed with other view pixels. For the different blur degrees brought by depth, the mixed range between the sharp pixel and other pixels is also different. If the blur degree of the sharp pixel is serious, the mixed range is large, otherwise, it is small. When restoring a sharp pixel, we should focus on the positions where the sharp pixel is mixed. Therefore, we design a depth perception view attention to find the area where the sharp pixels are mixed. Then the sharp images are restored pixel by pixel by fusing the corresponding weighted micro-lens image features. The detail is introduced in Sec. <ref>. § OUR METHOD The overview architecture of our proposed method is shown in Fig. <ref>. The blurred LFs are first fed into the View Adaptive Spatial Convolution (VASC) module, which dynamically calculates the exclusive convolution kernel for each view. After that, the sharp LFs can be reconstructed pixel by pixel through the Depth Perception View Attention (DPVA) module, which calculates different attention weights for objects with different depths to pick out the sharp pixel information in the corresponding micro-lens images. Besides, to maintain the consistency of LFs, the Angular Position Embedding (APE) module is introduced into DPVA module. §.§ View Adaptive Spatial Convolution As mentioned in Sec. <ref>, the blur degrees of the same object are different in different views. There are two intuitive ways to deal with it. 1) The model ignores the blur degrees difference of different views and shares the same convolution kernel for all views. 2) The model simply assigns a convolution kernel to each view. For the first way, if all views share the same convolution kernel, it is difficult for a model to perceive different blur degrees. The lack of the ability to perceive the blur degrees will lead the model to deal with the average blur degree of all views. For the second way, if simply assign a convolution kernel to each view when building the model, the number of model parameters will increase exponentially. For example, assuming that the parameter required to process one view is C_in× C_out× k × k, where C_in, C_out, and k denotes the number of input channels, the number of output channels, and the convolution kernel size, respectively. Therefore, the parameter required to process N_view views according to the above method is N_view× C_in× C_out× k × k. In order to enable the model to perceive the difference of blur degrees between different views without significantly increasing the number of parameters, VASC module is cleverly designed, which is shown in Fig. <ref>. Firstly, the blurred LFs L_B(u,v,x,y) are input into the VASC module in the form of SAIs. Then the exclusive convolution kernel for each view are generated. Take one view as an example, the SAI features are fed into one average pooling and two full connections to generate the corresponding view adaptive convolution kernel W_u,v∈ℝ^k× k. Then our method extracts the view adaptive spatial features based on spatial convolution by W_u,v. Finally, the all view adaptive features F_VA∈ℝ^U× V× X× Y× C are fused through angular convolution. F_VA(u,v,x,y) =H_VASC(L_B(u,v,x,y)). The number of VASC module is C_in× C_K + C_K× C_K +C_K× C_in× C_out× k × k, where C_K denotes the number of nodes in the two full connection layers. In this paper, C_K =4 < N_view=25, which denotes that our model has fewer parameters. For more details, please refer the codes in the supplementary materials. By using the plug and play VASC module iteratively, our model not only effectively perceives the difference of blur degrees in different views but also does not significantly increase the number of parameters. §.§ Depth Perception View Attention As mentioned in Sec. <ref>, the blur degree of objects with different depths in the same view is different. To make full use of the LF angular information, we introduce the micro-lens image, where the the sharp pixel we want to recover is mixed with other pixels from other views. Since the different blur degrees, the mixed range in micro-lens images is also different. Therefore, we designed the DPVA module to find the mixed area for the different blur degrees pixels and then pick out the sharp pixel information based on implicit depth information, which is shown in Fig. <ref>. Specifically, the view adaptive features F_VA from the VASC module are fed into two branches. In the lower branch, our method generates the view exclusive LF features F^ve_u,v∈ℝ^ X× Y× UVC for all views, through a 2D convolution layer that the output channel number is U× V times larger than the input channel number. In the upper branch, the view adaptive features F_VA are fed into another 2D convolution layer to change channel dimension from C to UV, then U× V depth perception features F^dp_u,v∈ℝ^X× Y× UV can be obtained. To maintain interaction between all views, we reorganize all depth perception features as F^ndp_u,v∈ℝ^X× Y× UV. Taking the (u,v) view as an example, the uv-th channel dimension of all depth perception features F^dp_u,v is connected as the feature F^ndp_u,v. To further maintain the consistency of LFs, the APE module is applied to the DPVA module to generate the depth perception features with angular position embedding F^adp_u,v, which is introduced in Sec. <ref>. After that, the F^adp_u,v are fed into several full connection layers to get Depth Perception View Attention Weight W^dp_u,v∈ℝ^ X× Y× UVC, which denotes the whether the position in the micro-lens image has information that needs to be restored. Then, the sharp features F^sharp_u,v∈ℝ^ X× Y× C can be obtained by the view exclusive LF features F^ve_u,v and the View Attention Weight W^dp_u,v: F^sharp_u,v(x,y,c) =∑_ûv̂F^ve_u,v(x,y,û*v̂*c)* W^dp_u,v(x,y,û*v̂*c). Finally, the sharp LFs L_S can be generated from the sharp features F^sharp through a 2D convolution. L_S(u,v,x,y) =H_DPVA(F_VA(u,v,x,y)). Our method takes the whole LFs as the input and uses and maintains the LF spatial and angular structure as much as possible. On the contrary, the past deep learning LF methods only input part of the LFs into the network at a time. They not only cannot make full use of the LF structure but also need multiple calculations to obtain the results of all views. §.§ Angular Position Embedding Without the angular position embedding, the model cannot know which view is being processed. The lack of positional embedding causes the model to tend to handle the average of all views, which destroys the LF structure. Therefore, the APE module is necessary for the DPVA module, which can be seen in Fig. <ref>. Since the angular dimension of the LFs is fixed when acquiring the LFs, we directly use the absolute position as position embedding. Taking the (u,v) view as an example, the angular coordinates (u,v) is concatenated with F^ndp_u,v to get F^adp_u,v∈ℝ^X× Y× (UV+2), which changes the channel dimension from U× V to U× V + 2. F^adp_u,v(x,y)=H_APE(F^ndp_u,v(x,y),(u,v)). § EXPERIMENTS In this section, we first introduce the dataset and training details. Then the proposed method is compared with other single image methods and LF methods on synthetic and real images quantitatively and qualitatively. Next, the ablation study is taken to prove the effectiveness of the designed modules. Finally, the limitation of our method is discussed. §.§ Training Details and Datasets §.§.§ Dataset. There are two main kinds of datasets (3-DOF and 6-DOF) in the LF deblurring task. In the 3-DOF dataset, the camera shifts in X, Y, and Z directions. Besides the 3-DOF motions, the camera rotates in X, Y, and Z directions in the 6-DOF dataset. In this paper, we trained models on 3-DOF and 6-DOF datasets separately, since the camera motions are different. We picked 200 LFs from Stanford Lytro  <cit.> as a 3-DOF training dataset and 40 LFs as a 3-DOF test dataset. The simulation method of blurred images is consistent with that of  <cit.>. Since <cit.> only published 40 images of 6-DOF datasets. We selected the 3 images used in <cit.> as the 6-DOF test dataset and others as the training dataset. §.§.§ Training Details. In this paper, we crop the training LFs into 5×5×64×64×3 patches. Image flipping and image rotation are applied as data augmentation. We use RGB images as input and output. The angular size of input and output are both 5×5. The number of VASC modules is 8. The proposed model is optimized using the Adam <cit.> algorithm with a batch size of 4. The initial learning rate is set as 1e-3 in the first 200 epochs and is then divided by 10 every 100 epochs. We implement the model with the PyTorch framework and the training process roughly takes 2 days for the 3-DOF dataset and 1 days for the 6-DOF dataset with 4 Intel(R) Xeon(R) CPU E5-2683 v3 @ 2.00GHz with a Titan XP GPU. §.§.§ Loss Function. Our method uses the L1 Loss as supervision: Loss_L1= L_S-L_gt_1, where L_gt denotes the ground truth. §.§ Quantitative Comparison We compared two single image methods DMPHN <cit.> and MPRNet <cit.> with excellent results in the field of single image deblurring. Although there are some deblurring methods based on LFs, most of them do not publish codes and datasets <cit.>. Fortunately, LFBMD <cit.> opened their codes so that we can easily compare with them. Since the LF super-resolution methods also explore the LF spatial and angular information, which is conducive to deblurring, we modify three LF super-resolution methods SAS <cit.>, InterNet <cit.>, and MEGNet <cit.> for LF deblurring task. Tab. <ref> is the quantitative results of 3-DOF and 6-DOF test datasets. The PSNR, SSIM, NCC, and LMSE are used for the evaluation index. The higher the values of PSNR, SSIM, and NCC denote the better results. LMSE is the opposite. Tab. <ref> shows our method is much better than other single image and LF methods in all evaluation indexes on 3-DOF test datasets. On the 6DOF test dataset, our method also achieved the best results on PSNR and LMSE, and other evaluation indexes also achieved comparable results. Because the single image methods DMPHN <cit.> and MPRNet <cit.> process each view alone, they cannot effectively use the angular information of the LFs, i.e., they cannot obtain complementary information from other views. On the contrary, our LF method takes the whole LFs as the input, which fully explores and makes use of the angular and spatial information, so it achieves a better restoration effect. For other LF methods LFBMD <cit.>, SAS <cit.>, InterNet <cit.>, and MEGNet <cit.>, they also use the angular information of LFs, but they do not consider that the blur degree is affected by the views and depth, so they cannot perceive the difference of views and depth well. Different from them, our method designs the VASC module and DPVA module to deal with the different blur degrees in different views and depths, which makes our method more effective. Tab. <ref> shows the average time of processing a 5 × 5 × 500 × 336 LFs by various methods and the parameters of various models. For the single image methods DMPHN <cit.> and MPRNet <cit.>, time is the sum of all views. LFBMD <cit.> is a traditional method that the parameter is not displayed. LFBMD <cit.> needs to predict the motion trajectory of the camera first and needs a complex optimization process, so it is very time-consuming to process an LF, which greatly limits the application scenarios. The time consumption of LF methods based on deep learning is similar to that of single image methods. However, the parameters of the LF methods are much smaller than those based on single image. Specifically, the parameters of our method are 30 times less than MPRNet <cit.> and 33 times less than DMPHN <cit.>. §.§ Qualitative Comparison Fig. <ref> is the qualitative comparison with single image methods. We show the result of the central view and enlarge some areas to make the comparison more obvious. In Fig. <ref>, our results are more clear than the results of the single image methods, and the details are better preserved. To better show the performance of various methods for maintaining the LF structure, we introduce the Epipolar Plane Images (EPIs). In EPIs, the slope of the line segment represents the disparity between two adjacent views. If the LF structure is maintained well, the line segment will not bend or break. Since the single image methods process each view separately, there are bending and fracture in the EPIs of the single image methods in Fig. <ref>. On the contrary, our method takes the LFs as a whole and introduce the APE module to embed angular position, the line segment in our EPIs is a straight line, which fully proves that our method can maintain the structural consistency of LFs. Fig. <ref> is the qualitative comparison with LF methods on the test dataset. Fig. <ref> shows that the result of LFBMD is still blurred and is easy to cause color deviation. This is because LFBMD needs to manually set multiple hyperparameters, which limits the application scenario. When the scene becomes complex, the setting of hyperparameters will not be accurate enough, which will easily lead to the deterioration. Different from it, the LF methods based on deep learning do not need to set complex hyperparameters, since they learn automatically from a large amount of data. Because these LF methods SAS <cit.>, InterNet <cit.>, and MEGNet <cit.> are not specially designed for deblurring tasks, they cannot perceive the different blur degrees in different views and depths. Compared with our methods, the results of these methods have some obvious artifacts, which can be seen in the enlarged image. Fig. <ref> is the qualitative comparison of real scenes. Since there is no published real LF blur dataset, we use a Lytro Illum LF camera to obtain the real blur scene for visual comparison. Our results are sharper than the single image methods, which shows our method is more robust in real scenes. §.§ Ablation Study To verify the effectiveness of our method, we did some ablation studies on the 3-DOF test dataset. To ensure the fairness of the ablation study, we keep the parameters of the models almost the same. The experimental results are shown in Tab <ref>. First, we replace the VASC module with the ordinary convolution (w/o VASC) which is shared by all views. The significant decline in the evaluation indexes shows that ordinary convolution cannot learn the prior knowledge that the blur degree of different views is different. On the contrary, the VASC module calculates an exclusive convolution kernel for each view effectively. Then the DPVA module is removed completely (w/o DPVA) to verify it can generate the different view attention weights for regions with different depths. The experimental results in Tab. <ref> show that the DPVA module improves the performance by fusing the angular information in the micro-lens image. Without the APE module (w/o APE), the performance decreases significantly. This is because the APE module helps to maintain the LF structural consistency. Besides, if there is no APE module, the DPVA module cannot realize what information needs to obtain from the micro-lens image for the specific view, which explains why the performance without APE module is worse than that without DPVA module. Fig. <ref> shows the error map of ablation study. We can see that no matter VASC module, DPVA module, or APE module is missing, there will be more error areas, which shows the effectiveness of the structure we designed again. Our method fully explores the LF blur characteristics by the VASC and DPVA module. Therefore, our results are sharper and the details are restored more perfectly. §.§ Limitation Fig. <ref> is a failure case of all single image and LF methods. In this scene, blur is very serious in all views. Our LF method cannot effectively obtain useful information from other views to restore the sharp image. Therefore, the ability of deblurring degenerates to the single image deblurring methods. Nevertheless, the detail of our result is still better than the single image methods, especially the restoration of trunk texture. § CONCLUSIONS In this paper, we proposed a novel LF deblurring method based on deep learning. First, the VASC module is designed to effectively deal with different blur degrees in different views by calculating an exclusive convolution kernel for each view. Besides, we designed a DPVA module to deal with the different blur degrees in different depths. Through this module, the sharp results are recovered by the weighted micro-lens image based on implicit depth information. Furthermore, the APE module is also applied to maintain the overall consistency of the LFs. Our LF method takes the whole LFs as a whole and utilizes the complementary angular information, which makes it to better maintain the structural consistency of the LFs than the single image methods. Quantitative and qualitative experimental results show that our method is much better than other single image and LF deblurring methods. ACM-Reference-Format
http://arxiv.org/abs/2303.06989v1
20230313104341
Fabrication of Nb and MoGe SQUID-on-tip probes by magnetron sputtering
[ "G. Romagnoli", "E. Marchiori", "K. Bagani", "M. Poggio" ]
cond-mat.supr-con
[ "cond-mat.supr-con", "cond-mat.mes-hall" ]
We demonstrate the fabrication of scanning superconducting quantum interference devices (SQUIDs) on the apex of sharp quartz scanning probes – known as SQUID-on-tip probes – using conventional magnetron sputtering. We produce and characterize SQUID-on-tips made of both Nb and MoGe with effective diameters ranging from 50 to 80 nm, magnetic flux noise down to 300Φ_0/√(), and operating fields as high as 2.5. Compared to the SQUID-on-tip fabrication techniques used until now, including thermal evaporation and collimated sputtering, this simplified method facilitates experimentation with different materials, potentially expanding the functionality and operating conditions of these sensitive nanometer-scale scanning probes. Department of Physics, University of Basel, 4056 Basel, Switzerland Department of Physics, University of Basel, 4056 Basel, Switzerland Department of Physics, University of Basel, 4056 Basel, Switzerland Department of Physics, University of Basel, 4056 Basel, Switzerland Swiss Nanoscience Institute, University of Basel, 4056 Basel, Switzerland martino.poggio@unibas.ch Fabrication of Nb and MoGe SQUID-on-tip probes by magnetron sputtering M. Poggio March 30, 2023 ====================================================================== Scanning superconducting quantum interference device (SQUID) microscopy (SSM) is among the most sensitive and least invasive methods for imaging subtle magnetic field patterns near a sample surface <cit.>. In recent years, SSM has been used to study microscopic properties of superconducting devices <cit.>, nanomagnets <cit.>, magnetic oxides <cit.>, two-dimensional materials <cit.>, quantum wells <cit.>, and topological states matter <cit.>. In general, in order to allow for both high spatial resolution and high sensitivity magnetic imaging, the probe must be miniaturized and brought as close to the sample as possible, while retaining high flux sensitivity. A number of strategies for realizing such SSM probes exist, including techniques based on planar lithography <cit.>, focused ion beam patterning of a cantilever coated with a superconducting film <cit.>, and self-aligned deposition on a quartz pipette <cit.>. The latter technique, used to produce a so-called SQUID-on-tip, combines the smallest SQUID sensors, down to 39nm in diameter, with the highest magnetic flux sensitivity <cit.>. In addition, they have been demonstrated to operate under magnetic fields up to 5 <cit.> and are excellent probes of local dissipation, due to the exquisite temperature sensitivity of the SQUID's Josephson junctions (JJs) <cit.>. These probes were first fabricated in 2010 by thermally evaporating Al on the apex of a pulled quartz capillary according to a three-step self-aligned deposition method pioneered by Finkler et al. <cit.>. In 2014, Vasyukov et al. realized Pb devices with diameters of 46nm and flux noise of 50nΦ_0/√() <cit.>. The fabrication process relies on directional vapor deposition techniques, such as thermal or electron beam evaporation. Because of fractionation, this type of evaporation is unsuitable for depositing alloys, limiting the resulting SQUID-on-tip probes to the elemental superconductors. Despite the excellent properties of such SQUID-on-tip probes, most consist of a thin superconducting film of, e.g., Pb, In, or Sn, which rapidly oxidizes under ambient conditions <cit.>. This reactivity complicates the mounting, handling, and storage of these probes, making them difficult to use and limiting their widespread adoption. In addition, the high surface mobility of these materials requires cryogenic cooling of the pulled capillary during thermal evaporation in order to limit island formation. SQUID-on-tip probes made of ambient-stable Nb have been fabricated using electron beam evaporation by Vasyukov et al. <cit.> without cryogenic cooling of the capillary. In this process, an additional aluminum oxide buffer layer was deposited on the quartz capillary to prevent contamination of the Nb film. Although these probes are more robust than SQUID-on-tip probes of other elemental superconductors, the evaporated Nb devices exhibit significantly higher magnetic flux noise of 3.6Φ_0/√(). In 2019, Bagani et al. demonstrated a SQUID-on-tip made of a superconducting alloy, MoRe, using a fabrication technique based on collimated magnetron sputtering <cit.>. Magnetron sputtering allows for the high-quality deposition of a wide range of superconducting materials beyond elemental superconductors, including alloys and multilayer structures. To impose directionality on the typically isotropic deposition of conventional magnetron sputtering, the sputtering source is enclosed in a small chamber equipped with a narrow slit. Ar gas is introduced into the small chamber, while the main chamber is kept in an ultrahigh-vacuum (UHV). Sputtered material, along with Ar gas, is forced through the narrow slit due to the pressure difference, resulting in collimated deposition. Although collimation is achieved, a large sputtering rate is required in the small chamber to achieve a useful flux of material from the slit. After just a few depositions, this large rate can lead to electrical shorting of the sputtering source, due to material flaking. As a result, regular opening and cleaning of the small chamber is required, which is detrimental to the achievable vacuum and, ultimately, the quality of the deposited film. Here, we demonstrate the fabrication of SQUID-on-tip probes via a simplified magnetron sputtering process, which does not require an additional collimation chamber. Rather, directional deposition is achieved via an appropriately designed tip holder. This solution reduces the required opening of the sputtering chamber, substantially improves film quality, and allows for the exploration of superconducting materials for SQUID-on-tip fabrication. We demonstrate the process by fabricating Nb and MoGe SQUID-on-tip probes, which are less than 100 in diameter, have magnetic flux noise down to 300Φ_0/√(), and operate in fields as high as 2.5. Both the Nb and MoGe probes are stable in ambient conditions, allowing for easy handling and mounting. We fabricate SQUID-on-tip probes by depositing a superconducting film onto pulled quartz capillaries. The capillaries, which have an outside diameter of 1 and an inside diameter of 0.4 (Friedrich & Dimmock Inc.), are designed with four grooves, which are equally spaced around the external circumference. Once pulled by a laser-puller (Sutter Instrument P-2000/G), the outer diameter of the sharp tip can be less than 100. As illustrated in Fig. <ref> (d), the grooves are preserved throughout the pulling process and help to define the pattern of the subsequently deposited superconducting film. Even though only two grooves are required for the two superconducting leads, four grooves help to preserve the capillary's circular geometry. Prior to superconducting film deposition, capillaries are mounted in an electron-beam evaporator, in which a horizontal Ti/Au (2/5) strip is deposited at a distance of 350 from the apex of each tip using a shadow mask. In a finished SQUID-on-tip, this metallic strip works as a resistive shunt of 4–10Ω bridging the two superconducting electrodes, suppressing undesirable hysteresis, and protecting the device from electrostatic discharge during handling. Next, each capillary is mounted in a dedicated UHV magnetron sputtering system with a in situ rotatable holder and two commercial sputtering sources (AJA A320). The main chamber is pumped out and baked to reach a base pressure of approximately 2d-9. During deposition, a continuous flow of 30sccm Ar gas is supplied to the main chamber, maintaining a constant pressure of 3.5d-3 with less than 70 of DC power required. In this work, the sputtering targets used are Nb (99.99%), Mo_0.79Ge_0.21 (99.95%), and Ti (99.95%). The rotatable capillary holder is located approximately 80 from the sputtering target surface and its shape, illustrated in Fig. <ref> (a)-(c), has a considerable impact on the coating process. The plasma generated during the sputtering process, also known as an electrically conducting fluid, bends towards protruding conducting surfaces due to the locally deformed electric potential. The 1 to 2 wide slots machined into the holder are designed to direct the sputtered material onto either one of the two sides or onto the tip of the capillary, depending on the holder's orientation with respect to the sputtering source. As illustrated in Fig. <ref> (a)-(b), in the first two depositions of the process, the holder is oriented such that the capillary is tilted ± 120 from the direction of the sputtering source; in this way, one of its sides is exposed to the plasma represented in purple. These two depositions form the leads of the SQUID. The third deposition, carried out with the tip of the capillary pointing at and exposed to the sputtering source, is shown in Fig. <ref> (c) and produces the SQUID loop at the apex of the capillary. In addition to exploiting the directional deposition imposed by the capillary holder, the grooved quartz capillaries favor the formation of a well-defined gap between the two superconducting leads <cit.>. Moreover, the grooves assist in the formation of the two narrow constrictions that form weak-link Josephson junctions – and therefore the SQUID – at the apex of the capillary. Using this process, we fabricate both Nb and MoGe SQUID-on-tip probes, which are realized by depositing 25–30 and 35–40 of material at a rate of 3/ in each of the three deposition steps, respectively. The Nb devices also include a 3 base layer of Ti to avoid contamination from the quartz capillary, as well as a 3 capping layer to protect from oxidation. A resulting Nb SQUID-on-tip probe is shown in a scanning electron micrograph (SEM) in Fig. <ref> (e), with a geometrical diameter of 55. The current-voltage characteristics of Nb and MoGe SQUID-on-tip probes are measured at 4.2 and shown in Fig. <ref> at different magnetic fields applied along the probe axis. The electrical circuit used for characterization, illustrated in the inset of Fig. <ref> (b), consists of a voltage source in series with a large bias resistor of 6.1Ω, providing a bias current I_bias = V_b/R_b. A small shunt resistance R_s=3Ω≪ R_b provides an effective bias voltage to the SQUID-on-tip. R_p quantifies the parasitic resistance of the wires and contacts, while R_sh is the resistance of the Ti/Au shunt bridging the superconducting electrodes close to the apex of the tip. The current through the SQUID-on-tip, I_SOT, is measured using a cryogenic SQUID series array amplifier (Magnicon), and the voltage across the SQUID-on-tip, V_SOT, is obtained from V_b according to the electronic circuit. In Fig. <ref>(a) and (b), plots of the current as a function of the voltage across the Nb and MoGe SQUID-on-tip probes show the amplitude of the critical current at different applied fields. The current increases until its critical point where the SQUID switches to a non-zero voltage state. For non-hysteretic probe characteristics, i.e. overdamped behavior, the Stewart-McCumber parameter β_c=2π I_cR^2C/Φ_0 has to be less than unity, where I_c is the critical current, R is the normal state resistance, C the self-capacitance of the JJ, and Φ_0 is the flux quantum. We estimate β_c by determining the retrapping current, which we measure by decreasing the applied bias current from the normal state back to the superconducting state. Both probes show slightly overdamped behavior with β_c^Nb≈ 0.93 and β_c^MoGe≈ 0.87, with a critical current I_c of 70 and 48 at zero applied field, respectively. Fig. <ref>(c) and (d) show the quantum interference patterns of the Nb and MoGe SQUID-on-tip probes. From the magnetic-field periodicity of the modulation patterns, we calculate effective SQUID diameters of d=2√(Φ_0/πΔ B) = 48 and 74, for the Nb and MoGe devices, respectively. From these patterns, we also calculate the magnetic response ∂ I_SOT/∂ B of both SQUID-on-tip as a function of bias current I_bias and applied magnetic field B, shown in Fig <ref> (e) and (f). The Nb interference pattern shows a sinusoidal shape and a large modulation depth of I_c(B), resulting in a large magnetic response over a wide field range. The MoGe pattern is less ideal, showing a smaller modulation depth of I_c(B) and consequently a smaller magnetic response, because of the high kinetic inductance of the MoGe film. For optimal SQUID characteristics, the screening parameter β_L=2LI_c/Φ_0 must be close to unity, where L is the inductance of the SQUID loop. Assuming symmetric JJs, we estimate from the modulation of I_c the screening parameter β_L for Nb and MoGe SQUID-on-tips: β_L^Nb≈ 0.66 and β_L^MoGe≈ 2.75. The SQUID loop inductance L=L_g+L_K comprises the geometrical inductance L_g of the SQUID loop and the kinetic inductance L_K. Due to the small loop size, the geometrical contribution can be neglected, while the kinetic contribution depends mostly on the material properties and film thickness. Improving the magnetic response of the MoGe SQUID-on-tip probe would require a superior film quality, potentially realized by annealing the device, which can reduce its kinetic inductance and therefore increase the modulation depth of I_c(B). The high magnetic response even at large applied magnetic fields of  2 distinguishes these probes from planar scanning SQUID probes <cit.>, making them particularly useful for measuring high-field condensed matter phenomena. The geometry of the SQUID-on-tip allows operation in large applied fields, due to the mostly in-plane field experienced by the superconducting leads <cit.>. The Nb SQUID-on-tip presents an extended operation range of 2.5 in comparison to previously reported Nb SQUID-on-tip of 1 range <cit.>. The thin Ti base and capping layers likely lead to the formation of a NbTi alloy, which contributes to a larger H_c2 than expected from a pure Nb thin film. MoGe SQUID-on-tip shows persistent oscillations with a good magnetic response up to 2 and reduced response from there up to 3. The asymmetry in the magnetic response in positive and negative applied fields is due to two weak-link Josephson junctions of slightly different sizes. The MoGe SQUID-on-tip presents a higher magnetic response than the previously reported annealed MoRe SQUID-on-tip of similar loop size <cit.>, however, with reduced applied field operation range. The magnetic flux and field spectral densities of a Nb SQUID-on-tip with effective diameter of 48 are shown in Fig. <ref>(a). They are determined at fixed V_b and at the indicated magnetic fields by measuring the current noise of the probe and taking into account the magnetic response shown in Fig. <ref>(e), as well as the effective SQUID loop area for the flux noise. At lower frequencies the spectrum is dominated by 1/f-noise. In the white noise regime above 10, the magnetic field noise reaches a minimum value of S_B^1/2= 340/√(), which corresponds to a magnetic flux noise of S_Φ^1/2=S_B^1/2(π r^2)= 300Φ_0/√() in low fields. This value is one order of magnitude better than the one previously reported for a Nb SQUID-on-tip <cit.>, likely due to the improved quality of the sputtered versus the evaporated film. At high applied magnetic fields, there is a slight decrease in performance with S_Φ^1/2= 600Φ_0/√(). For some nanometer-scale imaging applications, such as the mapping of defect spins or of weakly magnetic samples, it is important to quantify the spin sensitivity of the probes. In the case of a spin in the center of the SQUID loop oriented perpendicular to it, the spin noise is estimated by S_n^1/2=S_Φ^1/2r/r_e, where r_e is the classical electronic radius <cit.>. From the spectral density of the spin noise, we obtain the limit for spin sensitivity: for the Nb SQUID-on-tip, a base value of S_n^1/2= 2.7μ_B/√() is measured in low fields and 6.6μ_B/√() in higher fields. The spectral density of the 74 MoGe SQUID-on-tip in Fig <ref>(b) shows a magnetic field noise of S_B^1/2= 800/√(), corresponding to a magnetic flux noise of S_Φ^1/2= 1.6Φ_0/√() in low applied field, and 3Φ_0/√() in higher fields. The spin noise for MoGe is found to be from S_n^1/2= 20 to 35μ_B/√(), which is comparable to the values reported for the annealed MoRe SQUID-on-tip <cit.>. We demonstrate a simplified fabrication of SQUID-on-tip probes made of elemental and composite materials, including multilayered structures, using magnetron sputtering deposition. The technique, which relies on a specially designed deposition holder and grooved capillaries, enabled the fabrication of a Nb SQUID-on-tip with sub-100-nm loop size, improved magnetic flux sensitivity of 300Φ_0/√(), and critical field up to over 2.5 (H_c2), likely due to the Ti base and cap layers. The fabricated devices are robust to ambient conditions, which make them easy to handle and mount. The technique should ease the fabrication of SQUID-on-tip devices from a variety of superconducting alloys and multilayers extending the critical temperature and field capabilities of these probes and facilitating their application to nanometer-scale magnetic and thermal imaging. We thank Sascha Martin and his team in the machine workshop of the Physics Department at the University of Basel. We acknowledge the support of the Canton Aargau; the Swiss National Science Foundation via Project Grant No. 200020-159893 and Sinergia Grant Nanoskyrmionics (Grant No. CRSII5-171003); the European Commission under H2020 FETOpengrant "FIBsuperProbes" (Grant No. 892427); and the University of Basel via Universität Basel Forschungsfonds (Project No. 4637580). The authors have no conflicts to disclose. The data that support the findings of this study are available from the corresponding author upon reasonable request. 20 fxundefined [1] ifx#1 fnum [1] #1firstoftwo secondoftwo fx [1] #1firstoftwo secondoftwo noop [0]secondoftwo ref[1]@startlink#1@href href[1]#1@endlink anitize@url [0]` 12`$12`&12`#12`1̂2`_12`%12 startlink[1] endlink[0] rl [1]href #1 @bib@innerbibempty [Marchiori et al.(2022)Marchiori, Ceccarelli, Rossi, Lorenzelli, Degen, and Poggio]marchiori_nanoscale_2022 author author E. Marchiori, author L. Ceccarelli, author N. Rossi, author L. Lorenzelli, author C. L. Degen, and author M. Poggio, title title Nanoscale magnetic field imaging for 2D materials, https://doi.org/10.1038/s42254-021-00380-9 journal journal Nature Reviews Physics volume 4, pages 49–60 (year 2022)NoStop [Embon et al.(2015)Embon, Anahory, Suhov, Halbertal, Cuppens, Yakovenko, Uri, Myasoedov, Rappaport, Huber, Gurevich, and Zeldov]embon_Pinning_2015 author author L. Embon, author Y. Anahory, author A. Suhov, author D. Halbertal, author J. Cuppens, author A. Yakovenko, author A. Uri, author Y. Myasoedov, author M. L. Rappaport, author M. E. Huber, author A. Gurevich, and author E. Zeldov, title title Probing dynamics and pinning of single vortices in superconductors at nanometer scales, https://doi.org/10.1038/srep07598 journal journal Scientific Reports volume 5, pages 7598 (year 2015)NoStop [Ceccarelli et al.(2019)Ceccarelli, Vasyukov, Wyss, Romagnoli, Rossi, Moser, and Poggio]ceccarelli_imaging_2019 author author L. Ceccarelli, author D. Vasyukov, author M. Wyss, author G. Romagnoli, author N. Rossi, author L. Moser, and author M. Poggio, title title Imaging pinning and expulsion of individual superconducting vortices in amorphous MoSi thin films, https://doi.org/10.1103/PhysRevB.100.104504 journal journal Physical Review B volume 100, pages 104504 (year 2019)NoStop [Vasyukov et al.(2018)Vasyukov, Ceccarelli, Wyss, Gross, Schwarb, Mehlin, Rossi, Tütüncüoglu, Heimbach, Zamani, Kovács, Fontcuberta i Morral, Grundler, and Poggio]vasyukov_nanotube_2018 author author D. Vasyukov, author L. Ceccarelli, author M. Wyss, author B. Gross, author A. Schwarb, author A. Mehlin, author N. Rossi, author G. Tütüncüoglu, author F. Heimbach, author R. R. Zamani, author A. Kovács, author A. Fontcuberta i Morral, author D. Grundler, and author M. Poggio, title title Imaging stray magnetic field of individual ferromagnetic nanotubes, https://doi.org/10.1021/acs.nanolett.7b04386 journal journal Nano Letters volume 18, pages 964–970 (year 2018)NoStop [Persky and Kalisky(2018)]persky_oxide_2018 author author E. Persky and author B. Kalisky, title title Scanning SQUID view of oxide interfaces, https://doi.org/10.1002/adma.201706653 journal journal Advanced Materials volume 30, pages 1706653 (year 2018)NoStop [Uri et al.(2020a)Uri, Grover, Cao, Crosse, Bagani, Rodan-Legrain, Myasoedov, Watanabe, Taniguchi, Moon, Koshino, Jarillo-Herrero, and Zeldov]uriMappingTwist2020 author author A. Uri, author S. Grover, author Y. Cao, author J. A. Crosse, author K. Bagani, author D. Rodan-Legrain, author Y. Myasoedov, author K. Watanabe, author T. Taniguchi, author P. Moon, author M. Koshino, author P. Jarillo-Herrero, and author E. Zeldov, title title Mapping the twist-angle disorder and Landau levels in magic-angle graphene, https://doi.org/10.1038/s41586-020-2255-3 journal journal Nature volume 581, pages 47–52 (year 2020a)NoStop [Tschirhart et al.(2021)Tschirhart, Serlin, Polshyn, Shragai, Xia, Zhu, Zhang, Watanabe, Taniguchi, Huber, and Young]tschirhartImagingOrbitalFerromag2021 author author C. L. Tschirhart, author M. Serlin, author H. Polshyn, author A. Shragai, author Z. Xia, author J. Zhu, author Y. Zhang, author K. Watanabe, author T. Taniguchi, author M. E. Huber, and author A. F. Young, title title Imaging orbital ferromagnetism in a moiré Chern insulator, https://doi.org/10.1126/science.abd3190 journal journal Science volume 372, pages 1323–1327 (year 2021)NoStop [Spanton et al.(2014)Spanton, Nowack, Du, Sullivan, Du, and Moler]spanton_EdgeCurrent_2014 author author E. M. Spanton, author K. C. Nowack, author L. Du, author G. Sullivan, author R.-R. Du, and author K. A. Moler, title title Images of edge current in InAs/GaSb quantum wells, https://doi.org/10.1103/PhysRevLett.113.026804 journal journal Physical Review Letters volume 113, pages 026804 (year 2014)NoStop [Nowack et al.(2013)Nowack, Spanton, Baenninger, König, Kirtley, Kalisky, Ames, Leubner, Brüne, Buhmann, Molenkamp, Goldhaber-Gordon, and Moler]nowackImagingCurrentsHgTe2013 author author K. C. Nowack, author E. M. Spanton, author M. Baenninger, author M. König, author J. R. Kirtley, author B. Kalisky, author C. Ames, author P. Leubner, author C. Brüne, author H. Buhmann, author L. W. Molenkamp, author D. Goldhaber-Gordon, and author K. A. Moler, title title Imaging currents in HgTe quantum wells in the quantum spin Hall regime, https://doi.org/10.1038/nmat3682 journal journal Nature Materials volume 12, pages 787–791 (year 2013)NoStop [Uri et al.(2020b)Uri, Kim, Bagani, Lewandowski, Grover, Auerbach, Lachman, Myasoedov, Taniguchi, Watanabe, Smet, and Zeldov]uri_quantumHall_2020 author author A. Uri, author Y. Kim, author K. Bagani, author C. K. Lewandowski, author S. Grover, author N. Auerbach, author E. O. Lachman, author Y. Myasoedov, author T. Taniguchi, author K. Watanabe, author J. Smet, and author E. Zeldov, title title Nanoscale imaging of equilibrium quantum Hall edge currents and of the magnetic monopole response in graphene, https://doi.org/10.1038/s41567-019-0713-3 journal journal Nature Physics volume 16, pages 164–170 (year 2020b)NoStop [Kirtley et al.(2016)Kirtley, Paulius, Rosenberg, Palmstrom, Holland, Spanton, Schiessl, Jermain, Gibbons, Fung, Huber, Ralph, Ketchen, Gibson, and Moler]Kirtley_2016 author author J. R. Kirtley, author L. Paulius, author A. J. Rosenberg, author J. C. Palmstrom, author C. M. Holland, author E. M. Spanton, author D. Schiessl, author C. L. Jermain, author J. Gibbons, author Y.-K.-K. Fung, author M. E. Huber, author D. C. Ralph, author M. B. Ketchen, author G. W. Gibson, and author K. A. Moler, title title Scanning SQUID susceptometers with sub-micron spatial resolution, https://doi.org/10.1063/1.4961982 journal journal Review of Scientific Instruments volume 87, pages 093702 (year 2016)NoStop [Wyss et al.(2022)Wyss, Bagani, Jetter, Marchiori, Vervelaki, Gross, Ridderbos, Gliga, Schönenberger, and Poggio]wyss_magnetic_2021 author author M. Wyss, author K. Bagani, author D. Jetter, author E. Marchiori, author A. Vervelaki, author B. Gross, author J. Ridderbos, author S. Gliga, author C. Schönenberger, and author M. Poggio, title title Magnetic, thermal, and topographic imaging with a nanometer-scale SQUID-on-lever scanning probe, https://doi.org/10.1103/PhysRevApplied.17.034002 journal journal Physical Review Applied volume 17, pages 034002 (year 2022)NoStop [Finkler et al.(2010)Finkler, Segev, Myasoedov, Rappaport, Ne'eman, Vasyukov, Zeldov, Huber, Martin, and Yacoby]finkler_self-aligned_2010 author author A. Finkler, author Y. Segev, author Y. Myasoedov, author M. L. Rappaport, author L. Ne'eman, author D. Vasyukov, author E. Zeldov, author M. E. Huber, author J. Martin, and author A. Yacoby, title title Self-aligned nanoscale SQUID on a tip, https://doi.org/10.1021/nl100009r journal journal Nano Letters volume 10, pages 1046–1049 (year 2010)NoStop [Anahory et al.(2020)Anahory, Naren, Lachman, Sinai, Uri, Embon, Yaakobi, Myasoedov, Huber, Klajn, and Zeldov]anahory_squid–tip_2020 author author Y. Anahory, author H. R. Naren, author E. O. Lachman, author S. B. Sinai, author A. Uri, author L. Embon, author E. Yaakobi, author Y. Myasoedov, author M. E. Huber, author R. Klajn, and author E. Zeldov, title title SQUID-on-tip with single-electron spin sensitivity for high-field and ultra-low temperature nanomagnetic imaging, https://doi.org/10.1039/C9NR08578E journal journal Nanoscale volume 12, pages 3174–3182 (year 2020)NoStop [Bagani et al.(2019)Bagani, Sarkar, Uri, Rappaport, Huber, Zeldov, and Myasoedov]bagani_sputtered_2019 author author K. Bagani, author J. Sarkar, author A. Uri, author M. L. Rappaport, author M. E. Huber, author E. Zeldov, and author Y. Myasoedov, title title Sputtered Mo_66Re_34 SQUID-on-tip for high-field magnetic and thermal nanoimaging, https://doi.org/10.1103/PhysRevApplied.12.044062 journal journal Physical Review Applied volume 12, pages 044062 (year 2019)NoStop [Halbertal et al.(2016)Halbertal, Cuppens, Shalom, Embon, Shadmi, Anahory, Naren, Sarkar, Uri, Ronen, Myasoedov, Levitov, Joselevich, Geim, and Zeldov]halbertal_nanoscale_2016 author author D. Halbertal, author J. Cuppens, author M. B. Shalom, author L. Embon, author N. Shadmi, author Y. Anahory, author H. R. Naren, author J. Sarkar, author A. Uri, author Y. Ronen, author Y. Myasoedov, author L. S. Levitov, author E. Joselevich, author A. K. Geim, and author E. Zeldov, title title Nanoscale thermal imaging of dissipation in quantum systems, https://doi.org/10.1038/nature19843 journal journal Nature volume 539, pages 407–410 (year 2016)NoStop [Vasyukov et al.(2013)Vasyukov, Anahory, Embon, Halbertal, Cuppens, Neeman, Finkler, Segev, Myasoedov, Rappaport, Huber, and Zeldov]vasyukov_scanning_2013 author author D. Vasyukov, author Y. Anahory, author L. Embon, author D. Halbertal, author J. Cuppens, author L. Neeman, author A. Finkler, author Y. Segev, author Y. Myasoedov, author M. L. Rappaport, author M. E. Huber, and author E. Zeldov, title title A scanning superconducting quantum interference device with single electron spin sensitivity, https://doi.org/10.1038/nnano.2013.169 journal journal Nature Nanotechnology volume 8, pages 639–644 (year 2013)NoStop [Lam, Clem, and Yang(2011)]LamNanoscaleSQUIDOperating2011 author author S. K. H. Lam, author J. R. Clem, and author W. Yang, title title A nanoscale SQUID operating at high magnetic fields, https://doi.org/10.1088/0957-4484/22/45/455501 journal journal Nanotechnology volume 22, pages 455501 (year 2011)NoStop [Chen et al.(2010)Chen, Wernsdorfer, Lampropoulos, Christou, and Chiorescu]chenOnchipSQUIDhighfields2010 author author L. Chen, author W. Wernsdorfer, author C. Lampropoulos, author G. Christou, and author I. Chiorescu, title title On-chip SQUID measurements in the presence of high magnetic fields, https://doi.org/10.1088/0957-4484/21/40/405504 journal journal Nanotechnology volume 21, pages 405504 (year 2010)NoStop [Ketchen et al.(1989)Ketchen, Awschalom, Gallagher, Kleinsasser, Sandstrom, Rozen, and Bumble]Ketchen_1989 author author M. Ketchen, author D. Awschalom, author W. Gallagher, author A. Kleinsasser, author R. Sandstrom, author J. Rozen, and author B. Bumble, title title Design, fabrication, and performance of integrated miniature SQUID susceptometers, https://doi.org/10.1109/20.92513 journal journal IEEE Transactions on Magnetics volume 25, pages 1212–1215 (year 1989)NoStop
http://arxiv.org/abs/2303.12728v1
20230313063545
LocalEyenet: Deep Attention framework for Localization of Eyes
[ "Somsukla Maiti", "Akshansh Gupta" ]
cs.CV
[ "cs.CV", "cs.LG" ]
CSIR-Central Electronics Engineering Research Institute, Pilani, Rajasthan, India-333031 somsukla@ceeri.res.in, somsuklamaiti@gmail.com; akshanshgupta@ceeri.res.in Development of human machine interface has become a necessity for modern day machines to catalyze more autonomy and more efficiency. Gaze driven human intervention is an effective and convenient option for creating an interface to alleviate human errors. Facial landmark detection is very crucial for designing a robust gaze detection system. Regression based methods capacitate good spatial localization of the landmarks corresponding to different parts of the faces. But there are still scope of improvements which have been addressed by incorporating attention. In this paper, we have proposed a deep coarse-to-fine architecture called LocalEyenet for localization of only the eye regions that can be trained end-to-end. The model architecture, build on stacked hourglass backbone, learns the self-attention in feature maps which aids in preserving global as well as local spatial dependencies in face image. We have incorporated deep layer aggregation in each hourglass to minimize the loss of attention over the depth of architecture. Our model shows good generalization ability in cross-dataset evaluation and in real-time localization of eyes. Facial landmark detection Attention model Deep Learning Convolutional Neural Network Deep Layer Aggregation Human Machine Interaction Gaze Controlled Interface § INTRODUCTION Modern machines are user-friendly and keep the possibility of human machine interaction open. Human interaction provides an effective way of controlling the machine with ease and reduces the risk of error. Gaze driven human machine interfaces have become essential for smooth controlling of machine parts with no physical intervention. The need of gaze control has been addressed since the past two decades in assistive robotic systems <cit.> for disable persons and in controlling the robotic arms in robotic surgical system <cit.>. Tracking the eye gaze requires accurate localization of the facial landmarks. Face landmark detection has been playing a significant role in current human machine interface applications, such as gaze tracking for autonomous vehicles <cit.>, face tracking <cit.><cit.><cit.> and facial expression analysis <cit.><cit.>. Localization of landmark points on the face helps us in performing face alignment in an effective manner. While designing a robust Gaze controlled interface, it is mandatory to perform precise localization of eyes with high accuracy and low latency. Simultaneously, landmark detection methods are required to handle different real-time challenges, such as low lighting condition, face occlusion and fast movement of head that lead to variation in pose. Since past two decades, with the evolution of new methods in deep learning, there has been a significant improvement in developing more robust solutions. Convolutional neural networks (CNNs) have been widely used for facial landmark detection for different applications. Availability of large annotated face databases in different environmental conditions has made the task easier. Even with small dataset, different data augmentation techniques have been proved really efficient in providing better generalization to the solution. Coarse to fine regression type of architectures has shown the most prominent localization performance. These techniques learns the coarse features over a shape space at the shallow layers and subsequently learns the fine features at deeper layers <cit.> by cascading several deep CNN <cit.>. Cascaded hourglass and Unet architectures have been able to provide good generalization but still have some issues. The heatmap generated using most of these state of the art architectures do not compute the local attention after each layer. This affects the learning of correlation between features from the shallow layers and the deep layers. We here aim to provide a solution that solves the following issues by designing different modules. * We have defined a self-attention module between the individual hourglasss modules, which learns the local spatial attention and the global attention to estimate the precise location of the landmarks. * We have designed a deep layer aggregation module to learn the feature dependencies over the depth of architecture while parsing the features across network. * We have used differentiable Soft-argmax <cit.> <cit.> to make the framework an end-to-end trainable architecture to determine the coordinates (x,y) of each facial landmark from the attention heatmaps. § RELATED WORK Facial landmark detection and localization has been an active area of research for aligning faces. There have been three broad working techniques <cit.>, a. holistic techniques, b. Constrained Local Model (CLM) based techniques and c. regression-based techniques. Holistic models <cit.> generate appearance model of the face images by first building a shape model and then mapping the features in the shape model. Active appearance models <cit.> <cit.> have been one of the widely used holistic approach that computes and updates the shape and appearance coefficients and the parameters for affine transformations for detection of the facial landmarks. CLM based techniques generate global shape model and local appearance models for each landmark points <cit.>. Local appearance models help in minimizing the error due to variation in illumination and occlusion. Baltrusaitis et. al presented a Constrained Local Neural Field (CLNF) <cit.> that take care of the feature detection problem in wild scenario with less illumination and blurred faces. Recently Weighted Iterative Closest Point (ICP) based surface matching <cit.> and hierarchical filtering strategy <cit.> have been used to reduce the effect of noise in face registration. Researchers have recently proposed a semi-supervised method <cit.>, called self-calibrated pose attention network (SCPAN), that computes Boundary-Aware Landmark Intensity (BALI) fields corresponding to a boundary and the landmarks closest to the boundary. They have also extended their work by proposing an implicit multiorder correlating geometry-aware (IMCG) model <cit.> <cit.>, that uses spatial and channel correlations to attain the local as well as global features. On the other hand, the regression based techniques mainly focuses on learning a model that maps the facial landmarks on the images, in spite of developing global and local face models. The regression models can be mainly classified into two categories, viz. i. Cascaded regression techniques and ii. Coarse-to-fine techniques. §.§ Cascaded regression techniques Cascaded regression methods have been proved to be very efficient and it mainly relies on extracting features at each stage and optimizing the regression parameters for estimating the positions of facial landmarks. Most of the cascaded regression methods relies on hand-crafted features. Local binary features (LBF) <cit.> and Histogram of Oriented Gaussians (HoGs) have been the most used hand-crafted features that are used for the facial landmarks. In <cit.>, LBFs have been extracted using random forests and linear regression model is learned for each landmark position. However development of regression models based on dedicated feature extraction methods tend to make the solution more sensitive to the given data. Thus most of the time, it fails to provide a generalized solution in scenarios with varied illumination conditions, occlusions and varied poses. The current cascaded regression models aim to develop a deep cascaded end-to-end architecture to determine the landmark coordinates <cit.> <cit.> <cit.>. In <cit.>, the authors have developed a Deformable Transformer Landmark Detector (DTLD) model that preserves the local spatial structure of the face images and improves the localization accuracy. Lai et al.<cit.> have included recurrent neural network (RNN) modules to learn the dependency of the features generated by the cascaded CNN modules. Weng et al have developed a cascaded deep autoencoder network (CDAN) <cit.>, that learns the feature representation at the global and the local stages simultaneously in cascaded manner. §.§ Coarse-to-fine techniques Coarse-to-fine techniques have been immensely used by developing different deep learning architectures <cit.> <cit.> <cit.> <cit.> <cit.> for generating accurate prediction of the landmark points. Dapogny et al. has defined spatial softargmax <cit.> to generate landmark-specific attention. Kim et al developed an extended version of MTCNN model, called EMTCNN model <cit.> where they have dilated convolution and CoordConv to improve the localization accuracy. Several works has been performed, where facial recognition, head pose determination and other activities has been performed along with facial landmark detection. In such applications, shared CNN <cit.> have been developed that uses same set of feature maps and enables better representation learning. Hannane et al <cit.> learned a FLM topological model that performs divide-conquer search for different patches of the face using coarse to fine CNN techniques and subsequently refines the landmarks positions by using a shallow cascaded CNN regression. Gao has developed a supervised encoder-decoder architecture <cit.> based on EfficientNet-B0 where the dark knowledge extracted from teacher network is used to supervise the training of a small student network and patch similarity (PS) distillation is used learn the structural information of the face. For a given face, generated by a face detection technique, the regression model tries to estimate the position of the landmark points accurately. Thus researchers have also dedicated their time to solve the problem of face initialization. Lv et al. has developed a deep regression network with two-stage re-initialization <cit.> of faces at global and local scale to unify the different face bounding boxes obtained using different face detection methods. Heatmap regression methods generate coarse attention maps by developing a heatmap for each landmark position <cit.>. These methods <cit.> <cit.> <cit.> preserves the spatial features and thus provides better performance. UNet, Hourglass, Encoder-Decoder <cit.> <cit.> <cit.> are the most widely used fully convolutional networks for generating high resolution heatmaps. Stacked hourglass network <cit.><cit.> have a been popular architecture to generate accurate heatmaps that can also improve the localization in case of partial occlusions. Stacking of several hourglass models improves the spatial mapping of the features in subsequent hourglasses. Stacked U-Nets have been another very popular model where the features are extracted and then attention maps are generated by performing deconvolution. Stacked densely connected U-Nets have been developed in <cit.> that parses the global and local features across the U-Nets. Guo et al <cit.> has defined channel aggregation block (CAB) to improve the capacity of the stacked U-Net model in parsing the features across network. In <cit.> landmark-guided self attention (LGSA) block has been introduced that process the output feature map one hourglass to improve the spatial structure of the landmarks and sends it to the next hourglass. Xiong proposed a Gaussian vector <cit.> to encode landmark coordinates that provides a better convergence result. As the heatmap-based methods requires a post-processing step which is non-differentiable, Jin has defined a single-stage pixel-in-pixel regression <cit.> where for each heatmap a grid is detected on heatmap and then offsets are determined for precise localization of the landmarks. §.§ Attention models Prediction of the face landmark coordinates, using the regression techniques, generates a model that consider the locations of the landmarks. Attention methods have recently gained popularity due to the better performance in localization. The attention methods focuses on the most salient part of the face and thus reduces the unnecessary complexity due to the irrelevant parts of the image. Different attention models have been developed that define attention block that learns feature channel attention across the architecture, viz., squeeze-and-excitation block in <cit.>. Learning the spatial attention is very useful for facial landmark localization due to the structure of the face. Spatial attention block has been designed using non-local block in Grad-CAM <cit.> <cit.>. Woo <cit.> has designed CBAM that combines both spatial and channel attention. Wang has used non-local neural net <cit.> to learn self-attention that is most suitable due to the spatial geometry of face. Researchers have also used adversarial training methods <cit.> by introducing a discriminator module <cit.> to improve the performance by generating more accurate heatmaps, followed by a attention module that optimizes the spatial correlations <cit.> between the facial landmarks. § METHODOLOGY We aim to develop a gaze controlled human machine interface for controlling the navigation of robotic platform and thus the primary objective is to localize the eyes of user. Thus instead of detecting 68 landmark points, we have devised our problem to detect the landmarks present only in the eye region of the face. We have selected 12 landmark points out of the 68 point landmark annotations, with indices 37 to 48. Attention-driven facial landmark detection is usually performed by generating ground truth heatmap. We have generated 12 groundtruth heatmaps, each for a landmark position, corresponding to 6 landmarks for each eye, by applying a gaussian filter centered at each landmark position. Standard deviation of each gaussian filter is set at 5. We have proposed an attention based model for localization of the eye heatmaps and detection of the landmarks in the eye region. The architecture of the model has been discussed in the following section. §.§ Network Architecture We have proposed a deep attention model called LocalEyenet by using Stacked hourglass(HG) architecture as backbone for detection of the eye landmark positions. We have stacked 3 hourglass modules in a linear fashion as shown in Fig.<ref>. The hourglass architecture has been designed in such as way that it combines the coarse and fine features in an efficient manner over the depth of the model. In standard hourglass architecture, the lower layer features are combined with the higher layer features using residual blocks and upsampling. The residual blocks use a skip connection to pass the low level features to the deeper layers. This alleviates the problem of vanishing gradients and also retains features even after few layers of downsampling. But this also provides a shallow aggregation between the layers and does not retain overall information across the network. §.§.§ Deep Hourglass architecture The concept of layer aggregation has been incorporated by designing deep layer aggregation schematics such as Iterative Deep Aggregation (IDA) as proposed in <cit.>. We have adopted the concept and designed a Deep layer aggregation unit (DLAU) that maps the features in an iterative manner. Merging the features from all modules and channels makes the feature combination more appropriate and the loss of attention over depth is being reduced. The structure of the DLAU has been described in Fig. <ref>. For designing our model, we have replaced the residual blocks in the hourglass modules by DLAU. Depth-wise convolution of the deep layer features are concatenated with the shallow features. This provides a deep aggregation between the features and the correlation between features across the network is preserved in this manner. The architecture of each deep hourglass module has been shown in Fig. <ref>. The heatmaps generated by the LocalEyenet has been passed to the post-processing stage where the positions of the landmarks are estimated from the heatmaps. Argmax is the most commonly used mathematical tool that computes the positions of the landmarks by computing the locations with the highest probability in the attention heatmap. Since argmax is non-differentiable, we have used the softargmax <cit.> method which is a continuous function at each point and is thus differentiable. This allows us to train the network end to end and estimates the probability of the landmark positions on the attention heatmap in a single go. §.§.§ Attention between Hourglass modules The attention in feature maps, generated by intermediate hourglass modules, are computed and incorporated with the coarse predictions at each stage. This helps in understanding the spatial dependencies and correlation in images. We have adopted the concept of non-local neural network and modified it to compute the self-attention at each location of the feature map. The feature map F_i obtained from the deep hourglass module is passed through a residual block to let the spatial dependencies flow across layers. The updated feature map F_i^r is passed through a convolution layer with kernel size 1×1 and 12 filters, each for a landmark point, to obtain feature map F_i^rc. The convolved feature map F_i^rc is then passed though the softargmax operator to generate a coarse prediction of the attention map Map_i, as defined in Equation [<ref>], where W× H is the size of the attention map. The similarity between the initial prediction of attention heatmap and the residual feature map F_i^r is computed to rectify the attention heatmap by incorporating the spatial association by computing the element-wise dot product, as defined in Equation [<ref>]. Map_i =∑_x=1^W∑_y=1^Hx/Wy/Hexp(F_i^rc(x,y))/∑_k=1^W∑_l=1^Hexp(F_i^rc(k,l)) Map_i^1=Map_i⊙F_i^r The convolved feature map F_i^rc is passed through the self-attention module. The non-local neural network has been instantiated by defining embedded Gaussian at each pixel of the image in form ϕ(x_i)=W_ϕx_i, θ(x_j)=W_θx_j and g(x_i)=W_gx_i. The parameters W_ϕ, W_θ and W_g are learned through backpropagation. The spatial similarity between the embedded gaussians at each location is estimated by Equation [<ref>] . The similarity between the similarity map and the convolved feature map is computed by Equation [<ref>]. f(i,j)= e^ϕ(x_i) θ(x_j)^T S_i=softargmax(f)⊙ g The non-local operation is completed by applying a transform W on the self-attention map S_i. The residual connection F_i^rc is added to the non-local output to generate the local attention map S_i^' as defined in Equation [<ref>]. The updated feature map F_i^' is computed by adding the coarse prediction of the attention map Map_i, which incorporates the global attention that has been learned in the last hourglass module, to the attention map Att_i as defined in Equation [<ref>]. The architecture of the complete attention block is shown in Fig. <ref>. Att_i=WS_i+ F_i^rc F_i^' =Att_i +Map_i^1 §.§.§ Loss function To compute the performance of the deep modules, we have used softargmax operation to determine the coordinates (x,y) of facial landmarks from the attention heatmaps. The location with the highest value of softargmax are the most probable estimates of landmark positions. The deviation of the estimated landmark positions from the groundtruth locations is used to optimize the parameters of the model. Developed attention model aims to find local minima in the loss plot. Different loss function influences the optimized value of parameters and are computed using RMSprop optimization. We have used 3 different type of loss functions and compared the performance of the models. As the problem is devised as a regression problem, we have first optimized the mean square error (MSE) loss as defined in Equation [<ref>], where L=number of landmark points. The MSE loss is computed as normalized squared L2 norm of the error function d as defined in Equation [<ref>], where gt is the groundtruth vector and pr is the predicted values of the landmark points. d=gt-pr MSE=1/L∑_i=1^Ld_i^2 Presence of outliers increases the error and impairs the performance of the model. We have tried to minimize the risk of training the outliers, by learning the optimization of Huber loss, defined by Equation [<ref>] that computes the mean absolute error (MAE) for errors with significantly higher values. L_δ(d)= d^2/2, if | d|≤δ δ(| d|-δ/2), otherwise Recently, researchers have used <cit.><cit.> a loss function called wing loss that works well with the facial landmark detection. This loss compensates for large as well as small errors by defining a piece-wise linear and nonlinear loss function as defined in Equation [<ref>], where the constant C smoothly connects the nonlinear and linear function. Wing(d)= wln(1+| d|/ϵ), if | d|≤δ ( | d|-C) , otherwise C=w-wln(1+w/ϵ) The developed coarse-to-fine architectures models have been optimized using different loss functions and the performance have been discussed in the subsequent results section. § RESULTS AND DISCUSSION The faces are first detected and cropped for detection of facial landmarks. High resolution face images are downsampled and smaller images are upsampled to the size 256×256. The resized images are passed through developed deep learning framework. §.§ Dataset We have used 2 public domain datasets in this paper, 300W and 300VW. The results of the designed attention model architecture has been trained on the images from the 300W dataset and has been tested on both the datasets. §.§.§ 300W The 300W dataset <cit.> <cit.> <cit.> contains facial images captured in two environmental settings, namely indoor and outdoor conditions. This ensures the varied illumination conditions, large variation in expression, pose and occlusion that are being covered in the dataset formation. The dataset contains total 600 images with 300 in indoor and 300 in outdoor categories. Faces in the images are annotated using 68 landmark points using a semi-automatic methodology. The images with multiple number of faces have been annotated separately with different annotation files. §.§.§ 300VW The 300VW dataset <cit.><cit.><cit.> contains facial videos of 113 subjects recorded in wild scenarios at varied frame rate of 25-30 fps, where each video is around 1 minute long. All the frames have been annotated using 68 landmark points. The videos are recorded under three different scenarios such as well-lit conditions, different illumination conditions and completely unconstrained conditions including occlusions, make-up, expression, head pose, etc. We have extracted frames from the videos and cropped the faces from each frame. The faces has been reshaped later and the annotations have been updated accordingly as discussed in the data pre-processing section. §.§ Data Preprocessing The images are of different resolution and the face contains a small part of the image in most of the cases. Some of the images contain more than one faces and thus we cannot use the whole image for designing the architecture. Thus faces are cropped from the images and resized to the resolution 256×256. The landmark annotations are also scaled accordingly as defined in Equation [<ref>], where (x,y) are the coordinates of any landmark point and (x_new,y_new) are the coordinates of newly mapped location of the landmark and [h,w] and [h_new,w_new] are the height and width of the original image and resized image respectively. x_new = x*(w_new/w) y_new = y*(h_new/h) We aim to localize the eyes of the user for further gaze tracking operation. Thus we have selected only 12 landmark points that represent both the eyes on the faces. We initialize heatmaps for each landmark position by defining a Gaussian centered at each landmark with standard deviation of 5. Thus for each input image we generate 12 heatmaps, each centered at one of the 12 landmark points. §.§ Data Augmentation We have augmented the images by doing different mathematical operations such as horizontal flipping and rotation. We have also performed blurring on the face images to make a robust dataset for training. The landmark points of the horizontally flipped images are redefined in Equation [<ref>]. x_new = w_new-x y_new = y The cropped and resized faces have also been rotated by very small angle and the rotated faces have been added to the augmented dataset. The rotation angle has been selected as -5^∘, +5^∘, -10^∘ and +10^∘ and a rotated image has been generated in each category. The landmark points have been rescaled to the new coordinate system as defined in Equation [<ref>]. x_new = x cosθ+y sinθ +x_offset y_new = -x sinθ+y cosθ +y_offset We have used Gaussian filter of dimension 9×9 with standard deviation σ_x=σ_y=1.8 for generating blurred images. The filter is defined as Equation [<ref>]. f(x,y)=1/√(2πσ_xσ_y)exp^-(x^2+y^2)/2σ_xσ_y There are few images, generated after rotation, which are partially cropped, and this leads to the cropping of some landmark points. Thus these images have been manually checked and removed from the dataset. The generated augmented 300W dataset contains 4195 images in total, where the distribution of the images in each category is defined in Table [<ref>]. §.§ Evaluation We have developed a coarse-to-fine architecture incorporating attention and have evaluated the performance of the architecture in terms of Normalized Mean Error(NME) and Area under Curve(AUC). NME is defined in Equation [<ref>] where iod is the inter-ocular distance that is defined as L2 norm between the outer corners of eyes. NME=1/L∑_i=1^Lgt_i-pr_i _2/iod The AUC and failure rate (FR) is computed from the cumulative error distribution curve with threshold NME set at 0.05. The performance of the different architectures have been enlisted in Table [<ref>]. The attention heatmaps generated by different frameworks on sample images of 300W and 300VW have been shown in Fig. <ref>. The NME obtained for 300W and 300VW datasets evaluated using different models have been shown in Fig. <ref>. Three different losses, viz., MSE, huber and wing loss have been optimized for determination of optimum parameters for the developed deep learning framework. The performance of the models for 3 loss functions has been enlisted in Table [<ref>]. As we can visualize from the table, for most of the frameworks, including our architecture, the NME is minimum for MSE loss optimization. Huber loss also provides good generalization for Hourglass model, DenseUnet model and Stacked HG model with CAB<cit.>. NME obtained for wing loss optimization are comparatively quite high for almost all the models. Thus we have selected MSE loss for optimization of the model parameters. Evaluation of NME for different loss functions on 300W dataset Methodology 3cMSE loss 3|cHuber loss 3|cWing loss 2-10 NME AUC FR NME AUC FR NME AUC FR Hourglass model 0.0878 0.1672 0.5983 0.0577 0.2786 0.4233 8.8091 0 1 Unet model 0.0167 0.8825 0.0167 0.3047 0.0015 0.9817 9.7909 0 1 DenseUnet model 0.5901 0 1 0.5120 0 1 9.7909 0 1 Stacked Unet model 0.0187 0.6371 0.0467 0.0187 0.6370 0.0469 9.7909 0 1 Stacked Hourglass model 0.0784 0.1948 0.5533 0.3349 0.0004 0.9916 4.6254 0 1 Densely Connected Unet model<cit.> 0.1453 0.0611 0.7750 3.761 0 1 9.7909 0 1 Stacked Hourglass with CAB<cit.> 0.1331 0.0761 0.7417 0.0777 0.1972 0.5533 0.3232 0.0007 0.99 LocalEyenet model 0.0047 0.9082 0 0.0915 0.1573 0.6050 0.1516 0.0542 0.7883 The cumulative mean error is computed over all the samples of 300W dataset. The Cumulative Error Distribution (CED) curve as shown in Fig. <ref>, shows that the DenseUnet model generates the highest NME and our LocalEyenet model displays the lowest NME and covers the maximum AUC. § ABLATION STUDY In order to understand the role of attention block in the eye localization architecture, we have analyzed the model performance for different scenarios of 300VW dataset. We have implemented standard state of the art Stacked Hourglass model and introduced the DLAU unit in place of Residual block in each hourglass. The performance of model is compared by computing the NME, failure rate and AUC for the models. Introduction of the attention block between the Deep hourglass modules improves the localization of the heatmaps in the annotated area. Comparison of the performance for ablation study has been enlisted in Table [<ref>] for 300W dataset. The videos in 300VW dataset contains three different scenarios. Videos from scenario 1 have almost no illumination variation, but contain head pose variations. Videos from scenario 2 have been recorded in unconstrained conditions with different illuminations and videos from scenario 3 have all variations including illumination, occlusions, make-up and head pose. The performance of the attention model and its ablation for the 3 different scenarios have been assessed in Table [<ref>]. The attention heatmaps generated by standard stacked hourglass model, the updated stacked hourglass model with DLAU and the LocalEyenet model for the 3 different scenarios have been shown in Fig. <ref>. § TESTING ON REAL-TIME VIDEO STREAM We have tested the performance of our model in real-time video stream. The real-time video streaming has been performed using logitech C920 pro webcam which captures frames at 35 fps with resolution of 1920× 1080. The faces in each frame of the video stream is initialized using dlib face detector. The detected faces are passed through the LocalEyenet model for inferencing. We have tried to impose different conditions such as head pose variation, removal of spectacles and partial occlusion using hands etc. to check the performance of our model. The inference has been performed at the rate of 32 fps which is very close to the frame rate of the videos. The mean error corresponding to the frames are very low and the eye landmarks detected on the faces in different frames have been displayed in Fig.<ref>. § CONCLUSION Gaze detection systems have the very potential to develop a human-machine interface device. To build a gaze detection system, it is of utmost necessity to develop a machine learning framework using facial landmarks. In this work, we propose a convolutional framework named LocalEyenet. The framework is an attention driven neural network architecture that focuses on localization of region of interests in image. The model detects the facial landmarks corresponding to eye regions using heatmap based regression. We show that our framework performs better than any other state of the art heatmap regression method, even with variations in illumination, pose and occlusion by spectacles and hand. Our model learns to localize the heatmaps at an early stage and thus generates inferences at a very high speed. To summarize, LocalEyenet is a robust facial landmark localizer that can perform very well in real-time eye localization under different varied environment conditions. § ACKNOWLEDGMENT The authors would like to acknowledge Council of Scientific & Industrial Research (CSIR)-Central Electronic Engineering Research Institute (CEERI), Pilani, Rajasthan, India for providing the facilities for conducting the research work. elsarticle-harv
http://arxiv.org/abs/2303.06676v1
20230312143353
Local Search For SMT On Linear and Multilinear Real Arithmetic
[ "Bohan Li", "Shaowei Cai" ]
cs.LO
[ "cs.LO" ]
Bohan Li and Shaowei Cai State Key Laboratory of Computer Science Institute of Software, Chinese Academy of Sciences, Beijing, China {libh,caisw}@ios.ac.cn School of Computer Science and Technology University of Chinese Academy of Sciences, Beijing, China Local Search For SMT On Linear and Multilinear Real Arithmetic Bohan Li1,2 Shaowei Cai1,2Corresponding author March 30, 2023 ============================================================== Satisfiability Modulo Theories (SMT) has significant application in various domains. In this paper, we focus on Satisfiablity Modulo Real Arithmetic, referred to as SMT(RA), including both linear and non-linear real arithmetic theories. As for non-linear real arithmetic theory, we focus on one of its important fragment where the atomic constraints are multilinear. We proposed the first local search algorithm for SMT(RA), called LS-RA, based on two novel ideas. First, an interval-based operator is proposed to cooperate with the traditional local search operator by considering the interval information. Moreover, we propose a tie-breaking mechanism to further evaluate the operations when the operations are indistinguishable according to the score function. Experiments are conducted to evaluate LS-RA on benchmarks from SMT-LIB. The results show that LS-RA is competitive with the state-of-the-art SMT solvers, and performs particularly well on multilinear instances. § INTRODUCTION The Satisfiability Modulo Theories (SMT) is the problem of checking the satisfiability of a first order logic formula with respect to certain background theories. It has been applied in various areas, including program verification and termination analysis <cit.>, symbolic execution <cit.> and test-case generation <cit.>, etc. In this paper, we focus on the theory of real arithmetic, consisting of atomic constraints in the form of polynomial equalities or inequalities over real variables. The theory can be divided into two categories, namely linear real arithmetic (LRA) and non-linear real arithmetic (NRA), based on whether the arithmetic atomic constraints are linear or not. As for NRA, this paper concerns one of its important fragment where the atomic constraints are multilinear. The SMT problem with the background theory of LRA and NRA is to determine the satisfiability of the Boolean combination of respective atomic constraints, referred to as SMT(LRA) and SMT(NRA). In general, we refer to the SMT problem on the theory of real arithmetic as SMT(RA). The mainstream approach for solving SMT(RA) is the lazy approach <cit.>, also known as DPLL(T) <cit.>, which relies on the interaction of a SAT solver with a theory solver. Most state-of-the-art SMT solvers supporting the theory on real arithmetic are mainly based on the lazy approach, including Z3 <cit.>, Yices2 <cit.>, SMT-RAT <cit.>, CVC5 <cit.>, OpenSMT <cit.> and MathSAT5 <cit.>. In the DPLL(T) framework, the SMT formula is abstracted into a Boolean formula by replacing arithmetic atomic constraints with fresh Boolean variables. A SAT solver is employed to reason about the Boolean structure, while a theory solver is invoked to receive the set of theory constraints determined by the SAT solver, and solve the conjunction of these theory constraints, including consistency checking of the assignments and theory-based deduction. The efforts in the lazy approach are mainly devoted to designing effective decision procedures, serving as theory solvers to deal with the conjunction of theory constraints. The core reasoning module for LRA integrated in DPLL(T) is a variant of simplex algorithm dedicated for SMT solving, proposed in <cit.>. Another approach for solving LRA constraint systems is the Fourier-Motzkin variable elimination <cit.>, which often shows worse performance than the simplex algorithm. As for non-linear real arithmetic, the cylindrical algebraic decomposition (CAD) <cit.> is the most widely used decision procedure, and CAD is adapted and embedded as theory solver in the SMT-RAT solver <cit.> with improvement since <cit.>. Moreover, an elegant variation of CAD method is instantiated in the model-constructing satisfiability calculus framework of Z3 <cit.>. Other well-known methods use Gröbner bases <cit.> or the realization of sign conditions <cit.>. Incomplete methods include a theory solver <cit.> based on virtual substitution <cit.>, and techniques based on interval constraint propagation <cit.> proposed in <cit.>. Despite the fact that local search has been successfully employed to solve SAT <cit.> and recently to SMT on integer arithmetic <cit.>, we are not aware of any local search algorithm for SMT on real arithmetic. In this paper, for the first time, we design a local search algorithm for SMT(RA), namely LS-RA, based on the following novel strategies. First, we propose the interval-based operator to enhance the conventional local search operator by taking interval information into account. Specifically, we observe that assigning the real-value variable to any value in a given interval would make the same amount of currently falsified clauses become satisfied. Hence, the interval-based operator evaluates multiple values inside the interval as the potential value of the operation, rather than only assign it to a fixed value (e.g. the threshold value to satisfy a constraint). Moreover, we observe that there frequently exist multiple operations with the same best score when performing local search, and thus a tie-breaking mechanism is proposed to further distinguish these operations. Experiments are conducted to evaluate LS-RA on 2 benchmarks, namely SMT(LRA) and SMT(NRA) benchmarks from SMT-LIB. Note that unsatisfiable instances are excluded, and we only consider multilinear instances from SMT(NRA) benchmark. We compare LS-RA with the top 4 SMT solvers according to the SMT-COMP 2022[https://smt-comp.github.io/2022/], excluding the portfolio and derived solvers. Specifically, as for SMT(LRA), we compare LS-RA with OpenSMT, Yices2, CVC5 and Z3, while for SMT(NRA), the competitors are Z3, CVC5, Yices2 and SMT-RAT. Experimental results show that LS-RA is competitive and complementary with state-of-the-art SMT solvers, especially on multilinear instances. Moreover, the Ablation experiment confirms the effectiveness of our proposed novel strategies. Note that multilinear instances are comparatively difficult to solve by existing solvers. For example, Z3, perhaps the best solver for satisfiable SMT(NRA) instances, can solve 90.5% QF(NRA) instances, while it can only solve 77.5% multilinear instances from SMTLIB. However, multilinear instances are suitable for local search, since without high order terms, the operation can be easily calculated. In section <ref>, preliminary knowledge is introduced. In section <ref>, we propose a novel interval-based operator to enrich the traditional operator by considering the interval information. In section <ref>, a tie-breaking mechanism is proposed to distinguish multiple operations with the same best score. Based on the two novel strategies, our local search for SMT(RA) is proposed in section <ref>. Experimental results are presented in section <ref>. Conclusion and future work are given in section <ref>. § PRELIMINARY §.§ Basic Definitions A monomial is an expression of the form x_1^e_1...x_m^e_m where m>0, x_i are variables and e_i are exponents, e_i>0 for all i∈{1...m}, and x_i≠x_j for all i,j∈{1...m},i≠j. A monomial is linear if m=1 and e_1=1. A polynomial is a linear combination of monomials, that is, an arithmetic expression of the form ∑_i a_i m_i where a_i are coefficients and m_i are monomials. If all its monomials are linear in a polynomial, indicating that the polynomial can be written as ∑_i a_ix_i, then it is linear, and otherwise it is non-linear. A special case of non-linear polynomial is multilinear polynomial, where the highest exponent for all variables is 1, indicating that each monomial is in the form of x_1...x_m. The atomic constraints of the theory of real arithmetic are polynomial inequalities and equalities, in the form of ∑_i a_i m_i⋈ k, where ⋈∈{=,≤,<,≥,>}, m_i are monomials consisting of real-valued variables, k and a_i are rational constants. The formulas of the SMT problem on the theory of real arithmetic, denoted as SMT(RA), are Boolean combination of atomic constraints and propositional variables, where the set of real-valued variables and propositional variables are denoted as X and P. The SMT problem on the theory of linear real arithmetic (LRA) and non-linear arithmetic (NRA) are denoted as SMT(LRA) and SMT(NRA), respectively. As for NRA, this paper concerns one important fragment where the polynomials in atomic constraints are multilinear, denoted as MRA in this paper. Let X={x_1,x_2,x_3,x_4,x_5} and P={p_1,p_2} denote the sets of integer-valued and propositional variables respectively. A typical SMT(LRA) formula F_LRA and SMT(MRA) formula F_MRA are shown as follows: F_LRA: (p_1∨ (x_1+2x_2≤2) )∧(p_2∨ (3x_3+4x_4=2)∨(-x_2-x_3< 3) ) F_MRA: (p_1∨ (x_1 x_2≤2) )∧(p_2∨ (3x_3x_4+4x_4=2)∨(-x_2-x_3< 3) ) In the theory of real arithmetic, a positive, infinitesimal real number is denoted as δ. A literal is an atomic constraint or a propositional variable, or their negation. A clause is the disjunction of a set of literals, and a formula in conjunctive normal form (CNF) is the conjunction of a set of clauses. For an SMT(RA) formula F, an assignment α is a mapping X→ R and P→{false,true}, and α(x) denotes the value of a variable x under α. A complete assignment is a mapping which assigns to each variable a value. A literal is true if it evaluates to true under the given assignment, and false otherwise. A clause is satisfied if it has at least one true literal, and falsified if all literals in the clause are false. A complete assignment is a solution to an SMT(RA) formula iff it satisfies all the clauses. §.§ Local Search When local search is performed on the SMT problem, the search space is comprised of all complete assignments, each of which represents a candidate solution. Typically, a local search algorithm begins with a complete assignment and repeatedly updates it by modifying the value of variables in order to find a solution. Given a formula F, the cost of an assignment α, denoted as cost(α), is the number of falsified clauses under α. In dynamic local search algorithms which use clause weighting techniques <cit.>, cost(α) denotes the total weight of all falsified clauses under an assignment α. A key component of a local search algorithm is the operator, defining how to modify the current solution. When an operator is instantiated by specifying the variable to operate and the value to assign, an operation is obtained. The operation to assign variable x to value v is denoted as op(x,v). An operator for SMT on linear integer arithmetic proposed in <cit.> is defined as follow. The critical move operator, denoted as cm(x,ℓ), assigns an integer variable x to the threshold value making literal ℓ true, where ℓ is a falsified literal containing x. Local search algorithms usually choose an operation among candidate operations according to some scoring functions. Given a formula and an assignment α, the most commonly used scoring function of an operation op is defined as score(op)=cost(α')-cost(α) where α' is the resulting assignment by applying op to α. An operation op is said to be decreasing if score(op)>0. Another property to evaluate the operation is the make value. Given an operation op, the make value of op, denoted as make(op), is the number of falsified clauses that would become satisfied after performing op. § INTERVAL-BASED OPERATION Critical move satisfies falsified clauses by modifying one variable in a false literal to make it true. This operator can still be used in the context of SMT(RA), and it is also used in our algorithm. However, an issue of accuracy arises when applying the critical move operator in the context of Real Arithmetic. Recalling that we need to calculate the threshold value for a literal to become true, when solving a strict inequality, there is no threshold value. Instead, the value depends on what accuracy we intend to maintain. In this section, we propose an operator for SMT(RA), which considers the interval information and is more flexible than critical move. §.§ Satisfying Domain An important fact on linear or multilinear inequality of real-value variables is that, when all variables but one in the inequality are fixed, there is a domain for the remaining variable, such that assigning the variable to any value in the domain makes the inequality hold. Thus, given a falsified literal ℓ in the form of an atomic constraint and a variable x in it, it can be satisfied by assigning x to any value in the corresponding domain, called Satisfying Domain. For example, consider a literal ℓ: (x-y> 4) where the current assignment is α={x=0, y=0}, then obviously assigning x to any value in (4,+∞) satisfies the inequality, and thus the Satisfying Domain is (4,+∞). We further extend the definition of Satisfying Domain to the clause level, defined as follows. Given an assignment α, for a false literal ℓ and a variable x appearing in ℓ, x's satisfying domain to literal ℓ is SD_l(x,ℓ)={v|ℓ becomes true if assigning x to v}; for a falsified clause c and a variable x in c, x's satisfying domain to clause c is SD_c(x,c)=⋃_ℓ∈ cSD_l(x,ℓ). SD_c(x,c) may contain (-∞,u] whose upper bound is defined as UB(x,c)=u, or [l,∞) whose lower bound is defined as LB(x,c)=l, or both kinds of intervals. For simplicity, interval (-∞,u') or (l',∞) are denoted as (-∞,u'-δ] or [l'+δ,∞) respectively. Given a clause c=ℓ_1∨ℓ_2∨ℓ_3=(a-b>4) ∨ (2a-b ≥ 7) ∨ (2a-c ≤-5) and the current assignment is α={a=0,b=0,c=0}, for variable a, the satisfying domains to the three literals are SD_l(a,ℓ_1)=[4+δ,∞), SD_l(a,ℓ_2)=[3.5,∞) and SD_l(a,ℓ_3)=(-∞,-2.5] respectively. The Satisfying Domain to clause c is SD_c(a,c)=(-∞,-2.5]∪[3.5,∞), and the corresponding upper bound and lower bound are UB(a,c)=-2.5 and LB(a,c)=3.5 respectively. §.§ Equi-make Intervals Based on the variables' satisfying domain to clauses, we observe that operations assigning the variable to any value in a given interval would satisfy the same amount of falsified clauses, that is, they have the same make value. This leads to a concept called equi-make interval. Given an SMT(RA) formula F and an assignment α to its variables, for a variable x, an equi-make interval is a maximal interval I such that all operations op(x,v) with v∈ I have the same make value. We can divide (-∞, +∞) into several equi-make intervals w.r.t. a variable. Consider a formula F: c_1∧ c_2 where both clauses are falsified under the current assignment, and variable a appears in both clauses. Suppose SD_c(a,c_1)=[3,+∞) and SD_c(a,c_2)=[5,+∞), then we can divide (-∞,+∞) into three intervals as (-∞, 3), [3,5) and [5,+∞). Operations assigning a to any value in (-∞, 3) results in a make value of 0, those assigning a to a value in [3,5) results in a make value of 1, while those corresponding to [5,∞) results in a make value of 2. Thus, we can enrich the traditional critical move operator by considering the interval information. The intuition is to find the equi-make intervals, and then consider multiple values in such interval as the options for future value of operations, rather than only consider the threshold value. We focus on the variables appearing in at least one falsified clause. Here we describe a procedure to partition (-∞,+∞) into equi-make intervals for such variables. * First, we go through the falsified clauses. For each falsified clause c, we calculate for each real-valued variable x in c the corresponding satisfying domain to c, SD_c(x,c), as well as the upper bound UB(x,c) and lower bound LB(x,c) if they exist. * Then, for each real-valued variable x appearing in falsified clauses, all its UBs are sorted in the ascending order, while LBs sorted in the descending order. After sorting, these bounds are labeled as UB^1(x),… UB^n(x) and LB^1(x),… LB^m(x), where UB^n(x) and LB^m(x) denotes the maximum of UB and minimum of LB for x respectively [Note that UB^n(x)<LB^m(x), since otherwise the current assignment is either in the interval [LB^m(x),∞) or (-∞,UB^n(x)], and at least one falsified clause is satisfied, which causes conflicts.]. For convenience in description, we denote UB^0(x)=-∞ and LB^0(x)=∞. These bounds are listed in order: UB^0(x)<UB^1(x)<…<UB^n(x)<LB^m(x)<…<LB^1(x)<LB^0(x). * Finally, for each variable x, we obtain an interval partition IP(x)=⋃_0<i≤ n{(UB^i-1(x),UB^i(x)]}∪ (UB^n, LB^m) ∪⋃_0<j≤ m{[LB^j(x),LB^j-1(x))} Formally, given a real variable x and an interval I from IP(x), ∀ v_1,v_2∈ I, make(op(x,v_1))=make(op(x,v_2)). As a slight abuse of notation, for an interval I from IP(x), we define its make value as the make value of any operation op(x,v) with v∈ I. Note that all intervals in IP(x) have positive make values except (UB^n, LB^m), whose make value is 0. Given a formula F:c_1∧ c_2=(a-b > 4∨ 2a-b≥ 7∨ 2a-c≤ -5)∧ (a-c≥ 2∨ a-d≤-1) and the current assignment is α={a=0, b=0, c=0}. For variable a, SD_c(a,c_1)=(-∞,-2.5]∪[3.5,∞) and SD_c(a,c_2)=(-∞,-1]∪[2,∞). Then, UB^0(a)=-∞, UB^1(a)=UB(a,c_1)=-2.5, UB^2(a)=UB(a,c_2)=-1, LB^2(a)=LB(a,c_2)=2, LB^1(a)=LB(a,c_1)=3.5 and LB^0(a)=∞. Therefore, interval partition for x is IP(x)=I_1 ∪ I_2 ∪ I_3 ∪ I_4 ∪ I_5=(-∞, -2.5]∪ (-2.5, -1] ∪ (-1, 2) ∪ [2, 3.5) ∪ [3.5, +∞), as shown in Fig <ref>. For these intervals w.r.t. x, the make value is 2, 1, 0, 1, 2 respectively. §.§ Candidate Values for Operations Since assigning a variable x to any value in an equi-make interval would satisfy the same amount of falsified clauses, after choosing an equi-make interval, we can consider more values in the interval as the option for the future value of operation, rather than only the threshold. In this work, we only consider the intervals with a positive make value, and thus the interval (UB^n, LB^m) is omitted. Thus, the interval for consideration is of the form (UB^i-1(x),UB^i(x)] or [LB^i(x),LB^i-1(x)). For such an interval, we consider the following values for the operation: * Assign x to the threshold UB^i(x) or LB^i(x). * Assign x to the median of the interval, that is (UB^i-1(x)+UB^i(x))/2 and (LB^i(x)+LB^i-1(x))/2. * if there exist integers in the open interval (UB^i-1(x),UB^i(x)) or the interval (LB^i(x), LB^i-1(x)), assign x to the largest or smallest integer in the respective open interval; Otherwise, suppose that the open interval can be written as (a/b,c/d), then assign x to a+c/b+d. The first option is the same as critical move, and thus critical move can be regarded as a special case of our interval-based operator. The second option is an typical choice among intervals. The third option aims to find a rational value in the open interval with small denominator. § A TIE-BREAKING MECHANISM We notice that there often exist different operations with the same best score during local search, and thus tie-breaking is also important to guide the search. To confirm our observation, we conduct a pre-experiment on 100 randomly selected instances. On each instance, we execute a simple local search algorithm which selects an operation with the best score for 10000 iterations, and we count the number of steps where k operations with the same best score are found, denoted as step(k). The average step(k) is presented in Fig. <ref>. The steps where more than one operations have the same best score take up 61.2% of the total steps. Thus, a tie-breaking heuristic is required to further distinguish these operations with same best score. First, we consider that assigning real-valued variable to values with large denominator can lead the algorithm to more complex search space, leading to more complicated computation and possible errors. Thus, we prefer operations that assign variable to value with a small denominator. Moreover, we consider that assigning variable to value with large absolute value can lead to the assignment with extraordinarily large value, deviating the algorithm from finding a possible solution. Thus, we prefer operations assigning variable to value with a small absolute value. Based on the above observation and intuition, we propose the selection rule for picking operation, described as follows. Selection Rules: Select the operation with the greatest score, breaking ties by preferring the one assigning the corresponding variable to value with the smallest denominator. Further ties are broken by picking the operation assigning the variable with the smallest absolute value. § LS-RA ALGORITHM Our local search algorithm adopts a two-mode framework, which switches between Real mode and Boolean mode. This framework has been used in the local search algorithm LS-LIA for integer arithmetic theories <cit.>. §.§ Local search Framework As depicted in Fig. <ref>, after the initialization, the algorithm switches between Real mode and Boolean mode. In each mode, an operation on a variable of the corresponding data type is selected to modify the current solution. The two modes switches to each other when the number of non-improving steps (denoted as non_improve_steps) of the current mode reaches a threshold. The threshold is set to L× P_b for the Boolean mode and L× P_r for the Real mode, where P_b and P_r denote the proportion of Boolean and real-variable literals to all literals in falsified clauses, and L is a parameter. §.§ Local Search in Real Mode As described in Algorithm <ref>, if the current assignment α satisfies the given formula F, then the solution is found (Line 2). The algorithm tries to find a decreasing interval-based operation according to the Selection Rule (Line 3–4). If there exists no such decreasing operation, indicating that the algorithm falls into the local optimum. We first update the clause weight according to the probabilistic version of the PAWS scheme <cit.> (Line 6), and then randomly sample K interval-based operations into the set Set_op (Line 7), where K is a relatively small parameter. The best operation is picked according to Selection Rules among Set_op (Line 8). Note that since the interval-based operation can satisfy at least one clause, picking the best one among few randomly sampled interval-based operation can be regarded as a diversification operation. The probabilistic version of the PAWS scheme works as follows. With probability 1-sp, the weight of each falsified clause is increased by one, and with probability sp, for each satisfied clause whose weight is greater than 1, the weight is decreased by one. As for the Boolean mode focusing on the subformula consisting of Boolean variables, LS-RA works in the same way as the Boolean mode of LS-LIA. By putting the Boolean mode and the Real mode together, we propose our local search algorithm for SMT(RA) denoted as LS-RA. § EXPERIMENTS We conducted experiments to evaluate LS-RA on on 2 benchmarks from SMT-LIB, and compare it with state-of-the-art SMT solvers. Moreover, ablation experiments are conducted to analyze the effectiveness of the proposed strategies. §.§ Experiment Preliminaries Implementation: LS-RA is implemented in C++ and compiled by g++ with '-O3' option. There are 3 parameters in LS-LRA: L for switching phases, K for the number of sampled operation and sp (the smoothing probability) for the PAWS scheme. The parameters are tuned according to suggestions from the literature and our preliminary experiments on 20% sampled instances, and are set as follows: L=20, K=3, sp=0.0003 for all benchmarks. Competitors: In the context of SMT(LRA), we compare LS-RA with the top 4 state-of-the-art SMT solvers according to SMT-COMP 2022[https://smt-comp.github.io/2022], namely OpenSMT (version 2.4.2) [https://github.com/usi-verification-and-security/opensmt], Yices2 (version 2.6.2) [https://yices.csl.sri.com], CVC5 (version 1.0.0) [https://cvc5.github.io/], and Z3 (version 4.8.17) [https://github.com/Z3Prover/z3/]. While in the context of SMT(NRA), the top 4 competitors are as follows, CVC5 (version 1.0.0), Yices2 (version 2.6.2), Z3 (version 4.8.17) and SMT-RAT-MCSAT (version 22.06) [https://github.com/ths-rwth/smtrat]. The binaries of all competitors are downloaded from their websites. Note that portfolio and derived solvers are excluded. Benchmarks: Experiments are carried out on 2 benchmark sets from SMT-LIB. * SMTLIB-LRA: This benchmark set consists of SMT(LRA) instances from SMT-LIB[https://clc-gitlab.cs.uiowa.edu:2443/SMT-LIB-benchmarks/QF_LRA]. As LS-RA is an incomplete solver, UNSAT instances are excluded, resulting in a benchmark consisting of 1044 unknown and satisfiable instances. * SMTLIB-MRA: This benchmark set consists of SMT(NRA) instances whose atomic constraints are multilinear from SMT-LIB[https://clc-gitlab.cs.uiowa.edu:2443/SMT-LIB-benchmarks/QF_NRA]. UNSAT instances are also excluded, resulting in a benchmark consisting of 979 unknown and satisfiable instances. Experiment Setup: All experiments are carried out on a server with AMD EPYC 7763 64-Core 2.45GHz and 2048G RAM under the system Ubuntu 20.04.4. Each solver is executed one run with a cutoff time of 1200 seconds (as in the SMT-COMP) for each instance in both benchmarks, as they contain sufficient instances. We compare the number of instances where an algorithm finds a model (“#solved”), as well as the run time. The bold value in table emphasizes the solver with greatest “#solved”. §.§ Results on SMTLIB-LRA Benchmark As shown in Table <ref>, LS-RA can solve 900 out of 1044 instances, which is competitive but still cannot rival its competitors. We also compare the run time comparison between LS-RA and each competitor on instances from SMTLIB-LRA in Fig <ref>, which shows that LS-RA is complementary to the competitors. One explanation for the fact that LS-RA cannot rival its CDCL(T) competitors is that the simplex-based theory solver performs so efficiently that there is little space for improvement. Moreover, 54.5% of the instances in SMTLIB-LRA contain Boolean variables, while the Boolean mode of LS-RA is not good at exploiting the relations among Boolean variables, similar to LS-LIA. §.§ Results on SMTLIB-MRA Benchmark LS-RA can solve more multilinear instances than all competitors on this benchmark (solving 891 out of 979 instances), which is shown in Table <ref>. The time comparison between LS-RA and its competitors is shown in Fig <ref>, confirming that LS-RA is more efficient than all competitors. LS-RA works particularly well on instances from “zankl” and “UltimateAutomizer” type, which are industrial instances generated in the context of software verification. On these types, LS-RA can solve all instances, outperforming all the competitors. Moreover, LS-RA can exclusively solve 13 instances from “20170501-Heizmann” type, which implements a constraint-based synthesis of invariants<cit.>. The explanation for the superiority of LS-RA on SMTLIB-MRA are as follows. In contrast to LRA, the theory solver for NRA constraints requires complex calculation, which reduces the performance of these competitors, while LS-RA can trivially determine the operations in multilinear constraints, and thus LS-RA can efficiently explore the search space. §.§ Effectiveness of Proposed strategies In order to analyze the effectiveness of the strategies in LS-RA, we modify LS-RA to obtain 3 alternative versions as follows. * To analyze the effectiveness of interval-based operator, we modify LS-RA by replacing the interval-based operation with traditional cm operator, leading to the version v_cm. * To analyze the effectiveness of the tie-breaking mechanism, we modify LS-RA by evaluating operation based on score without considering the Selection Rules, leading to the version v_score. * We also implement a plain version which adopts neither interval-based operator nor tie-breaking mechanism, denoted as v_plain. LS-RA is compared with these modified versions on both benchmarks. The runtime distribution of LS-RA and its modified versions is presented in Fig. <ref>, which confirms the effectiveness of our proposed strategies. § CONCLUSION AND FUTURE WORK In this paper, we propose the first local search algorithm for SMT on Real Arithmetic based on the following novel ideas. First, the interval-based operation is proposed to enrich the traditional operation, by considering the interval information. Moreover, a tie-breaking mechanism are proposed to distinguish operations with same best score. Experiments on SMT-LIB show that our solver is competitive and complementary with state-of-the-art SMT solvers, especially for those multilinear instances. The future direction is to extend LS-RA to support all SMT(NRA) instances and deeply combine our local search algorithm with the state-of-the-art DPLL(T) SMT solver, resulting in a hybrid solver that can make the most of respective advantages. splncs04
http://arxiv.org/abs/2303.07373v1
20230313180007
Hochschild cohomology of differential operators in positive characteristic
[ "Joshua Mundinger" ]
math.AG
[ "math.AG", "math.RA", "math.RT", "14F10 (Primary) 16E40, 14G17 (Secondary)" ]
For k a field of positive characteristic and X a smooth variety over k, we compute the Hochschild cohomology of Grothendieck's differential operators on X. The answer involves the derived inverse limit of the Frobenius acting on the cohomology of the structure sheaf of X. Higher-Order Methods for Hamiltonian Engineering Pulse Sequence Design Mikhail D. Lukin^1 March 30, 2023 ====================================================================== § INTRODUCTION Algebras of polynomial differential operators are objects used throughout mathematics, sitting at the interface of analysis, geometry, topology, and algebra. Over a field of characteristic zero, the algebra of differential operators _X on a variety X consists of operators locally of the form ∑_I f_I ∂^i_1/∂^i_1 x_1⋯∂^i_n/∂^i_n x_n where x_1,…, x_n are local coordinates and f_I are regular functions on X. One can also consider differential operators over a field of positive characteristic; then the definition must be modified to account for the identity (d/dx)^px^n = 0 in characteristic p. In this paper, we study differential operators with divided powers, formulated by Grothendieck in connection with crystalline cohomology. This algebra includes operators such as (p!)^-1(d/dx)^p. Precise definitions are given in §<ref> below. Hochschild cohomology is a fundamental invariant of associative algebra A. As a ring, the Hochschild cohomology HH^*(A) coincides with self-extensions of the A-bimodule A. Gerstenhaber showed that the bar complex of the A-bimodule A controls deformations of the product on A <cit.>. Since then, Hochschild cohomology has attracted considerable interest due to its connection to deformations. In this note, we prove: [see Theorem <ref>] Let k be a field of postitive characteristic, X a smooth variety over k, and _X the ring of differential operators on X. Then there are short exact sequences 0 → R^1_r H^m-1(X,_X)^(r)→ HH^m(_X) →_r H^m(X,_X)^(r)→ 0 for all m ≥ 0, where the inverse limit is taken over the sequence of relative Frobenius maps Fr: H^∗(X,_X)^(r+1)→ H^∗(X,_X)^(r). We also consider the cup product structure on HH^*(_X) in §<ref>. There it is shown that the map HH^*(_X) →_r H^m(X,_X^(r)) is a map of graded rings. Over the field ℂ of complex numbers, it follows from work of Wodzicki that HH^*(_X) ≅ H^∗_dR(X/ℂ) for smooth affine X <cit.>. In fact, in loc cit. Wodzicki calculates the Hochschild homology as HH_*(_X/ℂ) ≅ H_dR^2 X - ∗(X/ℂ), reflecting that _X/ℂ is a Calabi-Yau algebra of dimension 2 X. One year later, Wodzicki calculated the Hochschild homology of _X for X smooth affine over k of positive characteristic <cit.>. He showed that HH_*(_X) is concentrated in degree n = X and HH_n(_X) = Ω^n_X / B_∞Ω^n_X, where B_∞Ω^n_X are the potentially exact forms. Unlike in characteristic zero, Wodzicki's method does not apply to Hochschild cohomology. Our results show _X over a field of positive characteristic is not Calabi-Yau, as for affine X, HH^*(_X) will have amplitude exactly [0,1]. If X is not affine, then _X is not an associative algebra but rather a sheaf of such; this makes defining an appropriate category of bimodules more difficult. Hochschild cohomology of ringed spaces and, more generally, abelian categories has been developed by Lowen and Van den Bergh <cit.>, following earlier work by Gerstenhaber and Schack on cohomology of diagrams of associative algebras <cit.>. Lowen and Van den Bergh showed that if Å is a sheaf of algebras on X which is locally acyclic with respect to a basis ℬ, then the Gerstenhaber-Schack cohomology of the diagram Å_ℬ coincides with Hochschild cohomology of the category of Å-modules <cit.>. This paper uses Gerstenhaber and Schack's definition of Hochschild cohomology of a diagram (see §<ref>); as _X is quasi-coherent, our computation thus agrees with categorical Hochschild cohomology. We should point out that Ogus obtains very similar formulas for ^*__X(_X,_X) in <cit.>. The relationship is explained in Remark <ref>. Acknowledgments. The author was supported by NSF Graduate Research Fellowship DGE 1746045. The author thanks Luc Illusie for pointing out the paper <cit.> and Tim Porter for the reference <cit.>. § PRELIMINARIES §.§ Differential operators Let k be a field. A smooth variety X over k will mean a morphism of schemes X → k which is smooth, separated, and of finite type. We recall Grothendieck's definition of differential operators on a smooth variety, following <cit.>. <cit.> For a smooth variety X over k, let I be the ideal of the diagonal in X ×_k X, that is, I = ⟨ f ⊗ 1 - 1 ⊗ f ⟩⊆_X ⊗_k _X. A k-linear map of sheaves h : _X →_X is a differential operator of order m if and only if the linearization h: _X ⊗_k _X →_X is annihilated by I^m+1. A map h is a differential operator of order m if and only if for all local sections f_0,f_1,…, f_m of _X, we have [f_0,[f_1,[…,[f_m,h]]]] = 0. A degree zero differential operator is _X-linear and thus is a section of _X. Differential operators form a filtered sheaf of rings _X with a map _X →_X from the inclusion of degree zero differential operators. As a left or right _X-module, the sheaf _X is quasi-coherent. The sheaf _X contains differential operators “with divided powers.” For example, if ∂ = d/dt is the usual derivative acting on k[t], the operator ∂^q is divisible by q!, as ∂^q t^n = q! nqt^n-q. Thus 1/q!∂^q: t^n ↦nqt^n-q makes sense, regardless of the characteristic of k. The following proposition states that _X locally has a basis of such operators: <cit.> Suppose X is a smooth variety and {x_1,…, x_n}⊆Γ(X,_X) such that {dx_1,…, dx_n} is a basis for Ω^1_X. Then as either a left or a right _X-module, _X has a basis of the form {∂_1^(q_1)∂_2^(q_2)⋯∂_n^(q_n)| q_1,q_2,…, q_n ≥ 0} where ∂_i^(q_i) are differential operators such that * ∂_i^(0) = 1 for all i; * the operators {∂_i^(1) = ∂_i}_i=1^n are derivations dual to the 1-forms {dx_i}; * ∂_i^(q)∂_i^(q') = q+q'q∂_i^(q+q') for all i and q,q' ≥ 0; * the following commutator relations hold: [∂_i^(q_i), ∂_j^(q_j)] = 0, [∂_i^(q_i),x_j] = 0 i ≠ j ∂_i^(q_i - 1) i = j . We should think of ∂_i^(q) as 1/q!(d/dx_i)^q, and indeed the commutator relations imply ∂_i^(q)(x_i^n) = nqx_i^n-q. §.§ Frobenius twists and matrix subalgebras In this section, assume that k has characteristic p > 0. Consider the setting of Proposition <ref>. The derivations {∂_i}_i=1^n do not generate the algebra _X over _X. Instead, they generate an associative algebra of finite type over _X, centralizing the pth power of any element of _X. To deal with rings of pth powers, we use the standard language of Frobenius twists. For any scheme S of characteristic p, let F_S: S → S be the absolute Frobenius morphism on S, which is the identity on |S| and acts on functions by f ↦ f^p. The Frobenius twist X^(1) of X→ k is the base change X ×_ k ( k, F_ k) of X along the absolute Frobenius of k. The Frobenius twist fits into a diagram X [rd] [r, "Fr_X/k"] X^(1)[r] [d] X [d] k [r, "F_ k"] k where the composition X → X^(1)→ X is the absolute Frobenius F_X of X. The induced map Fr_X/k: X → X^(1) over k is called the relative Frobenius. When there is no risk of confusion, we will write Fr instead of Fr_X/k. If X is a smooth variety over k, then Fr is a homeomorphism and the induced map Fr: _X^(1)→ Fr_∗_X is an inclusion making Fr_∗_X a finite free _X^(1)-module of rank p^ X <cit.>. We may identify the image of _X^(1) in _X with the Frobenius twist _X^(1) of the sheaf _X. We will also write Fr^r: X → X^(r) to mean the r-fold composition of relative Frobenius maps X → X^(1)→⋯→ X^(r). The subalgebra ^r_X is the centralizer of _X^(r) in _X. <cit.> If X is a smooth variety over k, then the action of _X on _X induces an isomorphism ^r_X →_X^(r)(Fr^r_∗_X) and _X = ⋃_r≥ 0^r_X. The map _X^r→_X^(r)(Fr^r_∗_X) is injective. For r ≥ 1, Let I^(r) = ⟨ f^p^r⊗ 1 - 1 ⊗ f^p^r⟩⊆_X ⊗_k _X. Since X is of finite type, the chains of ideals I ⊇ I^2 ⊇⋯ and I ⊇ I^(1)⊇ I^(2)⊇⋯ are cofinal. Hence every _X^(r)-linear map of Fr^r_∗_X is a differential operator, so ^r_X→_X^(r)(Fr^r_∗_X) is surjective. Cofinality also implies every differential operator is linear over some _X^(r), so _X = ⋃_r≥ 0^r_X. The subalgebras ^r_X are Morita equivalent to _X^(r), realizing Katz's equivalence of _X-modules with stratified sheaves on X <cit.>. § THE GERSTENHABER-SCHACK COMPLEX Let k be any field. We now describe the Gerstenhaber-Schack complex for computing Hochschild cohomology <cit.>. The construction begins with a poset J, a presheaf of k-algebras Å on J, and a presheaf of Å-bimodules . Let N(J) be the nerve of the poset J in the sense of category theory: it is the simplicial complex with p-simplices the chains σ = (U_0 < ⋯ < U_i) for U_0,…,U_i ∈ J. Any such simplex σ has a maximal element maxσ = U_i and a minimal element minσ = U_0. Then the Gerstenhaber-Schack complex is the double complex with cochains C^i,j(Å, ) = ∏_σ∈ N(J)^i C^j(Å(maxσ), (minσ)), where C^∗(-,-)=_k(-^⊗∗,-) are the usual Hochschild cochains. The horizontal differential is the differential on simplicial cochains on N(J) with respect to the system of local coefficients σ↦ C^j(Å(maxσ),(minσ)). The vertical differential is the Hochschild differential. Then Hochschild cohomology of (Å,) is defined by HH^*(Å,) = H^*( C^∗,∗). In case J is a single point, the Gerstenhaber-Schack complex coincides with the usual Hochschild complex of an associative algebra. We now consider the standard filtration F^ℓ C^i,j = 0 if i< ℓ and F^ℓ C^i,j = C^i,j if i ≥ℓ. The associated spectral sequence yields: Let J be a poset, Å a presheaf of associative k-algebras on J, and a presheaf of Å-bimodules. Consider the local system on N(J) with coefficients HH^j(Å,)(σ) = HH^j(Å(maxσ),(minσ)). There is first-quadrant spectral sequence with E_2-page E_2^i,j = H^i(N(J), HH^j(Å,)) converging to HH^i+j(Å,). In our situation, the algebra _X is the union of subalgebras ^r_X. The following Lemma relates Hochschild cohomology of ^r_X and _X. Let J be a poset, Å a presheaf of associative k-algebras on J with a complete filtration by subalgebras Å^0⊆Å^1⊆⋯⊆Å. Then for any presheaf of Å-bimodules , there are short exact sequences 0 → R^1 _r HH^m-1(Å^r,) → HH^m(Å,) →_r HH^m(Å,) → 0 for all m ≥ 0. Fix an i-simplex σ∈ N(J), and let U_0 = minσ, U_i = maxσ. Then we have Å(U_i) = ∪_r Å^r(U_i). Since k is a field, the maps _k(Å(U_i)^⊗ j, (U_0)) →_k(Å^r+1(U_i)^⊗ j,(U_0)) →_k(Å^r(U_i)^⊗ j,(U_0)) are surjective for all j ≥ 0. Hence, the sequence of complexes C^i,j(Å^r,) satisfies the Mittag-Leffler condition on cochains and C^i,j(Å,) = _r C^i,j(Å^r,). Now the Proposition follows from <cit.>. § HOCHSCHILD COHOMOLOGY OF DIFFERENTIAL OPERATORS For the rest of the paper, the field k is of characteristic p > 0 and X is a smooth variety over k. As X is separated, the intersection of two affine opens is an affine open. Hence there exists a covering of X by nonempty open affines closed under finite intersections; let 𝔘 be such a covering. We will compute the cohomology of the Gerstenhaber-Schack complex for _X with respect to the poset 𝔘. Here is a sketch of the argument: we will first compute HH^*(^r_X,_X) locally, then apply the spectral sequence of Proposition <ref> to compute HH^*(^r_X,_X). Finally, Lemma <ref> will relate HH^*(^r_X,_X) with HH^*(_X). Given affine U, let (U) = Γ(U,_U), and similarly for ^r, , etc.. Let V ⊆ U be smooth affine varieties over k. Then the inclusion (V^(r)) →(V) induces HH^0(^r(U), (V)) ≅(V^(r)) and HH^m(^r(U), (V)) = 0 for all m > 0. By Propsition <ref>, the algebra ^r(U) is the matrix ring _(U^(r))((U)). It is well-known that Hochschild cohomology is Morita-invariant. Under the Morita equivalence ^r(U)≃(U^(r)), the ^r(U)-bimodule (V) is sent exactly to (V^(r)). This is seen as follows: for affine U, the inclusion (U^(r)) →(U) is split as (U^(r))-modules <cit.>. If e ∈^r(U) is the idempotent corresponding to the splitting, then it is easily checked that the map e(V)e →_k((V^(r))) induces an isomorphism e (V)e ≅(V^(r)). Thus, it suffices to show the claim when r=0, that is, to compute Hochschild cohomology of ((U),(V)). The claim is local, so we may assume that U has local coordinates x_1,…, x_n such that {x_i ⊗ 1 - 1 ⊗ x_i} generate the ideal of the diagonal in U × U. Let P_∗→(U) be the Koszul complex for (U) as an (U)-bimodule corresponding to the regular sequence x_1,…, x_n. Then HH^∗((U),(V)) is computed by the complex _(U)⊗(U)(P_∗, (V)). Using the basis of Proposition <ref>, the complex above is the tensor product over (V) of the two-term complexes (V) ⟨∂_i⟩[r,"[x_i,-]"] (V)⟨∂_i⟩ for 1 ≤ i ≤ n, where (V)⟨ - ⟩ means free divided power algebra. The differential (<ref>) is surjective with kernel (V). Now the Künneth formula finishes the proof. The complex constructed in the proof above coincides with the PD de Rham complex for a free divided power algebra. See <cit.>. For a smooth variety X over k, there is an isomorphism HH^m(^r_X,_X) ≅ H^m(X,_X^(r)) for all m ≥ 0 such that the following diagram commutes: HH^m(^r+1_X,_X) [r, "∼"] [d] H^m(X,_X^(r+1)) [d, "Fr"] HH^m(^r_X,_X) [r, "∼"] H^m(X,_X^(r)) Consider the spectral sequence of Proposition <ref> for (^r_X,_X). By Proposition <ref>, for any pair V⊆ U in 𝔘, we have HH^0(^r(U),(V)) = (V)^(r) and HH^j(^r(U),(V)) = 0 for j > 0. Thus, the spectral sequence has E_2-page E_2^ij = H^i(N(𝔘),_X^(r)) j = 0 0 j > 0, and so collapses at E_2. We would like to relate N(𝔘), the nerve in the sense of category theory, to Čech cohomology with respect to 𝔘. Let N_Čech(𝔘) be the Čech nerve of 𝔘. As 𝔘 is closed under intersection, Theorem 1.4 of <cit.> implies that the map N_Čech(𝔘) →𝔘 sending (U_0,…, U_i) ∈𝔘^i+1 with nonempty intersection to U_0 ∩⋯∩ U_i induces a homotopy equivalence N_Čech(𝔘) → N(𝔘). This map induces H^i(N(𝔘),_X^(r)) ≅ H^i(N_Čech(𝔘),_X^(r)) = Ȟ^i(𝔘,_X^(r)). The sheaf _X^(r) is quasi-coherent on X^(r) and the r-fold relative Frobenius Fr^r: X → X^(r) is a homeomorphism, so _X^(r) is acyclic for every affine open subset of X. As 𝔘 consists of affine open subsets of X and is closed under intersection, we obtain E_2^i,0 = H^i(X,_X^(r)). This proves the claim. Let k be a field of positive characteristic and X be a smooth variety over k. Then there are short exact sequences 0 → R^1_r H^m-1(X,_X^(r)) → HH^m(_X) →_r H^m(X,_X^(r)) → 0 for all m ≥ 0, where the limit is taken over the sequence of relative Frobenius maps Fr: X^(r)→ X^(r+1). Combine Proposition <ref> with Lemma <ref>. In <cit.>, Ogus shows that there is an exact sequence 0 → R^1 _r H^m-1(X,_X^(r)) →^m__X(_X,_X) →_r H^m(X,_X^(r)) → 0 for all m ≥ 0. The connection with Theorem <ref> is this: for any abelian category 𝒞 and object C of 𝒞 there is the Chern character ch_C: HH^*(𝒞) →^*_𝒞(C,C) <cit.>. When 𝒞 = A for an an associative algebra A and C ∈ A, the characteristic morphism is implemented by the morphism of Hochschild complexes C^*(A,A) → C^*(A,_k(C)). It may then be checked for smooth affine X that the Chern character ch_(X) is an isomorphism HH^*((X)) → ^*_(X)((X),(X)). At present, it is not clear to the author how to implement the Chern character in <cit.> on the Gerstenhaber-Schack complex, as _k(_X) is not quasi-coherent. § EXAMPLES Let X = 𝔸^1_k, so that (X) = k[t]. Then (X^(r)) = k[t^p^r] and the relative Frobenius X^(r)→ X^(r+1) is induced by the inclusion k[t^p^r] → k[t^p^r+1]. Theorem <ref> implies that HH^0(_𝔸^1) = k, HH^1(_𝔸^1) ≅ R^1 _r k[t^p^r], and HH^m(_𝔸^1) = 0 when m > 1. Let us compute R^1_r k[t^p^r]. The short exact sequence of diagrams 0 →{ k[t^p^r]}_r →{k[t]}_r →{k[t]/k[t^p^r]}_r → 0 gives a medium-length exact sequence of derived inverse limits 0 → k → k[t] →_r k[t]/k[t^p^r] → R^1_r k[t^p^r] → 0 → 0 → 0. Hence R^1 _r k[t^p^r] is identified with (_r k[t]/k[t^p^r])/k[t]. The space _r k[t]/k[t^p^r] embeds into kt as those power series which may be written as a formal sum f= ∑_r=0^∞ f_r for f_r ∈ k[t^p^r]. The identification HH^1(D(X)) ≅ R^1_r (X^(r)) sends such a power series f to the commutator with f, which is well-defined since every element of D(X) commutes with some (X^(r)). This explains S. Paul Smith's observation from 1986 that taking the commutator with the series t + t^p + t^p^2 + ⋯ gives an outer derivation of D(𝔸_k^1) <cit.>. Suppose that X is proper over k, so that H^m(X,_X) is finite-dimensional over k for all m≥ 0. Pullback by Frobenius is a semilinar endomorphism of H^m(X,_X), and thus there is a canonical splitting H^m(X,_X) = H^m_n(X,_X) ⊕ H^m_s(X,_X) into Fr-stable subspaces where the Frobenius acts nilpotently and as an isomorphism, respectively <cit.>. Then _r H^m(X,_X)^(r)≅ H^m_s(X,_X) via the projection _r H^m(X,_X)^(r)→ H^m(X,_X), while R^1 _r H^m(X,_X)^(r) = 0. We conclude HH^m(_X) ≅ H^m_s(X,_X) when X is proper over k. § CUP PRODUCT Gerstenhaber and Schack defined a cup product on (<ref>) in terms of the cup product on the Hochschild complex. Given simplices τ = (U_0 < ⋯ < U_ℓ) and ν= (U_ℓ < ⋯ < U_i) in N(J) with maxτ = minν, define τ∪ν = (U_0 < ⋯ < U_ℓ < ⋯ < U_i). For Å a presheaf of associative algebras on J, a presheaf of Å-bimodules with compatible associative product, α∈ C^m(Å,), and β∈ C^n(Å,), define (α∪β)^σ = ∑_σ = τ∪ν (-1)^|ν|(m-|τ|)α^τφ_Å∪φ_β^ν, where φ refers to structure maps of the presheaves Å and , and ∪ on the right-hand side is the cup product on the usual Hochschild complex <cit.>. Let J be a poset, Å a presheaf of associative k-algebras on J, and a presheaf of Å-bimodules with a compatible associative product. Then the spectral sequence E_2^i,j = H^i(N(J),HH^j(Å,)) HH^i+j(Å,) of Proposition <ref> is a spectral sequence of algebras with the usual product on E_2. Formula (<ref>) makes the Gerstenhaber-Schack double complex a differential bigraded algebra, and endows E_2 with the usual product structure. Let k be a field of positive characteristic and X be a smooth variety over k. Then the surjection HH^∗(_X) →_r H^∗(X,_X^(r)) of Theorem <ref> is a map of rings.
http://arxiv.org/abs/2303.07036v2
20230313115423
Knot-Quiver correspondence for double twist knots
[ "Vivek Kr. Singh", "S. Chauhan", "A. Dwivedi", "P. Ramadevi", "B. P. Mandal", "S. Dwivedi" ]
hep-th
[ "hep-th" ]
=1 rm
http://arxiv.org/abs/2303.06774v1
20230312232011
Better than square-root cancellation for random multiplicative functions
[ "Max Wenqiang Xu" ]
math.NT
[ "math.NT", "math.CA", "math.PR" ]
Better than square-root cancellation]Better than square-root cancellation for random multiplicative functions Department of Mathematics, Stanford University, Stanford, CA, USA maxxu@stanford.edu We investigate when the better than square-root cancellation phenomenon exists for ∑_n≤ Na(n)f(n), where a(n)∈ℂ and f(n) is a random multiplicative function. We focus on the case where a(n) is the indicator function of R rough numbers. We prove that loglog R ≍ (loglog x)^1/2 is the threshold for the better than square-root cancellation phenomenon to disappear. [ Max Wenqiang Xu =================== § INTRODUCTION The study of random multiplicative functions has attracted intensive attention. Historically, they were introduced to model arithmetic functions. A Steinhaus random multiplicative function f(n) is a completely multiplicative function defined on positive integers such that f(p) are independently and uniformly distributed on the complex unit circle for all primes p. One may view it as a random model for arithmetic functions like Dirichlet characters χ(n) or n^it. Another popular model is the Rademacher random multiplicative function f(n) which was first used by Wintner<cit.> as a random model for Möbius function μ(n). In this note, we focus on the Steinhaus case. The obvious dependence between random variables f(m) and f(n) whenever (m, n)≠ 1 makes the study of random multiplicative functions intriguing. Arguably the most striking result so far in the study of random multiplicative functions is Harper's <cit.> remarkable resolution of Helson's conjecture<cit.>, that is, the partial sums of random multiplicative functions enjoy better than square-root cancellation [|∑_n≤ x f(n) |] ≍√(x)/(loglog x)^1/4, where f(n) are random multiplicative functions. In particular, with the natural normalization √(x), the partial sums ∑_n≤ x f(n) do not converge in distribution to the standard complex normal distribution (see also <cit.>). Before Harper's result <cit.>, there was progress on proving good lower bounds close to √(x), e.g. <cit.>, and it was not clear that such better than square-root cancellation in (<ref>) would appear until Harper's proof. See also recent companion work on analogous results in the character sums and zeta sums cases established by Harper <cit.>. It is known that the better than square-root cancellation phenomenon in random multiplicative functions is connected to the “critical multiplicative chaos" in the probability literature. We point out references <cit.> for related discussions. A closely related important question in number theory is to understand the distribution of the Riemann zeta function over typical intervals of length 1 on the critical line ℜ𝔢(s)=1/2. One may crudely see the connection by viewing ζ(s) as a sum of n^-1/2-it for a certain range of n and n^it behaves like a Steinhaus random multiplicative function for randomly chosen t. A conjecture of Fyodorov, Hiary, and Keating (see e.g. <cit.>) suggests that there is a subtle difference between the true order of local maximal of log|ζ(1/2+it)| and one's first guess based on Selberg's central limit theorem for log|ζ(1/2+it)|. The existence of this subtle difference and the appearance of the better than square-root cancellation for random multiplicative functions both show that the corresponding nontrivial dependence can not be ignored. We refer readers to <cit.> for related discussions about partial sums of random multiplicative functions and zeta values distribution. In this paper, we are interested in further exploring Harper's result (<ref>) and methods used there, by considering the problem in a more general context. Let a(n) be a sequence in . When does the better than square-root cancellation phenomenon hold for ∑_n≤ N a(n)f(n), i.e. [|∑_n≤ Na(n) f(n)|] = o(√(∑_n≤ N|a(n)|^2))̊? We first make some simple observations in the situations where a(n) is “typical" or a(n) has a rich multiplicative structure. Then we focus on a particular case where the coefficient a(n) is an indicator function of a multiplicative set. §.§ Typical coefficients If partial sums ∑_n≤ Na(n)f(n) with the square-root size normalization behave like the complex standard Gaussian variable, then there is just square-root cancellation. One may attempt to prove such a central limit theorem by computing the high moments, however, the moments usually blow up and such a strategy does not work here (see e.g. <cit.> for moments computation results). It turns out that for “typical" choices of a(n), such a central limit theorem does hold. It has been carried out in the concrete case where a(n)=e^2π i n θ for some fixed real θ without too good Diophantine approximation property (such θ has relative density 1 in , e.g. one can take θ=π) by Soundararajan and the author <cit.>, and also an average version of the result is proved by Benatar, Nishry and Rodgers <cit.>. The proof of the result in <cit.> is based on McLeish's martingale central limit theorem<cit.>, and the method was pioneered by Harper in <cit.>. The proof reveals the connection between the existence of such a central limit theorem and a quantity called multiplicative energy of a:= {a(n): 1≤ n≤ N} E_×(𝐚): = ∑_m_1, n_1, m_2, n_2 ≤ N m_1m_2=n_1n_2a(m_1)a(m_2) a(n_1)a(n_2). A special case of a(n) is an indicator function of a set , and the quantity E_×() is a popular object studied in additive combinatorics. It is now known <cit.> that a crucial condition for such a central limit theorem holds for ∑_n≤ Na(n)f(n) is that the set has multiplicative energy ≤(2+ϵ)||^2. See <ref> for more discussions on a(n) being a “typical" choice. We refer readers who are interested in seeing more examples of when a central limit theorem holds for partial (restricted) sums of random multiplicative functions to <cit.>. §.§ Large multiplicative energy and sparse sets Let us focus on the case that a_n is an indicator function of a set . As we mentioned that if the set has small multiplicative energy (among other conditions), then partial sums exhibit square-root cancellation. Suppose we purposely choose a set with very large multiplicative energy, will it lead to better than square-root cancellation? One extreme example is = {p^n: 1≤ n ≤log_p N} being a geometric progression, where p is a fixed prime. A standard calculation gives that [| ∑_n∈ f(n) |] = ∫_0^1 |∑_n≤log_p Ne(θ n)| dθ≍loglog N, while [| ∑_n∈ f(n) |^2] = ||≍log N. It shows that there is a great amount of cancellation in this particular example. One may also take to be some generalized (multidimensional) geometric progression and get strong cancellation of this type. We note that the sets mentioned here with very rich multiplicative structures all have small sizes. Based on the initial thoughts above, we may lean toward believing that better than square-root cancellation only appears when a(n) has some particular structure that is perhaps related to multiplicativity. To fully answer Question <ref> seems hard. The majority of the paper is devoted to a special case, where a(n) is an indicator function of a set with multiplicative features. We focus on fairly large subsets. §.§ Main results: multiplicative support Suppose now that a(n) is a multiplicative function with |a(n)|≤ 1. The particular example we study in this paper is that a(n) is the indicator function of R-rough numbers, although the proof here may be adapted to other cases when a(n) is multiplicative. We write _R(x): = {n≤ x: p|n p≥ R}. By a standard sieve argument, for all 2≤ R≤ x/2 (the restriction R≤ x/2 is only needed for the lower bound), we have asymptotically |_R(x)| ≍x/log R. We expect the following threshold behavior to happen. If R is very small, the set _R(x) is close to [1,x] and better than square-root cancellation appears as in <cit.>. If R is sufficiently large, then weak dependence may even lead to a central limit theorem. Indeed, an extreme case is that R> √(x), in which _R(x) is a set of primes and {f(n): n∈} is a set of independent random variables. It is natural to ask to what extent the appearance of small primes is needed to guarantee better than square-root cancellation. Our Theorem <ref> and Theorem <ref> answer the question. We show that loglog R ≈ (loglog x)^1/2 is the threshold. Let f(n) be a Steinhaus random multiplicative function and x be large. Let _R(x) be the set of R rough numbers up to x. For any loglog R≪ (loglog x)^1/2, we have [|∑_n∈_R(x) f(n) |] ≪√(|_R(x)|)· ( loglog R + logloglog x/√(loglog x))^1/2 . In particular, if loglog R = o((loglog x)^1/2), then [|∑_n∈_R(x) f(n) |] =o ( √(|_R(x)|)). The term logloglog x is likely removable. But for the convenience of the proof, we state the above version. See Remark <ref> for more discussions. Let f(n) be a Steinhaus random multiplicative function and x be large. Let _R(x) be the set of R rough numbers up to x. For any loglog R≫ (loglog x)^1/2, we have [|∑_n∈_R(x) f(n) |] ≫√(|_R(x)|) . One probably can prove a lower bound of the shape √(||)·(loglog R / √(loglog x))^-1/2 when loglog R =o(√(loglog x)). We do not pursue this as we focus on finding the threshold value of R instead of caring about the quantification of the exact cancellation. We note that one way to derive a lower bound on L^1 norm is by proving an upper bound on L^4 norm. A simple application of Hölder's inequality gives that |_R(x)| = [|∑_n∈_R(x) f(n) |^2] ≤([|∑_n∈_R(x) f(n) |^4])^1/3([|∑_n∈_R(x) f(n) |])^2/3. The fourth moment ≪||^2 would imply that L^1 norm ≫√(||). However, to achieve such a bound on the fourth moment, one needs log R ≫ (log x)^c for some constant c, and thus this approach would not give the optimal range as in Theorem <ref>. Another reason for studying the fourth moment (multiplicative energy) is to understand the distribution. As mentioned before, this is the key quantity that needs to be understood in order to determine if random sums have Gaussian limiting distribution, via the criteria in <cit.>. One may establish a central limit theorem in the range R≫exp((log x)^c) for some small positive constant c[One trick to get a smaller c than by directly computing the fourth moment over the full sum is to take the anatomy of integers into account. We refer interested readers to <cit.> to see how this idea is connected to the correct exponent in extremal sum product conjecture of Elekes and Ruzsa <cit.>.]. Interested readers are suggested to adapt the proof of <cit.>. We do not pursue results along this direction in this note. Theorem <ref> and Theorem <ref> are both proved by adapting Harper's robust method in <cit.>, with some modifications, simplifications and new observations, and we sketch the strategy with a focus on how we find the threshold. We also refer readers to a model problem in the function field case by Soundararajan and Zaman <cit.>. The first step is to reduce the L^1 norm estimate to a certain average of the square of random Euler products. Basically, we prove that [|∑_n∈ f(n)|] ≈(x/log x)^1/2·[(∫_-1/2^1/2 |F^(R)(1/2 + it)|^2 dt )^1/2 ], where F^(R)(1/2+it) := ∏_R≤ p≤ x (1-f(p)/p^1/2+it)^-1 is the random Euler product over primes R≤ p ≤ x. The challenging part is to give a sharp bound on the above expectation involving |F^(R)(1/2+it)|^2 for |t|≤ 1/2. We first discuss the upper bound proof. If we directly apply Hölder's inequality (i.e. moving the expectation inside the integral in (<ref>)), then we would only get the trivial upper bound ≪√(||) as [|F^(R)(1/2+it)|^2]≈log x/log R. Harper's method starts with putting some “barrier events" on the growth rate of all random partial Euler products for all t. Roughly speaking, it requires that for all k, ∏_x^e^-(k+1)≤ p ≤ x^e^-k |1-f(p)/p^1/2+it|^-1 “grows as expected" for all |t|≤ 1. Denote such good events by 𝒢 and write s=1/2+it. By splitting the probability space based on the event 𝒢 holding or not, and applying Cauchy–Schwarz inequality, we have [(∫_-1/2^1/2 |F^(R)(s)|^2 dt )^1/2 ] ≈[(∫_-1/2^1/21_𝒢 |F^(R)(s)|^2 dt )^1/2] + [(∫_-1/2^1/21_𝒢 fail |F^(R)(s)|^2 dt )^1/2] ≪[(∫_-1/2^1/21_𝒢 |F^(R)(s)|^2 dt )^1/2] + (1_𝒢 fail)^1/2 ([|F^(R)(s)|^2])^1/2 . According to the two terms above, there are two tasks that remain to be done. * Task 1: Show that the expectation is small, conditioning on 1_𝒢. * Task 2: Show that (1_𝒢 fail) is sufficiently small. To accomplish task 1, Harper's method connects such an estimate to the “ballot problem" or say Gaussian random walks (see <ref>), which is used to estimate the probability of partial sums of independent Gaussian variables having a certain barrier in growth. Task 2 of estimating the probability of such good events 𝒢 happening can be done by using some concentration inequality, e.g. Chebyshev's inequality. Our main innovation lies in setting up “barrier events" in (<ref>) properly which is not the same as in <cit.>. On one hand, it should give a strong enough restriction on the growth rate of the products so that [(∫_-1/2^1/21_𝒢 |F^(R)(s)|^2 dt )^1/2] has a saving, compared to it without conditioning on 1_𝒢. On the other hand, one needs to show that such an event 𝒢 is indeed very likely to happen which requires that the designed “barrier" can not be too restrictive. To make the two goals simultaneously achieved, we need loglog R = o( √(loglog x)) and this is the limit that we can push to (see Remark <ref>). The lower bound proof in Theorem <ref> uses the same strategy as in <cit.> but is technically simpler. After the deduction step of reducing the problem to studying a certain average of the square of random Euler products (see (<ref>)), we only need to give a lower bound of the shape ≫ (log x / log R)^1/2 for the expectation on the right-hand side of (<ref>). Since the integrand |F^(R)(s)|^2 is positive, it suffices to prove such a lower bound when t is restricted to a random subset ℒ. We choose ℒ to be the set of t such that certain properly chosen “barrier events" hold. The main difficulty is to give a strong upper bound on the restricted product [1_t_1, t_2∈ℒ|F^(R)(1/2+it_1)|^2|F^(R)(1/2+it_2)|^2] in the sense that the bound is as effective as in the ideal situation where the factors |F^(R)(1/2+it_1)|^2 and |F^(R)(1/2+it_2)|^2 are independent (see Proposition <ref>), and this is also the main reason that the condition loglog R ≫√(loglog x) is needed subject to our chosen “barrier events". Our proof of Theorem <ref> does not involve the “two-dimensional Girsanov calculation", which hopefully makes it easier for readers to follow. §.§ Organization We set up the proof outline of Theorem <ref> in Section <ref> and defer the proof of two propositions to Section <ref> and Section <ref> respectively. We put all probabilistic preparations in Section <ref> which will be used in the proof for both theorems. The proof of Theorem <ref> is done in Section <ref> and again we defer proofs of two key propositions to Section <ref> and Section <ref> respectively. Finally, we give more details about the “typical" choices of a(n) in Section <ref>, as well as mentioning some natural follow-up open problems. §.§ Acknowledgement We thank Adam Harper for helpful discussions, corrections, and comments on earlier versions of the paper and for his encouragement. We also thank Kannan Soundararajan for the interesting discussions. The author is supported by the Cuthbert C. Hurd Graduate Fellowship in the Mathematical Sciences, Stanford. § PROOF OF THEOREM <REF> We follow the proof strategy of Harper in <cit.>. We establish Theorem <ref> in a stronger form that for 1/2≤ q ≤ 9/10 and R in the given range loglog R ≪ (loglog x)^1/2, [|∑_n∈_R(x) f(n) |^2q] ≪ |_R(x)|^q ( loglog R + logloglog x/√(loglog x))^q. One should be able to push the range of q to 1 but for simplicity in notation, we omit it. Our interest is really about the case q=1/2. Note that in the given range of R, by (<ref>), it is the same as proving [|∑_n∈_R(x) f(n) |^2q] ≪(x/log R)^q ( loglog R + logloglog x/√(loglog x))^q. The first step (Proposition <ref>) is to connect the L^1 norm of the random sums to a certain average of the square of random Euler products. We define for all s with ℜ𝔢(s)>0 and integers 0≤ k≤loglog x -loglog R, the random Euler products F_ k^(R)(s) : = ∏_R≤ p≤ x^e^-(k+1) (1- f(p)/p^s)^-1 = ∑_n≥ 1 p|n R≤ p≤ x^e^-(k+1)f(n)/n^s. We also write F^(R)(s): = ∏_R≤ p≤ x (1- f(p)/p^s)^-1 = ∑_n≥ 1 p|n R≤ p≤ xf(n)/n^s. We use the notation X_2q: = ([|X|^2q])^1/2q for random variable X. Let f(n) be a Steinhaus random multiplicative function and x be large. Let F_k^(R)(s) be defined as in (<ref>) and loglog R ≪ (loglog x)^1/2. Set 𝒦: =⌊logloglog x ⌋. Then uniformly for all 1/2 ≤ q≤ 9/10, we have ∑_n∈ f(n)_2q≤√(x/log x)∑_0≤ k ≤𝒦∫_-1/2^1/2 | F_ k^(R)(1/2 - k/log x+it)|^2dt_q^1/2 + √(x/log x). We remind the readers that the upper bound we aim for in Theorem <ref> is very close to √(x/log R). The second term in (<ref>) is harmless since log R is much smaller than log x. The second step deals with the average of the square of random Euler products in (<ref>), which lies at the heart of the proof. Let F_k^(R)(s) be defined as in (<ref>) and loglog R ≪ (loglog x)^1/2. Then for all 0≤ k ≤𝒦=⌊logloglog x ⌋, and uniformly for all 1/2≤ q≤ 9/10, we have [(∫_-1/2^1/2 |F_ k^(R)(1/2 - k/log x + it)|^2dt)̊^q]̊≪ e^-k/2·(log x/log R)̊^q ( loglog R + logloglog x/√(loglog x))^q . Apply Proposition <ref> and Proposition <ref> with q=1/2. Notice that when loglog R ≪ (loglog x)^1/2, the term √(x/log x) in (<ref>) is negligible and we complete the proof. § PROBABILISTIC PREPARATIONS In this section, we state some probabilistic results that we need to use later. The proof can be found in <cit.> (with at most very mild straightforward modification). §.§ Mean square calculation We first state results on mean square calculations. Let f be a Steinhaus random multiplicative function. Then for any 400<x≤ y and σ>-1/log y, we have [∏_x<p≤ y |1-f(p)/p^1/2+σ|^-2] = exp( ∑_x<p≤ y1/p^1+2σ + O(1/√(x)log x) ). The proof is basically using the Taylor expansion and the orthogonality deduced from the definition of a Steinhaus random multiplicative function. See <cit.>. We also quote the following result on two-dimensional mean square calculations. This will be used in proving the lower bound in Theorem <ref>. Let f be a Steinhaus random multiplicative function. Then for any 400<x≤ y and σ>-1/log y, we have [∏_x<p≤ y |1-f(p)/p^1/2+σ|^-2 |1-f(p)/p^1/2+σ+it|^-2 ] = exp( ∑_x<p≤ y2+2cos(tlog p)/p^1+2σ + O(1/√(x)log x) )̊. Moreover, if x>e^1/|t|, then we further have = exp( ∑_x<p≤ y2/p^1+2σ + O(1) ) . The proof of (<ref>) is in <cit.>. To deduce (<ref>), we only need to show the contribution involves cos(tlog p) terms are ≪ 1, which follows from a strong form of prime number theorem. See how it is done in <cit.> and <cit.>. §.§ Gaussian random walks and the ballot problem A key probabilistic result used in Harper's method is the following (modification of) a classical result about Gaussian random walks, which is connected to the “ballot problem". Let a ≥ 1. For any integer n > 1, let G_1, … , G_n be independent real Gaussian random variables, each having mean zero and variance between 1/ 20 and 20, say. Let h be a function such that |h(j)| ≤ 10 log j. Then (∑_m=1^j G_m ≤ a + h(j), ∀ 1≤ j≤ n) ≍min{1, a/√(n)}. Without the term h(j), it is a classical result and actually that is all we need in this paper. However, we state this stronger form as the h(j) term can be crucial if one wants to remove the logloglog x factor in Theorem <ref>. We expect the random sum is fluctuating on the order of √(j) (up to step j) and so the above result is expected to be true. The quantity h(j) is much smaller compared to √(j) so it is negligible in computing the probability. We do not directly use the above lemma. We shall use an analogous version for random Euler products (Proposition <ref>). We do the Girsanov-type calculation in our study. As in <cit.>, we introduce the probability measure (here x is large and |σ|≤ 1/100, say) (A) : = [1_A ∏_p≤ x^1/e |1-f(p)/p^1/2+σ|^-2 ]/[∏_p≤ x^1/e |1-f(p)/p^1/2+σ|^-2] . For each ℓ∈ℕ∪{0}, we denote the ℓ-th increment of the Euler product I_ℓ(s):= ∏_x^e^-(ℓ+2)<p≤ x^e^-(ℓ+1) (1-f(p)/p^s)^-1. Since we are restricted to R-rough numbers n, the parameter ℓ lies in the range 0≤ℓ≤loglog x - loglog R. All the rest setup is exactly the same as in <cit.>. There is a large natural number B such that the following is true. Let n≤loglog x - loglog R - (B+1), and define the decreasing sequence (ℓ_j)_j=1^n of non-negative integers by ℓ_j = ⌊loglog x -loglog R ⌋ -(B+1) - j. Suppose that |σ|≤1/e^B+n+1, and that (t_j)_j=1^n is a sequence of real numbers satisfying |t_j|≤1/j^2/3 e^B+j+1 for all j. Then uniformly for any large a and any function h(n) satisfying |h(n)| ≤ 10 log n, and with I_ℓ(s) defined as in (<ref>), we have (-a -Bj ≤∑_m=1^jlog |I_ℓ_m (1/2+σ + it_m)| ≤ a + j + h(j), ∀ j≤ n ) ≍min{1, a/√(n)} . One may view the above sum approximately as a sum of j independent random variables and each with mean ≈∑_x^e^-(ℓ+2)<p≤ x^e^-(ℓ+1)1/p≈ 1 and with constant variance between 1/20 and 20. This shows the connection to Lemma <ref>. The deduction of Proposition <ref> from Lemma <ref> can be found in the proof of <cit.>. The only modification is changing the upper bound restriction from n ≤loglog x -(B+1) to n ≤loglog x - loglog R -(B+1) and all conditions remaining satisfied. § PROOF OF PROPOSITION <REF> The proof follows closely to the proof of <cit.>. For any integer 0≤ k ≤𝒦= ⌊logloglog x ⌋, let I_k: =(x_k+1, x_k] := (x^e^-(k+1) , x^e^-k]. Let P(n) be the largest prime factor of n. For simplicity, we use _n to denote the sum where the variable n is R-rough. By using Minkowski's inequality (as 2q≥ 1), ∑_n∈ f(n)_2q≤∑_0≤ k ≤𝒦_n≤ x P(n)∈ I_k f(n)_2q + _n≤ x P(n)≤ x^e^-(𝒦+1) f(n)_2q . We first bound the last term by only using the smoothness condition and it is bounded by ≤Ψ (x, x^1/loglog x )^1/2≪√(x) (log x)^-clogloglog x, which is acceptable. The main contribution to the upper bound in (<ref>) can be written as = ∑_0≤ k ≤𝒦∑_m≤ x p|m p ∈ I_kf(m) _n≤ x/m n is x_k+1-smooth f(n) _2q. We now condition on f(p) for p small but at least R. Write ^(k) to denote the expectation conditional on (f(p))_p≤ x_k+1. Then the above is = ∑_0≤ k ≤𝒦 (^(k) [|∑_m≤ x p|m p ∈ I_k f(m) _n≤ x/m n is x_k+1-smooth f(n)|^2q])^1/2q ≤∑_0≤ k ≤𝒦 ([(^(k) [|∑_m≤ x p|m p ∈ I_kf(m) _n≤ x/m n is x_k+1-smooth f(n)|^2])^q])^1/2q = ∑_0≤ k ≤𝒦 ( [( ∑_m≤ x p|m p∈ I_k |_n≤ x/m n is x_k+1-smooth f(n)|^2)^q] )^1/2q. Then we only need to show that for each expectation in the sum, it is bounded as in (<ref>). Replace the discrete mean value with a smooth version. Set X=e^√(log x), and we have the expectation involving primes in I_k is ≪[(∑_m≤ x p|m p∈ I_kX/m∫_m^m(1+1/X) |_n≤ x/t n is x_k+1-smooth f(n)|^2 dt )̊^q]̊ + [( ∑_m≤ x p|m p∈ I_kX/m∫_m^m(1+1/X) |_x/t ≤ n≤ x/m n is x_k+1-smooth f(n)|^2 dt )̊^q]̊. By using Hölder's inequality, we upper bound the second term in (<ref>) by the q-th power of ∑_m≤ x p|m p∈ I_kX/m∫_m^m(1+1/X) [|_x/t ≤ n≤ x/m n is x_k+1-smooth f(n)|^2] dt . Do the mean square calculation (<ref>) and throw away the restriction on the R-rough numbers. Then (<ref>) is at most ≪ 2^-e^k x/log x and thus the second term in (<ref>) is ≪(2^-e^k x/log x)^q. Summing over k≤𝒦, this is acceptable and thus we only need to focus on the first term in (<ref>). By swapping the summation, it is at most [ ( ∫_x_k+1^x |_n≤ x/t n is x_k+1-smoothf(n) |^2∑_t/(1+1/X)≤ m ≤ t p|m p∈ I_k X/m dt)̊^q]̊. We upper bound the sum over m by dropping the prime divisibility condition and using a simple sieve argument to derive that the above is at most [ ( ∫_x_k^x |_n≤ x/t n is x_k+1-smoothf(n) |^2dt/log t)̊^q]̊ = x^q[ ( ∫_1^x/x_k+1 |_n≤ z n is x_k+1-smoothf(n)|^2dz/z^2log(x/z))̊^q]̊, where in the equality above we used the substitution z: =x/t. A simple calculation shows that we can replace log(x/z) by log x without much loss. Indeed, if z≤√(x) then log(x/z)≫log x; if √(x)≤ z ≤ x/x_k+1 then log (x/z) ≥ z^-2k/log xlog x. Thus, we further have the bound ≪(x/log x)̊^q[ ( ∫_1^x/x_k+1 |_n≤ z n is x_k+1-smoothf(n)|^2dz/z^2-2k/log x)̊^q]̊ . To this end, we apply the following version of Parseval's identity, and its proof can be found in <cit.>. Let (a_n)_n=1^∞ be any sequence of complex numbers, and let A(s): = ∑_n=1^∞a_n/n^s denote the corresponding Dirichlet series, and σ_c denote its abscissa of convergence. Then for any σ> max{0, σ_c}, we have ∫_0^∞|∑_n≤ xa_n|^2/x^1+2σdx = 1/2π∫_-∞^+∞|A(σ + it)/σ + it|^2 dt. Apply Lemma <ref> and the expectation in (<ref>) is = [ (∫_-∞^+∞|(1/2-k/log x +it)|^2/|1/2-k/log x +it|^2 dt)̊^q]̊≤∑_n∈[( ∫_n-1/2^n+1/2|(1/2-k/log x +it)|^2/|1/2-k/log x +it|^2 dt )̊^q]̊. Since f(m)m^it has the same law as f(m) for all m, for any fixed n we have [(∫_n-1/2^n+1/2 |(1/2-k/log x +it)|^2 dt )̊^q]̊ = [ (∫_-1/2^1/2 |(1/2-k/log x +it)|^2 dt )̊^q]̊. For n-1/2≤ t≤ n+1/2, we have 1/|1/2-k/log x +it|^2≍ 1/n^2 which is summable over n. We complete the proof by inserting the above estimates into (<ref>). § PROOF OF PROPOSITION <REF> This is the key part of the proof that reveals how loglog R ≈√(loglog x) could become the transition range. We begin with a discretization process which is the same as in <cit.>. For each |t|≤1/2, set t(-1)=t, and then iteratively for each 0≤ j ≤log(log x /log R) -2 define t(j): = max{u≤ t(j-1): u = n/((log x) /e^j+1)log ((log x) /e^j+1) for some n∈}. By the definition, we have <cit.> |t-t(j)|≤2/((log x /e^j+1)log ((log x)/e^j+1). Given this notation, let B be the large fixed natural number from Proposition <ref>. Let 𝒢(k) denote the event that for all |t|≤1/2 and for all k≤ j ≤loglog x - loglog R -B -2, we have (log x/e^j+1log R e^C(x) )^-1≤∏_ℓ = j ^⌊loglog x -loglog R ⌋-B-2 |I_ℓ(1/2-k/log x +it(ℓ)) | ≤log x/e^j+1log R e^C(x), where notably, our C(x) is chosen as the C(x):=loglog R + 100 logloglog x. We shall establish the following two key propositions. The first proposition says that when we are restricted to the good event 𝒢(k), the q-th moment is small. Let x be large and loglog R ≪ (loglog x)^1/2. Let C(x) be defined as in (<ref>). Let F_k^(R) be defined as in (<ref>) and 𝒢(k) be defined as in (<ref>). For all 0≤ k ≤𝒦 = ⌊logloglog x⌋ and 1/2≤ q ≤ 9/10, we have [(∫_-1/2^1/21_𝒢(k) |F_ k^(R)(1/2 - k/log x + it)|^2dt)̊^q]̊≪( log x /e^klog R)̊^q ( C(x)/√(loglog x))^q. The second proposition is to show that indeed 1_𝒢(k) happens with high probability. Let 𝒢(k) be defined as in (<ref>). For all 0≤ k ≤𝒦= ⌊logloglog x⌋ and uniformly for all 1/2≤ q ≤ 9/10 and C(x) defined in (<ref>), we have (𝒢(k) fails) ≪ e^-C(x). The above two key propositions imply Proposition <ref>. According to the good event 𝒢(k) happening or not, we have [(∫_-1/2^1/2 |F_ k^(R)(1/2 - k/log x + it)|^2dt)̊^q]̊ ≤[(∫_-1/2^1/21_𝒢(k) |F_ k^(R)(1/2 - k/log x + it)|^2dt)̊^q]̊ + [(∫_-1/2^1/21_𝒢(k)fails |F_ k^(R)(1/2 - k/log x + it)|^2dt)̊^q]̊ ≤( log x /e^klog R)̊^q ( C(x)/√(loglog x))^q + (∫_-1/2^1/2 [|F_ k^(R)(1/2 - k/log x + it)|^2]dt )̊^q(𝒢(k) fails)^1-q, where in the first term we used Proposition <ref> and we applied Hölder's inequality with exponents 1/q, 1/1-q to get the second term. We next apply the mean square calculation (<ref>) to derive that the above is ≪( log x /e^klog R)̊^q( ( C(x)/√(loglog x))^q + (𝒢(k) fails)^1-q)̊. Plug in the definition of C(x) and use Proposition <ref> with 1-q ≥ 1/10 (and then the exceptional probability to the power 1/10 is negligible) to deduce that ≪ e^-k/2( log x /log R)̊^q· ( C(x)/√(loglog x))^q, which completes the proof. We remark that in (<ref>), the quantity C(x)= loglog R +100 logloglog x is different from just being a constant C in <cit.>. The reason for our choice of C(x) is the following. Firstly, to keep the q-th moment in Proposition <ref> has a saving (i.e. to make ( C(x)/√(loglog x))^q small), we require that C(x)= o(√(loglog x)). Secondly, it turns out that in order to make the exceptional probability in Proposition <ref> small enough, one has the constraint loglog R ≪ C(x). The combination of the above two aspects together leads to loglog R =o(√(loglog x)). In the deduction of Proposition <ref>, we did not use an iterative process as used in <cit.>. Instead, we added an extra term 100logloglog x for the purpose of getting strong enough bounds on (𝒢(k) fails). We simplified the proof by getting a slightly weaker upper bound in Theorem <ref> as compensation. §.§ Proof of Proposition <ref> The proof of Proposition <ref> is a simple modification of the proof of Key Proposition 1 in <cit.>. We emphasize again the main difference is instead of using a large constant C as in <cit.> but replacing it with C(x) defined in (<ref>), and we do not need the extra help from the quantity h(j) which hopefully makes the proof conceptually easier. By using Hölder's inequality, it suffices to prove that [∫_-1/2^1/2 |F_k^(R)(1/2-k/log x + it)|^2dt ]≪ e^-k·log x/log R·C(x)/√(loglog x) , uniformly for 0≤ k ≤𝒦 = ⌊logloglog x ⌋ and 1/2 ≤ q≤ 9/10. We can upper bound the left-hand side of (<ref>) by ≤∫_-1/2^1/2[ |F_k^(R)(1/2-k/log x + it)|^2] dt where is the event that (log x/e^j+1log R e^C(x) )^-1≤∏_ℓ = j ^⌊loglog x -loglog R ⌋-B-2 |I_ℓ(1/2-k/log x +it(ℓ)) | ≤log x/e^j+1log R e^C(x) for all k≤ j ≤loglog x -loglog R -B -2. This is an upper bound as is the event of holds for all |t|≤1/2. By the fact that f(n) has the same law as f(n)n^it, we have ∫_-1/2^1/2[ |F_k^(R)(1/2-k/log x + it)|^2] dt = ∫_-1/2^1/2[ |F_k^(R)(1/2-k/log x )|^2 ]dt, where denotes the event that (log x/e^j+1log R e^C(x) )^-1≤∏_ℓ = j ^⌊loglog x -loglog R ⌋-B-2 |I_ℓ(1/2-k/log x +i(t(ℓ)-t)) | ≤log x/e^j+1log R e^C(x), for all k≤ j ≤loglog x- loglog R - B -2. We next apply Proposition <ref>. It is clear that ℋ(k,t) is the event treated in Proposition <ref> with n=⌊loglog x- loglog R ⌋ -(B+1)-k; σ= k/log x and t_m = t(⌊loglog x- loglog R ⌋ -(B+1) -m)-t for all m; and a = C(x) + B+1, h(j)=0. The parameters indeed satisfy |σ|≤1/e^B+n+1 and |t_m|≤1/m^2/3e^B+m+1 for all m. Apply Proposition <ref> to derive [ |F_k^(R)(1/2-k/log x)|^2]/[|F_k^(R)(1/2-k/log x)|^2] = (ℋ(k,t)) ≪min{ 1, a/√(n)}. A simple mean square calculation (see (<ref>)) gives that [|F_k^(R)(1/2-k/log x)|^2] = exp(∑_R≤ p ≤ x^e^-(k+1)1/p^1-2k/log x +O(1))̊≪log x/e^klog R. Combining the above two inequalities and the relation in (<ref>), we get the desired upper bound for the quantity in (<ref>). Thus, we complete the proof of (<ref>) and Proposition <ref>. §.§ Proof of Proposition <ref> In the proof, we will see why it is necessary to make C(x) large enough compared to loglog R. The proof starts with the union bound. We have (𝒢(k) fails) ≤_1 +_2, where _1 = ∑_k≤ j ≤log (log x/log R) -B-2( ∏_ℓ = j ^⌊log (log x/log R) ⌋-B-2 |I_ℓ(1/2-k/log x + i t(ℓ)) | >log x/e^j+1log R e^C(x) for some t)̊ and _2 = ∑_k≤ j ≤log (log x/log R) -B-2( ∏_ℓ = j ^⌊log (log x/log R) ⌋-B-2 |I_ℓ(1/2-k/log x +i t(ℓ)) |^-1 >log x/e^j+1log R e^C(x) for some t)̊, where |t|≤ 1/2. We focus on bounding _1, and _2 can be estimated similarly. Replace the set of all |t|≤ 1/2 by the discrete set 𝒯(x, j): = {n/((log x)/e^j+1) log ((log x)/e^j+1) : |n|≤ ((log x)/e^j+1) log ((log x)/e^j+1) }̊, and apply the union bound to get _1 = ∑_k≤ j ≤log (log x/log R) -B-2 t(j) ∈𝒯(x,j)( ∏_ℓ = j ^⌊log (log x/log R) ⌋-B-2 |I_ℓ(1/2-k/log x +it(ℓ)) | >log x/e^j+1log R e^C(x))̊. By using Chebyshev's inequality this is at most ≤∑_k≤ j ≤log (log x/log R) -B-2 t(j) ∈𝒯(x,j)1/(log x/e^j+1log R e^C(x))^2[ ∏_ℓ = j ^⌊log (log x/log R) ⌋-B-2 |I_ℓ(1/2-k/log x +it(ℓ)) |^2 ]. Since f(n) and f(n)n^it have the same law, the above is ≪∑_k≤ j ≤log (log x/log R) -B-2| 𝒯(x,j)|/(log x/e^j+1log R e^C(x))^2[ ∏_ℓ = j ^⌊log (log x/log R) ⌋-B-2 |I_ℓ(1/2-k/log x ) |^2 ]. The expectation here is, again through a mean square calculation (<ref>), ≪log x/e^j+1log R. Note |𝒯(x, j)| ≤ ((log x)/e^j+1) log ((log x)/e^j+1). We conclude that _1 ≪∑_k≤ j ≤log (log x/log R) -B-2e^loglog R-2C(x) + loglog ( log x / e^j+1) ≪ e^-C(x), where in the last step we used that C(x)= loglog R + 100 logloglog x. Thus we complete the proof of Proposition <ref>. § PROOF OF THEOREM <REF> We first notice that if R>x^1/A for any fixed large constant A, then _R(x) is a set of elements with only O_A(1) number of prime factors. This would immediately imply that [|∑_n∈ f(n)|^4] ≪_A ||^2 and by (<ref>), the conclusion follows. From now on, we may assume that R≤ x^1/A. The proof strategy of Theorem <ref> again follows from <cit.>. The main differences lie in the design of the barrier events and taking advantage of R being large. In particular, we do not need a “two-dimensional Girsanov-type" calculation which makes our proof less technical. We first do the reduction step to reduce the problem to understanding certain averages of random Euler products, as in the upper bound proof. There exists a large constant C such that the following is true. Let x be large and loglog R ≫√(loglog x). Let F^(R)(s) be defined as in (<ref>). Then, uniformly for all 1/2 ≤ q≤ 9/10 and any large V, we have ∑_n∈ f(n) _2q ≫√(x/log x)( ∫_-1/2^1/2 | F^(R)(1/2 +4V/log x + it)|^2 dt_q^1/2 - C/e^V∫_-1/2^1/2 | F^(R)(1/2 +2V/log x + it)|^2 dt_q^1/2 -C ). The remaining tasks are to give a desired lower bound on F^(R)(1/2 +4V/log x + it)_q^1/2 and an upper bound on F^(R)(1/2 +2V/log x + it)_q^1/2. The upper bound part is simple. Indeed, simply apply Hölder's inequality and do a mean square calculation (<ref>) to get [(∫_-1/2^1/2|F^(R)(1/2 +2V/log x + it)|^2 dt)^q] ≪(∫_-1/2^1/2[|F^(R)(1/2 +2V/log x + it)|^2] dt )^q≪(log x/Vlog R)^q . We next focus on the main task, giving a good lower bound on F^(R)(1/2 +4V/log x + it)_q^1/2. For each t∈ℝ, we use L(t) denote the event for all ⌊log V ⌋ +3 ≤ j ≤loglog x - loglog R -B -2, the following holds (log x/e^j+1log R e^D(x) )^-B≤∏_ℓ = j ^⌊loglog x -loglog R ⌋-B-2 |I_ℓ(1/2+4V/log x +it) | ≤log x/e^j+1log R e^D(x), where D(x):= c√(loglog x -loglog R) with c= 1/4min{loglog R/√(loglog x-loglog R) , 1 }≍ 1. We are now ready to define a random set ℒ: = {-1/2≤ t ≤ 1/2: L(t) defined by (<ref>) holds}. It is clear that [(∫_-1/2^1/2|F^(R)(1/2 +4V/log x + it)|^2 dt)^q] ≥[(∫_ℒ|F^(R)(1/2 +4V/log x + it)|^2 dt)^q]. We use the following estimate and defer its proof to Section <ref>. Let x be large and loglog R ≫√(loglog x). Let F^(R)(s) be defined as in (<ref>) and V be a large constant. Let ℒ be the random set defined in (<ref>). Then uniformly for any 1/2≤ q≤ 9/10, we have [(∫_ℒ|F^(R)(1/2 +4V/log x + it)|^2 dt)^q] ≫(log x/Vlog R)^q . Plug (<ref>), (<ref>) and (<ref>) into Proposition <ref> with q=1/2 (and choosing V to be a sufficiently large fixed constant so that C/e^V kills the implicit constant) to get that [|∑_n∈_R(x) f(n) |] ≫√(|_R(x)|) . This completes the proof of Theorem <ref>. § PROOF OF PROPOSITION <REF> The proof proceeds the same as in <cit.> (see also <cit.>) and we provide a self-contained proof here and highlight some small modifications. Let P(n) denote the largest prime factor of n as before. We have assumed that (<ref>) holds, e.g. R≤√(x) (This restriction is not crucial but makes the notation later easier). Let ϵ denote a Rademacher random variable independent of f(n), and recall that indicates that the variable n under the summation is R rough. For 1/2≤ q≤ 9/10, we have [|_n≤ x P(n)>√(x)f(n) |^2q] = 1/2^2q[|_n≤ x P(n)≤√(x)f(n) + _n≤ x P(n)>√(x)f(n)+_n≤ x P(n)>√(x)f(n)-_n≤ x P(n)≤√(x)f(n)|^2q] ≤[|_n≤ x P(n)≤√(x)f(n) + _n≤ x P(n)>√(x)f(n)|^2q] + [|_n≤ x P(n)>√(x)f(n)-_n≤ x P(n)≤√(x)f(n)|^2q] = 2[|ϵ_n≤ x P(n)>√(x)f(n) + _n≤ x P(n)≤√(x)f(n)|^2q] = 2[|_n≤ x f(n)|^2q], where the last step we used the law of ϵ_n≤ x P(n)>√(x)f(n)= ϵ∑_√(x)<p≤ x f(p) _m≤ x/p f(m) conditional on (f(p))_R≤ p ≤√(x) is the same as the law of _n≤ x P(n)>√(x)f(n). By the above deduction, it suffices to give a lower bound on _n≤ x P(n)>√(x)f(n)_2q. Do the decomposition _n≤ x P(n)>√(x)f(n) =∑_√(x)≤ p ≤ x f(p) _m≤ x/pf(m). The inner sum is determined by (f(p))_R≤ p≤√(x) and apply the Khintchine's inequality <cit.> to get [|_n≤ x P(n)>√(x)f(n)|^2q] ≫[(∑_√(x)< p ≤ x |_m≤ x/pf(m)|^2 )^q] ≥1/(log x)^q[(∑_√(x)< p ≤ xlog p·|_m≤ x/pf(m)|^2)^q]. Next, do the smoothing step as we did in the upper bound case. Again set X = e^√(log x). Write ∑_√(x)< p≤ xlog p · |_m≤ x/pf(m)|^2 = ∑_√(x)<p≤ xlog p ·X/p∫_p^p(1+1/X) |_m≤ x/p f(m)|^2dt. One has |a+b|^2≥ a^2/4 - min{|b|^2, |a/2|^2}≥ 0 and thus the above is at least 1/4∑_√(x)<p≤ xlog p ·X/p∫_p^p(1+1/X) |_m≤ x/t f(m)|^2dt -∑_√(x)<p≤ xlog p ·X/p∫_p^p(1+1/X)min{|_x/t≤ m≤ x/p f(m)|^2, 1/4 |_m≤ x/t f(m)|^2}. It follows that the quantity we are interested in has the lower bound [|_n≤ x P(n)>√(x)f(n)|^2q] ≥ 1/(log x)^q[(1/4∑_√(x)<p≤ xlog p ·X/p∫_p^p(1+1/X) |_m≤ x/t f(m)|^2dt)^q] - 1/(log x)^q[(∑_√(x)<p≤ xlog p ·X/p∫_p^p(1+1/X) |_ x/t<m≤ x/p f(m)|^2dt)^q]. Use Hölder's inequality and throw away the R-rough condition to upper bound the subtracted term in (<ref>) by ≤1/(log x)^q(∑_√(x)<p≤ xlog p ·X/p∫_p^p(1+1/X)[ |∑_ x/t<m≤ x/p f(m)|^2]dt)̊^q ≪1/(log x)^q(∑_√(x)<p≤ x log p · (x/pX +1) )^q≪1/(log x)^q(xlog x/X +x)^q≪ (x/log x)^q. The first term in (<ref>) (without the factor 1/4(log x)^q) is [(∑_√(x)<p≤ xlog p ·X/p∫_p^p(1+1/X) |_m≤ x/t f(m)|^2dt)^q] = [(∫_√(x)^x_t/1+1/X <p≤ t log p ·X/p|_m≤ x/tf(m)|^2 dt )^q] ≫ [(∫_√(x)^x|_m≤ x/tf(m)|^2dt )^q] = x^q[(∫_1^√(x) |_m≤ z f(m) |^2dz/z^2)^q]. To this end, we impose the smooth condition to invert the sums to Euler products. We have for any large V, [(∫_1^√(x) |_m≤ z f(m) |^2dz/z^2)^q] ≥[(∫_1^√(x) |_m≤ z x-smooth f(m) |^2dz/z^2+8V/log x)^q] ≥[(∫_1^+∞ |_m≤ z x-smooth f(m) |^2dz/z^2+8V/log x)^q]- [(∫_√(x)^+∞ |_m≤ z x-smooth f(m) |^2dz/z^2+8V/log x)^q] ≥[(∫_1^+∞ |_m≤ z x-smooth f(m) |^2dz/z^2+8V/log x)^q]- 1/e^2Vq[(∫_1^+∞ |_m≤ z x-smooth f(m) |^2dz/z^2+4V/log x)^q]. Apply Lemma <ref> to get that the first term is ≫[(∫_-1/2^1/2|F^(R)(1/2 + 4V/log x + it)|^2 dt )^q]. For the second term, an application of Lemma <ref> gives ≪ e^-2Vq[(∫_-∞^+∞|F^(R)(1/2 + 2V/log x + it)/|1/2 + 2V/log x + it|^2 dt )^q] ≪ e^-2Vq[(∫_-1/2^1/2 |F^(R)(1/2 + 2V/log x + it)|^2 )^q] where in the last step we used the fact that f(n)n^it has the same law as f(n) and ∑_n ≥ 1 n^-2 converges. Bounds in (<ref>) and (<ref>) together give the desired bound for the first term in (<ref>) and we complete the proof. § PROOF OF PROPOSITION <REF> In this section, we prove Proposition <ref>. The proof significantly relies on the following proposition, which is a mean value estimate of the product of |F^(R)(σ + it_1)|^2 and |F^(R)(σ + it_2)|^2. Our upper bound matches the guess if you pretend the two products are independent. Let x be large and loglog R ≫√(loglog x). Let F^(R)(s) be defined as in (<ref>) and V be a large constant. Let ℒ be the random set defined in (<ref>). Then we have [(∫_ℒ|F^(R)(1/2 +4V/log x + it)|^2 dt)^2] ≪ (log x/Vlog R)^2. The proof starts with an application of Hölder's inequality. We have [(∫_ℒ|F^(R)(1/2 +4V/log x + it)|^2 dt)^q] ≥([∫_ℒ|F^(R)(1/2 +4V/log x + it)|^2 dt])^2-q/([(∫_ℒ|F^(R)(1/2 +4V/log x + it)|^2 dt)^2])^1-q. Proposition <ref> gives a desired upper bound for the denominator. We next give a lower bound on the numerator. By using that f(n)n^it has the same law as f(n), the numerator is (∫_-1/2^1/2 [1_L(t)|F^(R)(1/2 +4V/log x + it)|^2] dt)^2-q= ([ 1_L(0)|F^(R)(1/2 +4V/log x )|^2] )^2-q . We next use Proposition <ref> by taking n=⌊loglog x - loglog R ⌋ - (B+1) - ⌊log V ⌋, a =D(x)=c√(loglog x -loglog R ) and h(j)=0 to conclude that (1_L(0))≫ 1. Combining with the mean square calculation (<ref>), we have [1_L(0)|F^(R)(1/2 +4V/log x + it)|^2] ≫(1_L(0))· [|F^(R)(1/2 +4V/log x + it)|^2] ≫log x/V log R. We complete the proof by plugging (<ref>) and (<ref>) into (<ref>). The proof of Proposition <ref> is a bit involved and its proof is inspired by <cit.> and <cit.>. We are not using the “two-dimensional Girsanov-type" computation as used in <cit.> which significantly simplified the proof. We do not expect any further savings when R is as large as stated in Proposition <ref> while for a smaller R, one might expect there could be further cancellation as in <cit.> which may be verified by adapting the “two-dimensional Girsanov-type" calculation. Expand the square and it equals [ ∫_-1/2^1/21_L(t_1) |F^(R)(1/2 +4V/log x + it_1)|^2 dt_1 ∫_-1/2 ^1/21_L(t_2)|F^(R)(1/2 +4V/log x + it_2)|^2 dt_2 ]. By using that f(n)n^it has the same law as f(n), we write the above as (t:= t_1-t_2) ∫_-1^1 [1_L(0) |F^(R)(1/2 +4V/log x )|^21_L(t)|F^(R)(1/2 +4V/log x + it)|^2 ] dt. For |t| large enough, the two factors behave independently, which is the easier case. Indeed, if |t|>1/log R, drop the indicator functions and bound the corresponding integration by ≪max_ 1/log R < |t|≤ 1 [ |F^(R)(1/2 +4V/log x)|^2· |F^(R)(1/2 +4V/log x + it)|^2 ] . Apply the two dimensional mean square calculation (<ref>) with (x, y)=(R, x) to conclude that the above is ≪(log x/V log R)^2. We next focus on the case |t|≤ 1/log R. Since f(p) are independent of each other, we can decompose the Euler products into pieces and analyze their contributions to (<ref>) separately. Define the following three sets of primes based on the sizes of primes 𝒫_1: = {p prime: R≤ p < x^e^-(⌊loglog x -loglog R ⌋-B-2)}, 𝒫_2: = {p prime: x^e^-(⌊loglog x -loglog R ⌋-B-2)≤ p ≤ x^e^-(⌊log V ⌋ +3)}, and 𝒫_3: = {p prime: x^e^-(⌊log V ⌋ +3) < p ≤ x }. We proceed as follows. Note that the events L(0) and L(t) are irrelevant to f(p) for p∈𝒫_1 ∪𝒫_3. For partial products over primes p∈𝒫_1 ∪𝒫_3, we directly do mean square calculations. For partial products over primes p∈𝒫_2, we will crucially use the indicator functions 1_L(0) and 1_L(t) defined in (<ref>) with j= ⌊log V ⌋ +3. This separation gives that the integration in (<ref>) over |t|≤ 1/log R is ∫_|t|≤1/log R[∏_p∈𝒫_1 ∪𝒫_3 |1-f(p)/p^1/2 +4V/log x|^-2 |1-f(p)/p^1/2 +4V/log x+it|^-2] ×[1_L(0)1_L(t)∏_p∈𝒫_2 |1-f(p)/p^1/2 +4V/log x|^-2 |1-f(p)/p^1/2 +4V/log x+it|^-2] dt. We first upper bound the expectation over primes in 𝒫_1 ∪𝒫_3 uniformly over all t. By using independence between f(p) and (<ref>), we can bound it as ≪exp( ∑_p∈𝒫_14/p^1+8V/log x + ∑_p∈𝒫_34/p^1+8V/log x). By simply using the prime number theorem and the definition of 𝒫_1 and 𝒫_3, one has that both sums in (<ref>) are ≪ 1 so that (<ref>) is ≪ 1, where we remind readers that B is a fixed constant. Now our task is reduced to establishing the following ∫_|t|≤1/log R[1_L(0)1_L(t)∏_p∈𝒫_2 |1-f(p)/p^1/2 +4V/log x|^-2 |1-f(p)/p^1/2 +4V/log x+it|^-2] dt ≪(log x/V log R)^2. Our strategy would be, roughly speaking, using the barrier event 1_L(t) to bound certain partial products involved with t directly and then use the mean square calculation to deal with the rest of the products. The exact partial products that we will apply barrier events would depend on the size of t. We first do a simple case, which helps us get rid of the very small t, say |t|<V/log x. We use the the condition 1_L(t) and pull out the factors related to L(t) to get that the contribution from |t|<V/log x is at most ≪∫_|t|≤V/log x e^2c√(loglog x- loglog R)· (log x/V log R)^2·[1_L(0)∏_p∈𝒫_2 |1-f(p)/p^1/2 +4V/log x|^-2] dt ≪V/log x· e^2c√(loglog x- loglog R)·(log x/V log R)^2·[∏_p∈𝒫_2 |1-f(p)/p^1/2 +4V/log x|^-2] ≪(log x/V log R)^2, where in the second last step we dropped the 1_L(0) condition, and in the last step we applied (<ref>) together with log R ≥exp(4c √(loglog x)) where c is defined in (<ref>). Thus we only need to establish the following ∫_V/log x≤ |t|≤1/log R[1_L(0)1_L(t)∏_p∈𝒫_2 |1-f(p)/p^1/2 +4V/log x|^-2 |1-f(p)/p^1/2 +4V/log x+it|^-2] dt ≪(log x/V log R)^2 . We now enter the crucial part where we will apply the barrier events according to the size of |t|. We decompose the set 𝒫_2 into two parts according to |t|. For each fixed V/log x≤ |t| ≤ 1/log R, we write 𝒫_2 = 𝒮(t) ∪ℳ(t), where 𝒮(t):={p prime: x^e^-(⌊loglog x -loglog R ⌋-B-2)≤ p ≤ e^V/|t|}, and ℳ(t):= {p prime: e^V/|t|≤ p ≤ x^e^-(⌊log V ⌋ +3)}. The set of primes 𝒮(t) would be those we will apply barrier events and ℳ(t) would be estimated by a mean square calculation. Note that for p∈ℳ(t), there is a nice decorrelation as we needed in (<ref>) due to that p≥ e^V/|t|. Let us now see how such a decomposition of 𝒫_2 would help us. We use a local notation G(p, t): = |1-f(p)/p^1/2 + 4V/log x+it|^-2. Then the quantity in (<ref>) is the same as ∫_V/log x≤ |t|≤1/log R[1_L(0)1_L(t)∏_p∈𝒫_2 G(p, 0) ∏_p∈𝒮(t) G(p, t) ∏_p∈ℳ(t) G(p, t) ] dt. We apply the barrier events condition 1_L(t) to bound the product over p∈𝒮(t) so that the above is at most ≪(V/log R)^2· e^2c√(loglog x - loglog R)·∫_V/log x≤ |t|≤1/log R1/t^2[1_L(0)∏_p∈𝒫_2 G(p, 0) ∏_p∈ℳ(t) G(p, t) ] dt. We next upper bound the expectation in (<ref>) uniformly for all V/log x≤ |t| ≤ 1/log R. We first drop the indicator function and rewrite the product based on the independence between f(p) to derive that [1_L(0)∏_p∈𝒫_2 G(p, 0) ∏_p∈ℳ(t) G(p, t)]≤[ ∏_p∈𝒮(t) G(p, 0)] · [∏_p∈ℳ(t) G(p, 0)G(p, t)]. Use the mean square calculation results in (<ref>) and (<ref>) to further get an upper bound on the expectation ≪V/|t|/log R·(tlog x/V^2)^2≪|t|(log x)^2/V^3log R . Now we plug the above bound to (<ref>) to get that (<ref>) is crudely bounded by (log x/log R)^2·e^2c√(loglog x- loglog R)/Vlog R·∫_V/log x≤ |t|≤1/log R1/|t| dt ≪(log x/log R)^2. In the last step we used that log R ≥exp(4c √(loglog x)) where c is defined in (<ref>). This completes the proof of (<ref>) and thus the proof of the proposition. § CONCLUDING REMARKS §.§ Typical behavior and small perturbations We give a sketch of the situation when a(n) itself is independently and randomly chosen. We write a(n) = r(n) X(n) where r(n)>0 is deterministic and X(n) are independently distributed with [|X(n)|^2]=1. We may naturally assume that there is some r such that r(n) ≍ r(m) ≍ r for all n, m, i.e. no particular random variable would dominate the whole sum in size. One may also just assume r=1 throughout the discussion here. We claim that for typical X(n), the random sums satisfy the sufficient condition established in <cit.> on having a Gaussian limiting distribution. The key condition one needs to verify is that almost surely (in terms of over X(n)), we have R_N(a) : =∑_ m_i, n_j≤ N m_i≠ n_j m_1m_2=n_1n_2 a(n_1)a(n_2) a(m_1) a(m_2) = o(r^4N^2). The proof of (<ref>) is straightforward. By using the divisor bound, we know there are ≪ N^2+ϵ number of quadruples (m_1, m_2, n_1, n_2) under the summation. If we expect some square-root cancellation among a(n_1)a(n_2) a(m_1) a(m_2), then R_N(a) above should be around r^4N^1+ typically. Indeed, by using the fact that all a(n) are independent, we have the L^2 bound [|R_N|^2] = [R_N R_N] ≪ r^8 N^2+. This leads to, almost surely (in terms of over X(n)), that we have R_N(a) = o(r^4N^2). To this end, by using <cit.>, almost surely, we have a central limit theorem for the random partial sums of a Steinhaus random multiplicative function. See <cit.> for a closely related result where they used the method of moments. In Question <ref>, we asked if it is possible to characterize the choices of a(n) that give better than square-root cancellation. On one hand, as discussed above, we know for typical a(n), there is just square-root cancellation. On the other hand, if a(n) is a deterministic multiplicative function taking values on the unit circle, then by the fact that a(n)f(n) has the same distribution as f(n) and the result established by Harper (<ref>), the partial sums ∑_n≤ N a(n)f(n) have better than square-root cancellation. Our main theorems study one particular example of multiplicative nature. Combining these observations, we believe that any small perturbation coming from a(n) that destroys the multiplicative structure would make the better than square-root cancellation in (<ref>) disappear. We ask the following question in a vague way as a sub-question of Question <ref>. Is it true that the only “essential choice" of a(n) leading to better than square-root cancellation is of multiplicative nature? §.§ Threshold in other settings and the limiting distribution The main theorems of this paper prove that there is square-root cancellation for loglog R ≫ (loglog x)^1/2. What is the limiting distribution then? We have remarked earlier that one may establish a central limit theorem when R≫exp((log x)^c) for some constant c<1 by understanding the corresponding multiplicative energy. It becomes less clear for smaller R. What is the limiting distribution of ∑_n∈_R(x) f(n) with “proper" normalization, for all ranges of R? We finally comment that there is another family of partial sums that naturally has the threshold behavior for better than square-root cancellation. Let = [x, y] with y≤ x. We would like to know for what range of y, typically, ∑_x≤ n ≤ x+y f(n) = o(√(y)). We believe one can adapt the argument here to find that the threshold behavior is around log (x/y) ≈√(loglog x). It is certainly interesting to understand the limiting distribution for the short interval case thoroughly, beyond the previous result in <cit.>. plain
http://arxiv.org/abs/2303.06810v1
20230313015653
Dynamic Clustering and Cluster Contrastive Learning for Unsupervised Person Re-identification
[ "Ziqi He", "Mengjia Xue", "Yunhao Du", "Zhicheng Zhao", "Fei Su" ]
cs.CV
[ "cs.CV" ]
Dynamic Clustering and Cluster Contrastive Learning for Unsupervised Person Re-identification Ziqi He, Mengjia Xue, Yunhao Du, Zhicheng ZhaoCorresponding author, Fei Su Beijing University of Posts and Telecommunications, Beijing, China {heziqi, xuemengjia, dyh_bupt, zhaozc, sufei}@bupt.edu.cn ======================================================================================================================================================================================================================== empty Unsupervised Re-ID methods aim at learning robust and discriminative features from unlabeled data. However, existing methods often ignore the relationship between module parameters of Re-ID framework and feature distributions, which may lead to feature misalignment and hinder the model performance. To address this problem, we propose a dynamic clustering and cluster contrastive learning (DCCC) method. Specifically, we first design a dynamic clustering parameters scheduler (DCPS) which adjust the hyper-parameter of clustering to fit the variation of intra- and inter-class distances. Then, a dynamic cluster contrastive learning (DyCL) method is designed to match the cluster representation vectors' weights with the local feature association. Finally, a label smoothing soft contrastive loss (L_ss) is built to keep the balance between cluster contrastive learning and self-supervised learning with low computational consumption and high computational efficiency. Experiments on several widely used public datasets validate the effectiveness of our proposed DCCC which outperforms previous state-of-the-art methods by achieving the best performance. Code is available at <https://github.com/theziqi/DCCC>. § INTRODUCTION Person Re-identification (Re-ID) aims to identify the desired target pedestrian from a large number of cross-camera surveillance images. Initially, researchers have mostly worked on supervised Re-ID methods based on deep network models<cit.>. However, as supervised Re-ID methods are widely arranged in real-world scenarios<cit.>, the volume of data becomes larger and the time costs of manual annotation become more expensive, leading to limitations in the development of supervised Re-ID. Therefore, in order to reduce the cost of manual annotation, unsupervised Re-ID methods, which use unlabeled data for training, have received a lot of attention from researchers. Unsupervised domain adaptation (UDA) Re-ID methods and fully unsupervised learning (USL) Re-ID methods are two types of unsupervised re-identification techniques. UDA Re-ID mthods involve a source domain without any annotation information and a target domain fully annotated based on transfer learning. However, the introduction of the source domain limits the model's performance. On one hand, the model's performance in the target domain is influenced by the quality of the knowledge learned in the source domain<cit.>. On the other hand, the discrepancy in data distribution between the source and target domains hinders sufficient knowledge transfer, which in turn inhibits the model's performance<cit.>. USL Re-ID methods, in contrast, only employ unlabeled datasets for training, which are more adaptable and scalable without other external factors. Recent methods commonly utilize plug-and-play modules, including a clustering algorithm, a memory bank and contrastive loss functions, together with network models to build an efficient and available USL Re-ID framework. Its remarkable performance has attracted a great deal of attention and taken a dominant place. They mostly follow this procedure in USL Re-ID task: (1) generating the corresponding pseudo-labels by a clustering algorithm; (2) computing the contrastive loss by the supervision of pseudo-labels for the input instances, called query instances, with the postive and negative from the memory bank; (3) updating the cluster representation vectors in the memory bank for the next iteration. Each iteration stage drives the network to learn robust and discriminative features. In this case, the feature distribution converges towards the ground truth distribution. However, these methods always ignore this actual variation in defining each module. For instance, the most usually applied clustering algorithm in USL Re-ID method is DBSCAN: Cheng<cit.> assign different values to the clustering parameter eps for different datasets, such as 0.5 on Market1501 and 0.6 on DukeMTMC-reID, while the values are 0.4 and 0.7 in ISE<cit.>. In general, the clustering parameters are usually taken empirically as the optimal fixed values<cit.>. However, this approach of setting clustering parameters may result in a mismatch between the parameters and the feature distribution, called feature misalignment. On one side, as Figure <ref> shows, during the training stage, the intra-class distances decrease, while the inter-class distances increase, and accordingly, the density of each cluster rises. On the other side, the clustering parameter eps of DBSCAN is a distance threshold determining whether two neighbouring instances are of the same class which represents the density of the clusters. Thus, eps is supposed to be adaptive to the distribution for prompting the clustering algorithm to generate high-quality pseudo-labels. The observation inspires us to review the modules of the currently common USL Re-ID framework. We have found that feature misalignment also occurs in the memory bank and the contrastive loss functions. The cluster representation vectors is often the average centroid or the hardest instance in a mini-batch. However, they only reflect the local feature distribution. If the model learns the difference between them and the query features, it may cause a distribution shift. Moreover, contrastive methods do not cope well with the effects of distortion from data augmentation. Because of the traditional training way of a single network, after data augmentation, positive pseudo instances may be more different from query instances, negative pseudo instances may be more similar to query instances<cit.>, and the distribution of the same query features may be inconsistent. To address the aforementioned problems, we propose a dynamic clustering and cluster contrastive learning (DCCC) method. DCCC designs a dynamic clustering parameters scheduler (DCPS) which continuously adjusts the clustering parameters to match the feature distribution as closely as possible during network training. We also propose a dynamic cluster contrastive learning (DyCL) method which optimizes the cluster representation vectors in the contrastive learning method by replacing the average centroid or the hardest positive instance with a dynamic cluster centroid. Based on the hard sample mining strategy<cit.>, the dynamic clustering centroid is the bridge between the weight parameters and the local feature distribution by assigning weights to each sample based on the feature distance in a mini-batch. In addition, DCCC also constructs a label smoothing soft contrastive loss (L_ss) function as the final loss function, which takes into account both cluster contrastive learning and self-supervised learning and reduces the computational cost. To summarize, our contributions are: (1) We propose a dynamic clustering parameters scheduler, which enables the clustering hyper-parameters to dynamically decay with the training process. To our knowledge, our work is the first detailed study around the parameter settings of the clustering algorithm in unsupervised Re-ID research. (2) We propose a dynamic cluster contrastive learning method based on hard sample mining, which fully considers each instance in the mini-batch and assigns corresponding weights to them to update the cluter representation vectors in memory bank, solving the inconsistency problem. (3) We also use self-supervised methods combined with cluster contrast scheme to construct a simple and efficient label smooth soft contrastive loss function, which enhances the consistency in the distribution of same query features. (4) Experiments validate the effectiveness of our proposed method, which outperforms the state-of-the-art method in USL Re-ID on datasets such as Market1501 and DukeMTMC-reID. § RELATED WORKS §.§ Unsupervised Person Re-ID The most current unsupervised pedestrian Re-ID methods can be roughly divided into fully unsupervised (USL) methods and unsupervised domain adaptation (UDA) methods. Due to the additional data introduced, UDA Re-ID often achieves better results than fully unsupervised methods. It requires labeled source domain data and unlabeled target domain data for training. Several UDA methods will transfer images from the source domain to the target domain utilizing Generative Adversarial Networks (GAN)<cit.>. The pseudo-label-based UDA methods will first pre-train the network on the source domain and then fine-tune the network on the target domain using the generated pseudo-labels<cit.>. Both of these methods focus on the transfer of knowledge from one domain to another. And USL Re-ID is more challenging and flexible in terms of data requirements as it only uses fully unlabeled data for training. Traditional methods use metric learning for personal retrieval tasks<cit.>. The performance bottleneck has been removed by clustering algorithms, and numerous USL Re-ID methods based on these algorithms have emerged<cit.>. Pseudo-labels generated by clustering algorithms or similarity estimation allow the model to train unlabeled data in a similar way to a labeled training model<cit.>. SpCL<cit.> is a unsupervised Re-ID self-paced contrastive learning framework based on instance-level memory. Cluster Contrast<cit.> employs cluster-level memory for addressing inconsistent updates of memory class centroids. ICE<cit.> incorporates the concepts of camera-aware, hard-sample mining, and soft-label in contrastive learning. However, the hard sample mining strategies in Re-ID's contrastive learning framework are often limited to a single hard sample and do not fully exploit global information. §.§ Clustering Algorithm A clustering algorithm's fundamental idea is dividing a dataset into clusters based on some criterion (typically distance) without any annotations. Clustering algorithms are frequently used in deep unsupervised learning due to their unsupervised capability and good performance. Clustering algorithms often calculate the similarity between samples using metrics Euclidean distance, Manhattan distance, and Jaccard similarity coefficient<cit.>. Clustering algorithms can be broadly categorised into Partition-based Methods, Density-based methods, Hierarchical Methods and so on. K-Means<cit.>, a partition-based method, is first used in unsupervised Re-ID, but it requires the number of clusters as a hyper-parameter, which is difficult to estimate for unsupervised learning. DBSCAN<cit.>, a density-based method, require the definition of two parameters eps and min_samples, which denote the neighbourhood radius of the density and the neighbourhood density threshold. The property of not requiring the number of clusters has led many unsupervised Re-ID algorithms to adopt DBSCAN. Nevertheless, fixed parameters of DBSCAN which is popular in cluster-based USL Re-ID method may lose the key context information at each training epoch. § PROPOSED APPROACH §.§ Overview We propose a USL Re-ID framework that combines dynamic clustering algorithms and cluster contrastive learning. The framework is based on a general framework for self-supervised learning<cit.> and Cluster Contrast<cit.>. Figure <ref> shows an overview of the framework. It includes backbone networks, a clustering algorithm, a memory bank, and other components. The overall training procedure is as follows. In USL Re-ID methods, a dataset is commonly denoted as X={x_1,x_2,...,x_N}, where each x_i is an unlabeled image, containing N pedestrian images totally. In each epoch of training, the initial stage is carried out first. The backbone networks consists of a teacher network and a student network. The student network is a regular network updated by gradient back-propagation, and its network parameters are denoted by θ_s. Given a picture x, f_θ_s(x) represents the output features of the student network. The teacher network's parameters θ_t are updated by the parameters of the student network by exponential moving average (EMA)<cit.>, which is formulated as follows: θ_t=λθ_t^' + (1-λ)θ_s where θ_t^' is the teacher network parameters from the previous iteration and λ is a momentum update hyper-parameter. DBSCAN then divides the output features of the student network into sets of instances that can be clustered and outliers that are not clustered, based on Jaccard similarity coefficient<cit.> pairs, and assigns them the corresponding pseudo-labels. The parameters of the clustering algorithm are determined by the dynamic clustering parameter scheduler (DCPS) that matches the global distribution of features. The mean value of the features in each instance set will be used as the initial cluster representation vector in the memory bank. In the training stage, we use PK sampling<cit.> where P pedestrian IDs are randomly selected and K pedestrian images are randomly drawn for each ID. Subsequently, the same query instances are fed into the student network and the teacher network after two different data augmentations. The dynamic custering contrastive learning (DyCL) performs a momentum update of the cluster representation vectors utilizing a hard sample mining strategy by the correlation between the student output features and the corresponding cluster representation vectors. Eventually, our proposed label smoothing soft contrastive Loss (L_ss) is the final loss function, calculated from the output features and the cluster representation vectors. §.§ Dynamic Clustering Parameter Scheduler The hyper-parameters of the clustering algorithms in USL Re-ID methods control the classification efficiency, eps in DBSCAN. However, in machine learning task, especially unsupervised Re-ID<cit.>, these hyper-parameters are static, which does not match the features that are constantly changing during the training process. The density of the clusters and the value of eps are closely related: if eps is too large, there will be too much noise in the clusters, and if eps is too small, many valid samples will be excluded. Coinciding with this paper, the learning rate<cit.> which is the most fundamental hyper-parameter in neural network dynamically decays too. Motivated by learning rate, a dynamic eps parameter strategies are given. We strive to ensure that the eps parameter variation curves fits the inter-class and intra-class distance variation curves in order to further align them. Then the inter- and intra-class distance variation curves are convex functions, which is demonstrated in Figure <ref>. We thus choose the monotonical exponential function. The eps value ϵ increases with each epoch to become a multiple of σ_e from the previous epoch. It can be formulated as follows: ϵ = ϵ_beign*σ_e^epochs where σ_e∈[0,1] is the decay ratio, and ϵ_beign is the initial eps value, witch is generally taken to be a larger number such as 0.7. Then epochs is the current number of epochs in training. Figure <ref> shows function plots for different dynamic clustering parameter scheduler where our proposed exponential dynamic parameter scheduler converges more closely to the feature distribution than the other two. In Figure <ref>, it can be seen that the eps parameter continues to decay without end, while the curves of inter-and intra-class distance first fall and rise steeply, and finally level off. If eps decreases when the feature distance is stable in the late training period, some information may be lost, which affects the quality of pseudo-labels. Therefore, we make the eps parameter terminate when reaching a certain value (one half of the initial value). §.§ Dynamic Cluster Contrastive Learning Classical USL Re-ID methods based on contrastive learning calculate the loss in the context of a mini-batch. In order to break the constraint which the methods pick positive and negative samples locally, the features of SpCL<cit.> are stored in the global memory and updated gradually with the training process. However, the batch training approach allows only some of the instances in a class to be updated in each iteration, leading to the unbalanced updating pace, which will shift the feature distribution. To solve this problem, Cluster Contrast<cit.> stores the cluster representation vectors directly in the memory bank and updates them in a uniform momentum manner. Where the ClusterNCE loss<cit.> can be formulated as: L_cluster = 𝔼[-logexp(q · c_+ / τ)/∑ ^C_i=1exp(q · c_i/τ)] where c_i is the i-th cluster representation vector stored in memory bank, c_+ is the cluster representation vector corresponding to q, τ is the temperature factor and C is the total number of clusters in pseudo-labels. Cluster representation vectors speed up the convergence of the model and also alleviate the inevitable drawbacks of the false positive due to the uncertainty of the clustering algorithm. Cluster representation vectors should reflect as much information about the class as possible to ensure learning accuracy. However, Cluster Contrast uses the average centroid or the hardest sample that do not reflect the holistic distribution. Inspired by adaptive weight triplet loss<cit.>, we propose a dynamic clustering contrastive learning (DyCL) method. Contrary to adaptive weight triplet loss, which adopts the hard sample mining strategy in pairwise loss to obtain the distance between positive and negative pairs, we employ dynamic weights to memory momentum updating, so that the model can fully exploit the valid information in the global context. According to the hard sample mining strategy, we assign a corresponding weight to similar instances of each query instance, with the harder instances having a greater weight. A softmax function is used to gain the weights of the samples in order to emphasize the significance of hard instances and prevent entering a local optimum due by: w_ij^dy = exp(-<c_i · z_j>/τ_w)/∑_m=1^N_iexp(-<c_i · z_m>/τ_w) where τ_w is the temperature coefficient hyper-parameter that affects the proportion of weights for hard instances, N_i is the instance number of i-th class in a mini-batch and z_m is the m-th instance feature of N_i. Note that the sum of weights is ∑_j=1^N_iw_ij^dy = 1. Thus, the i-th dynamic cluster centroid is the weighted mean in the mini-batch: ĉ_̂î = ∑_j=1^N_i w_ijz_j c_i ←γc_i + (1-γ)ĉ_̂î where γ is the hyper-parameter of momentum updating. A comparison with the other two contrastive learning methods is shown in Figure <ref>. It can be seen that DyCL is more responsive to the details of the feature distribution and that the adjustable τ_w hyper-parameter can further balance the global and local information. §.§ Label Smoothing Soft Contrastive Loss We have investigated the loss functions of existing USL Re-ID methods and found two potential improvements: Firstly, these methods tend to use more complex loss functions in order to enable the model to learn multiple tasks simultaneously. ICE<cit.> incorporates proxy loss, hard instance contrastive loss, and soft instance contrastive loss to reduce intra-class distribution differences and mitigate the distortion due to data augmentation. HDRCL<cit.> combines pseudo-label-based local-to-global contrastive loss and self-supervised probabilistic regression loss to enable the model to generate more discriminative features. PPLR<cit.> is even more targeted at the proposed part-based unsupervised Re-ID framework with four loss functions containing camera loss, local feature loss, global feature loss, and triplet loss. Besides the relatively heavier computational cost of loss and back-propagation, the overly complicated hyper-parameters and weights also make it difficult to tune. Secondly, since data augmentation may cause a degree of distortion, the features of the same query instances may differ, resulting in the similarity change within features, which affects the consistency of the feature distribution and possibly undermines the model performance. MMT<cit.> proposes a soft classification loss based on the 'Teacher-Student' model<cit.>, where computes the temporally averaged similarity probability of the teacher network output as a soft label to supervise the the student network, and the output of both networks can be consistent. This self-supervised method avoids the error amplification from perturbations in the feature distribution during training in a non-parametric manner<cit.>. To achieve the above goals, we try to combine contrast learning and self-supervised learning with only one loss function. We propose a label smoothing soft contrastive loss (L_ss) based on pseudo-labels refinement for the prediction of teacher features and clustering results. Specifically, we generate a refined smoothing soft label y^sm_k for each query instance: y^sm_k=μ_sy^t_k+(1-μ_s) ỹ_̃k̃ where ỹ_̃k̃ represents the clustering-generated pseudo-label of the query instance which is an one-hot label. μ_s∈[0,1] is a weight parameter controlling the ratio of the soft label y^t_k to the one-hot pseudo-label ỹ_̃k̃. Soft label y^t_k is the similarity probability of the query feature to the k-th class representation vector, which can be formulated as: y^t_k=exp(q_t · c_k / τ)/∑ ^C_i=1exp(q_t · c_i/τ) where q_t represents the query features from the teacher network, c_i is the i-th cluster representation vector, and α is the temperature coefficient hyper-parameter. In contrast to the one-hot pseudo-label which only exploits class information, the refined smoothing soft label additionally considers the consistency of feature distribution of the same query instance. Since ClusterNCE loss is effectively a cross-entropy loss<cit.>, plugging y^sm_k into Eq. <ref>, we can obtain the formula for the label smoothing soft contrastive loss as: L_ss=∑_k=1^C -y^sm_k · log(y^s_k) where y^t_k denotes the similarity probability of the teacher network, which also has the same expression as Eq. <ref>. Unlike previous work with a loss function consisting of multiple parts, the label smoothing soft contrastive loss L_ss integrates the contrastive and self-supervised methods with high computational efficiency and low computational consumption. § EXPERIMENT §.§ Dataset and Evaluation Protocol We validate the proposed method on three generic person Re-ID datasets, Market1501<cit.>, DukeMTMC-reID<cit.>, and MSMT17<cit.>, respectively. Market-1501 is collected from 6 cameras at the entrance of supermarkets in Tsinghua University campus. 12936 pedestrian images from 751 pedestrian IDs are included in the training set, and 19732 pedestrian images from 750 pedestrian IDs are included in the test set. DukeMTMC-reID is a subset of the DukeMTMC dataset, which is derived from 8 non-overlapping cameras. 16522 images from 702 pedestrian IDs in the dataset are training images, 2228 images from another 702 pedestrian IDs are query images, and 17661 are gallery images. MSMT17 is a recently proposed large person Re-ID dataset, containing a total of 126441 images from 4101 pedestrian IDs captured from 15 cameras, of which the training set contains 32621 images from 1041 pedestrian IDs and the test set contains 93820 images from 3060 pedestrian IDs. Our experiments validate the model performance using Rank-1, Rank-5 and Rank-10 precision of cumulative matching characteristics (CMC)<cit.> and mean average precision (mAP)<cit.> metrics. We don't use any post-processing operations, such as re-ranking<cit.>. §.§ Implementation Network structure. We used 4 Tesla V100 GPUs and Resnet50<cit.> as the encoder backbone for feature extraction, pre-trained on ImageNet<cit.>. We removed all modules after the fourth convolutional layer of the backbone networks and added a global average pooling layer (GAP), followed by a batch normalization layer<cit.> and a L2 normalization layer, with 2048-dimensional output features. Parameter settings. We use a warm-up strategy, where the learning rate grows linearly to 0.00035 for the first 20 epochs, and then stops decaying. We use Adam with a weight decay factor of 5e-4. The network performs 200 iterations in one epoch, for a total of 70 epochs. Each mini-batch contains 64 images from 4 pedestrian IDs, which means the batch size is 256. Before being fed into the network, each image is scaled down to a pixel size of 256×128 with data augmentation, including random inverting, random cropping and random erasing. We set the momentum update parameters γ to 0.1 in Eq. <ref>, τ of contrastive loss to 0.05 in Eq. <ref> and τ_w of dynamic weights to 0.09 in Eq. <ref>. Before the start of each epoch, we calculate the feature distances by Jaccard coefficients with a nearest neighbour parameter k of 30, and then DBSCAN generates the corresponding pseudo-labels for all features in the dataset, with the minimal number of neighbors set to 4. §.§ Ablation Study To validate the effectiveness of our proposed method, we conducted detailed comparative experiments on Market1501 and DukeMTMC-reID. We choose Cluster Contrast<cit.> as the baseline method for our experiments, which updates the cluster representation vectors directly with query instances. We verify the effectiveness of our proposed three components: the dynamic clustering parameter scheduler (DCPS), the dynamic cluster contrastive learning (DyCL) and the label smoothing soft contrastive loss (L_ss), and the results are shown in Tab. <ref>. We intuitively visualize the features extracted by baseline model and our DCCC model utilizing T-SNE<cit.> as shown in Figure <ref> which shows our cluster compactness and independence. Effectiveness of dynamic clustering parameter scheduler (DCPS). The effectiveness of DCPS is demonstrated by the comparison between the results in (♯ 1 and ♯ 3), (♯ 4 and ♯ 5), and (♯ 6 and ♯ 8), as shown in Tab.<ref>. DCPS enables the clustering parameter to no longer be fixed, but to vary dynamically with the feature distribution. The experimental results imply that DCPS benefits the clustering algorithm in generating high quality pseudo-labels. DCPS eventually uses the exponential EPS scheduler (ExpoES) from Sec. <ref> for DBSCAN. To further validate the effectiveness of ExpoES, we compare it with the step EPS scheduler (StepES) and the linear EPS scheduler (LinearES). As shown in Tab. <ref>. ExpoES has the most significant improvement on baseline, with mAP improving by 0.8 on Market1501 and DukeMTMC-reID. Effectiveness of dynamic cluster contrastive learning (DyCL). As shown in Tab. <ref>, the effectiveness of DyCL is illustrated by the comparison between the results in (♯ 1 and ♯ 2), (♯ 4 and ♯ 6) and (♯ 6 and ♯ 8). DyCL enables cluster representation vectors to be aligned with the feature distribution locally, enabling the model to learn finer-grained knowledge. We also experiment with the two non-dynamic cluster contrastive learning methods in Sec. <ref>. The results of the baseline, the cluster average contrastive learning (AvgCL) and the hardest sample contrastive learning (HardestCL) are not as good as the performance of DyCL in Tab. <ref>. Effectiveness of label smoothing soft contrastive loss (L_ss). The efficiency of L_ss can be observed in the comparison between (♯ 1 and ♯ 4), (♯ 2 and ♯ 6), (♯ 3 and ♯ 5) and (♯ 7 and ♯ 8) in Tab. <ref>. In terms of the performance, the baseline is greatly improved by 3.9%/1.7% and 1.0%/0.1% mAP/Rank-1 on Market1501 and DukeMTMC-reID via L_ss. In order to lessen the interference brought on by data augmentation, L_ss is built on a dual network topology including probabilistic distillation and contrastive loss based on label refinement. Additionally, the comparison of L_ss and cross-entropy loss can be seen in the appendix. §.§ Parameter Analysis We analyze the sensitivity of the hyper-parameter τ_w and μ_s. The value of τ_w affects the weighting of the difficult instances in the cluster representation vectors. A larger value of τ_w means a larger proportion of difficult instances, but the cluster representation vectors will contain less global information of query instances. Conversely, the smaller the value of τ_w taken, the more the model will be biased towards locally optimal solutions and will not achieve higher performance. To find the optimal τ_w in Eq. <ref>, we designed experiments to analyze the indicator curves of mAP and Rank-1 for τ_w ranging from 0.01 to 0.13 and intervals of 0.02, as shown in Figure <ref>. The best results were obtained at τ_w=0.03 on Market1501 and at τ_w=0.07 on DukeMTMC-reID. In Eq. <ref>, μ_s controls the significance of the redefined label in L_ss for soft labels. We tune this parameter finely with the others fixed. Large μ_s will bias the model more towards eliminating errors due to image distortion, but the model will have more trouble in learning intra- and inter-class information. Small μ_s will result in a reduction in noise immunity. If μ_s = 0, the loss function will decomposes down to be a cross-entropy loss function and cause the performance drop. Based on the experimental results in Figure <ref>, we set μ_s to 0.3 and 0.1 on Market1501 and DukeMTMC-reID, respectively. §.§ Comparison with State-of-the-Art Methods On three common datasets, Market1501, DukeMTMC-reID, and MSMT17, we compared our proposed DCCC with various advanced USL Person Re-ID methods. The results are given in Tab. <ref>. It can be shown from the comparison that DCCC outperforms previous methods including LOMO<cit.>, BOW<cit.>, BUC<cit.>, MMCL<cit.>, JVTC<cit.>, JVTC+, HCT<cit.>, UGA<cit.>, CycAs<cit.>, SpCL<cit.>, CAP<cit.>, ICE<cit.>, Cluster Contrast<cit.>, and IIDS<cit.>. Just like previous methods, DCCC do not use pre-trained data other than ImageNet. The baseline method Cluster Contrast utilizes clustering centroids too, but DCCC completely exploits the feature distribution of query instances. DCCC surpasses Cluster Contrast by 4.5%/1.8%, 1.4%/0.5%, 4.0%/6.3% for mAP/Rank1 on Market1501, DukeMTMC-reID and MSMT17. Moreover, unlike ICE, CAP and IIDS, DCCC don't use any camera information and achieves better performance with more limited information. Even more, DCCC outperformed some well-known supervised methods. Ultimately, our proposed method achieves 86.6%/94.1%, 74.0%/85.4%, 31.6%/62.3% results on Market1501, DukeMTMC-reID and MSMT17. Considering the different settings of backbone in ISE<cit.>, Cluster Contrast and HDCRL<cit.>, we provide the results of DCCC with generalized-mean pooling (GeM) and IBN-Net for a fair comparison and discuss their effectiveness in the appendix. § CONCLUSION In this paper, we propose a novel unsupervised Re-ID framework based on dynamic clustering and dynamic cluster contrastive learning. We design a dynamic cluster contrastive learning method with adaptive weights to store cluster representation vectors in cluster-level memory to solve the inconsistency problem. Then, we focus on the often overlooked clustering hyper-parameters by deploying a dynamic EPS scheduler to DBSCAN, resulting in a more stable clustering process. And we proposed a label smoothing soft contrastive loss to consider contrastive learning and self-supervised learning together with less computaional cost. Finally, we conduct experiments to validate the performance of the proposed method. Experiments' results show that our method has achieved the best performance comparing with those state-of-the-art methods. unsrt § APPENDIX §.§ Different Settings of Backbone IBN-Net<cit.> uses instance normalization and batch normalization jointly on the basis of ResNet, which greatly improves the generalization and learning ability of the model, and solves the problem of domain transfer well on the Re-ID task, so we conducted related experiments using IBN-ResNet50-a. GeM<cit.> is capable of adaptively implementing feature space mapping, with a more robust feature representation compared to average pooling and maximum pooling. We also replaced the global average pooling (GAP)in the vanilla ResNet50 with generalized-mean pooling (GeM) for comparison. As shown in Tab. <ref>, both IBN-Net and GeM pooling gave a considerable improvement to the network. §.§ Comparison between L_ss and L_ce+L_ss. Comparison tests are conducted to compare with the losses under the traditional single network configuration, and the findings are presented in Tab. <ref>. InfoNCE loss is a cross-entropy loss. displays the baseline cross-entropy loss (L_ce) based on a single st row network topology, while line 2nd row displays the situation in which L_ce and L_ss (+L_ss) are applied, with weights of 0.7. The experiments show that using L_ss alone achieves better results with less number of parameters and computational effort than with the former. §.§ Sensitivity analysis of hyper-parameter step We validate the simplest step EPS scheduler to exploit how does it work like the step learing rate scheduler. We conducted experiments on the step EPS scheduler with step=1,5,10,15, and the experimental results are shown in Figure <ref>. In particular, the step EPS scheduler degenerates to a linear EPS scheduler when step=1. It is easy to see that the performance degrades as step grows for both the Market1501 and DukeMTMC-reID. Therefore, the linear EPS scheduler is better than the step EPS scheduler.
http://arxiv.org/abs/2303.07327v1
20230313174539
Unsupervised HDR Image and Video Tone Mapping via Contrastive Learning
[ "Cong Cao", "Huanjing Yue", "Xin Liu", "Jingyu Yang" ]
cs.CV
[ "cs.CV", "eess.IV" ]
Unsupervised HDR Image and Video Tone Mapping via Contrastive Learning Cong Cao, Huanjing Yue, Member, IEEE, Xin Liu, Jingyu Yang, Senior Member, IEEE This work was supported in part by the National Natural Science Foundation of China under Grant 62072331 and Grant 62231018. C. Cao, H. Yue (corresponding author), X. Liu, and J. Yang are with the School of Electrical and Information Engineering, Tianjin University. March 30, 2023 at ============================================================================================================================================================================================================================================================================================================================================================== Capturing high dynamic range (HDR) images (videos) is attractive because it can reveal the details in both dark and bright regions. Since the mainstream screens only support low dynamic range (LDR) content, tone mapping algorithm is required to compress the dynamic range of HDR images (videos). Although image tone mapping has been widely explored, video tone mapping is lagging behind, especially for the deep-learning-based methods, due to the lack of HDR-LDR video pairs. In this work, we propose a unified framework (IVTMNet) for unsupervised image and video tone mapping. To improve unsupervised training, we propose domain and instance based contrastive learning loss. Instead of using a universal feature extractor, such as VGG to extract the features for similarity measurement, we propose a novel latent code, which is an aggregation of the brightness and contrast of extracted features, to measure the similarity of different pairs. We totally construct two negative pairs and three positive pairs to constrain the latent codes of tone mapped results. For video tone mapping, we propose a temporal-feature-replaced (TFR) module to efficiently utilize the temporal correlation and improve the temporal consistency of video tone-mapped results. We construct a large-scale unpaired HDR-LDR video dataset to facilitate the unsupervised training process for video tone mapping. Experimental results demonstrate that our method outperforms state-of-the-art image and video tone mapping methods. Our code and dataset will be released after the acceptance of this work. Image and video tone mapping, contrastive learning, video tone mapping dataset § INTRODUCTION In recent years, high dynamic range (HDR) imaging has been attracting more and more attention due to its superior performance in simultaneously revealing the details in dark and bright regions. However, since most devices only support low dynamic range display, tone mapping algorithms are required to compress the dynamic range of HDR images/videos to enable watching on LDR screens <cit.>. Traditional HDR image tone mapping methods can be classified into global tone mapping <cit.> and local tone mapping <cit.>. Recently, the deep learning based methods have also been introduced to tone mapping. For supervised learning, the problem is how to obtain the ground truths for the input LDRs. One solution is utilizing several available tone-mapping algorithms to generate the LDRs and the LDR result with the highest tone mapped quality index (TMQI) is selected as the ground truth <cit.>. However, the performance is limited by the upper bound of the available tone-mapping methods. Another solution is training the tone mapping network with enhancement datasets, where the paired data are originally constructed for image retouching or low-light image enhancement <cit.>. Since there exists a domain gap between the under-exposure or low-light images and HDR images, the network trained on the enhancement dataset cannot work well for HDR tone mapping. Recently, Vinker et al. <cit.> propose to use unpaired HDR-LDR images for unsupervised training and has achieved promising performance. They utilize structure loss to preserve the structure consistency between HDR and LDR output, and utilize generative adversarial network (GAN) loss to force the brightness and contrast of outputs close to those of high quality LDRs. However, there still remains a lot of under-enhanced areas in their results. Therefore, developing better unsupervised training strategy is demanded. For HDR video tone mapping, only traditional methods are developed <cit.>. How to avoid temporal flickering and maintain rich details simultaneously is still a challenge in video tone mapping. The works in <cit.> utilize global operators which can generate results with good temporal coherency but low spatial contrast. The works <cit.> using local operators can generate results with high contrast but more temporal artifacts. Therefore, developing an effective video tone mapping method to achieve a good balance between temporal consistency and richful details is demanded. Based on the above observations, we propose a unified method for both image and video tone mapping. Our contributions are summarized as follows. * We propose an effective HDR image tone mapping network. We propose a Spatial-Feature-Enhanced (SFE) module, which utilizes graph convolution, to enable information exchange and transformation of nonlocal regions. We propose a Temporal-Feature-Replaced (TFR) module to extend our method to HDR video tone mapping which is MAC-free and can efficiently utilize the temporal correlation and improve the temporal consistency of tone-mapped results. * Unsupervised learning is difficult to be optimized and we propose a set of unsupervised loss functions to improve the result. First, we propose domain and instance based contrastive loss, in which we construct five negative and positive pairs to constrain the outputs to be close with well LDRs and construct a suitable latent space for measuring the similarity of the latent codes in negative and positive pairs. Second, we further propose naturalness loss to constrain the brightness and contrast of outputs. * We construct a large-scale unpaired HDR-LDR video dataset with both real and synthetic HDR and LDR videos, which is beneficial for the development of video tone mapping. Experimental results demonstrate that our method outperforms existing state-of-the-art image and video tone-mapping methods. § RELATED WORKS In this section, we give a brief review of related work on HDR image and video tone mapping, image and video enhancement, and contrastive learning. §.§ HDR Image and Video Tone Mapping Traditional HDR image tone mapping algorithms include global tone mapping <cit.> and local tone mapping <cit.>. Global tone mapping <cit.> utilizes a global curve to compress the HDR image, which can keep the relative brightness of the input image, but usually leads to a severe reduction in local contrasts. Local tone mapping <cit.> is good at improving local contrasts and details, but usually leads to halo artifacts among high-contrast edges. For DNN-based HDR image tone mapping methods, there are mainly three categories. One category focuses on supervised learning <cit.>, and they apply several tone-mapping algorithms to HDR images and select the result which has the highest TMQI <cit.> as the ground truth. The second category regards tone mapping as image enhancement task and uses the enhancement dataset with paired data for training <cit.>. The last category gets rid of the LDR-HDR pairs, and utilizes unpaired HDR and LDR data <cit.> or only HDR data <cit.> for unsupervised training. These works either focus on the unsupervised loss functions <cit.> or utilize no-reference image quality assessment metric to optimize the tone mapping network on HDR images <cit.>. On the basis of image TMO, traditional video tone mapping algorithms <cit.> further introduce temporal processing to keep temporal stability. Although there exist lots of DNN-based HDR image TMO methods, there is still no DNN-based video TMO methods. In this work, We propose a unified unsupervised learning method for both image and video tone mapping. We further construct a large-scale unpaired HDR-LDR video dataset to facilitate the development of video tone mapping. §.§ Image and Video Enhancement Image (video) enhancement is similar to tone mapping since it also aims at improving the brightness and contrast of the inputs. Traditional image enhancement methods are usually histogram-based (HE) or retinex-based methods. HE-based methods pay attention to changing the histogram of the input image to improve the brightness and contrast <cit.>. Retinex-based methods decompose an input image into reflectance and illumination layers, and then enhance the image by adjusting the illumination layer <cit.>. For DNN-based image enhancement methods, there are three kinds of training strategies which are full-supervised learning <cit.>, semi-supervised learning <cit.>, and unsupervised learning methods <cit.>. For unsupervised learning, the work in <cit.> maps low-quality smartphone photo to high-quality DSLR photo by utilizing CycleGAN-like architecture <cit.>. The works in <cit.> design unsupervised loss functions to train zero-shot models. The work in <cit.> proposes a self-regularized perceptual loss to constrain content consistency between low-light images and enhanced images, and utilize adversarial learning to enhance contrast and brightness. There are several DNN-based video enhancement methods <cit.>, but all of them are based on supervised learning and paired data. Since there exists distribution gap between the low-light images for image enhancement and the HDR images, directly applying image (video) enhancement methods to tone mapping can not achieve satisfactory results (see the experiments). §.§ Contrastive Learning Contrastive learning has achieved promising progress in self-supervised and unsupervised representation learning <cit.>. It aims to improve the representation of the anchor by pushing it away from negative samples and pulling the anchor close to positive samples in the latent space. The key is how to construct positive and negative pairs, and find the latent space for distance measuring. Recently, contrastive learning has been applied to low-level vision tasks, such as image translation <cit.>, super-resolution <cit.>, dehazing <cit.>, deraining <cit.>, and underwater image restoration <cit.>. For the strategy to construct positive and negative pairs, the work in <cit.> views content consistent patches in two domains as positive pairs and views other patches as negative samples. The work in <cit.> applies contrastive learning to unsupervised degradation estimation, taking the same and different degradations as positive and negative pairs respectively. The works in <cit.> take high-quality images as positive samples, and take low-quality input images as negative samples. For the latent feature (code) for distance measuring, <cit.> utilizes VGG <cit.> network to extract latent features, <cit.> utilizes an extra encode network to code the degradation types, <cit.> utilize the features extracted by the training network itself. For unsupervised image (video) tone mapping, since there are no paired supervisions, the extracted features by the generator of different images (videos) have different contents and they cannot be directly utilized for distance measuring. Therefore, we propose to aggregate the mean brightness and contrast of different channels and utilize it as the latent code of the tone-mapped images (videos). § THE PROPOSED METHOD In this section, we first introduce the network structure and then present our compound loss functions. §.§ Network Structure Given an HDR image (video) I^h, we aim to generate its high-quality LDR image (video) I^o through our network IVTMNet, as shown in Fig. <ref>. IVTMNet is constructed by a UNet-like generator and a discriminator. To capture the global statistics of brightness and contrast, we introduce the spatial feature enhanced (SFE) module at the bottom level of the UNet. For video tone mapping, we propose temporal feature replaced (TFR) module, which is beneficial for temporal consistency. It is convenient to switch between video and image TMO by removing the TFR module since this module is MAC (multiply–accumulate operation) free. The discriminator is utilized to distinguish the tone mapped result and it is constructed by cascaded convolutions with stride 2. Inspired by <cit.>, we also perform tone-mapping on the luminance channel (Y) in YUV space. We denote the input and output Y channel as Y^h and Y^o, respectively. Y^o is converted to I^o by incorporating the original U and V channels of I^h. The key modules of our network are TFR and SFE, whose details are given in the following. §.§.§ Spatial-Feature-Enhanced (SFE) Module A large receptive field is beneficial for image (video) enhancement since it can capture global statistics of brightness and contrast <cit.>. In this work, we adopt graph convolution proposed in <cit.> to further enhance the spatial features and enlarge the receptive field of the network. We split the feature map into a number of patches and each patch is treated as a node. These nodes construct a graph by connecting neighboring nodes. This graph can transform and exchange information from all the nodes. In this way, similar patches with long distances can exchange and share information, which can improve the performance. Following <cit.>, we also apply multi-layer perceptron (MLP) module after the graph convolution for node feature transformation. To save computation cost, we only utilize the SFE module at the bottom scale of the UNet. §.§.§ Temporal-Feature-Replaced (TFR) Module Compared with image tone mapping, the major challenge for video tone mapping is making the results temporal consistent. Traditional video tone mapping methods usually solve this problem in two ways, i.e., utilizing flow-guided local filtering or temporal smoothness after tone mapping. A simple temporal smoothness strategy is blending the results of previous frames with current frame I_t, denoted by Φ̃(I_t) = αΦ(I_t)+ (1-α)Φ̃(I_t-1), where Φ() represents the tone mapping operation and Φ̃(I_t) represents the temporal filtering result of Φ(I_t). However, this may introduce ghosting artifacts. In this work, we propose a TFR module to imitate it. Recently, alignment-free module has been widely used in video denoising <cit.>. TFR module can be regarded as a kind of alignment-free module. Since the TFR module is applied during the feature extraction process other than the final fusion process, our module can alleviate the ghosting artifacts while improving the temporal consistency. Specifically, for each frame Y_t, we split its corresponding feature F_t into F^1_t and F^2_t along the channel dimension by a certain ratio β (it is set to 1/32 in our experiments). We replace part of the feature of current frame F^1_t with the feature of its previous frame F^1_t-1, then concatenate F^1_t and F^2_t-1, constructing the temporal enhanced feature F̂_t for the t^th frame. The whole process is formulated by F^1_t, F^2_t = Split(F_t) F^1_t-1, F^2_t-1 = Split(F_t-1) F̂_t = Concat(F^1_t,F^2_t-1) As Fig. <ref> shows, we insert the TFR module after each feature extraction block. Since this module is applied on the multi-scale feature level, the network can selectively utilize the feature F^2_t-1, which help reduce the flicking but avoid the ghosting artifacts. For the completely static regions, this operation can help reduce noise since two frames with the same objects but different noise are fused. Therefore, the proposed TFR can help reduce the flicking artifacts and avoid ghosting artifacts. Note that, during testing, we utilize a buffer to save the features of the previous frame, which can be recurrently used for predicting the result of the next frame. §.§ Loss Functions Since there are no perfect HDR-LDR image (video) pairs for supervised learning, we propose unsupervised losses to optimize the network. The following are the details for these loss functions. §.§.§ Structure Loss The tone mapping process should only change the brightness of the objects and not change the content. Therefore, we adopt the structure loss proposed in <cit.> to preserve the content and structure between the input HDR data and output of the network. The structural similarity between two images is measured by Pearson correlation <cit.>, which can be formulated as ρ(I_1,I_2) = 1/n_p∑_p_I_1,p_I_2cov(p_I_1, p_I_2)/σ(p_I_1)σ(p_I_2), where p_I_1 and p_I_2 are patches in images I_1 and I_2, cov(·,·) and σ(·) are covariance and standard deviation computed on patches, n_p is the total number of patches. It is extended to structure loss as: ℒ_Struct = ∑_t=1^T∑_k∈{0,1,2}ρ(↓^kY^h_t,↓^kY^o_t), where ↓^k represents downsampling operations for the k^th spatial scale (k=0 represents the original resolution and k=1 represents the 1/2 downsampled resolution) and t represents the temporal index for consecutive frames in video. For image tone mapping, T is 1. §.§.§ Adversarial Loss We utilize adversarial learning to help the network generate pleasant results. We train our discriminator network D to distinguish between the generator's output Y^o and unpaired well LDR data Y^wl. The generator G is trained to generate good images (videos) to fool the discriminator. Different from <cit.>, which uses least-squares GAN <cit.>, we adopt the Dual Contrastive GAN <cit.> for training since it can further improve the feature representations. The discriminator loss is formulated as ℒ_DCL-D = 𝔼_Y^wl[loge^D(Y^wl)/e^D(Y^wl)+∑_Y^o e^D(Y^o)] +𝔼_Y^o[loge^-D(Y^o)/e^-D(Y^o)+∑_Y^wl e^-D(Y^wl)], where ∑_xf(x) represents the sum of N processed samples f(x). The first item aims at teaching the discriminator to disassociate a single well LDR image (video) against a batch of generated images (videos). The second item aims at disassociating a single generated image (video) against a batch of well-LDR images (videos). The generator loss can be correspondingly formulated as ℒ_DCL-G = 𝔼_Y^wl[loge^-D(Y^wl)/e^-D(Y^wl)+∑_Y^o e^-D(Y^o)] +𝔼_Y^o[loge^D(Y^o)/e^D(Y^o)+∑_Y^wl e^D(Y^wl)], The final adversarial loss can be formulated as ℒ_DCL-Adv = ℒ_DCL-D + λ_Advℒ_DCL-G where λ_Adv is the weighting parameter (which is set to 0.1) to control the ratio between discriminator and generator loss. §.§.§ Contrastive Learning Loss In this work, we propose domain-based and instance-based contrastive learning (CL) losses for tone mapping. Domain-based Contrastive Learning Loss For low level vision tasks, CL methods usually assume low-quality inputs as negative samples and high-quality targets as positive samples, and make the output (anchor) to be close to the targets and far away from the inputs <cit.>. However, the output could easily fall into the third domain: enough far away from the input domain, but not very close to the target domain. To avoid falling into this situation in tone mapping, besides the input HDR, we further select LDR data with poor quality (such as unpleasant brightness and contrast) from the public dataset as another negative domain. The poor LDRs can be regarded as failure cases of tone mapping. We push the output not only far away from the input HDR domain but also far away from the poor LDR domain. In other words, our negative pairs consist of two kinds, i.e., the outputs and the inputs, the outputs and the poorly-exposed LDRs. Our positive pairs are constructed by the outputs and the well-exposed LDRs. The other question is finding the latent space for distance measuring. Considering that our discriminator has learned feature representations to distinguish the outputs of our generator and well LDRs, we utilize the discriminator (D) to extract features for CL, other than utilizing a universal VGG network <cit.><cit.>. Specifically, we utilize the features after the last convolution layer of D but before being flattened into a vector. Then we calculate the mean value (μ_i) and the mean contrast (τ_i, which is calculated according to <cit.>) of each channel (C_i) and concatenate them together to build the latent code, denoted as z=[μ_1,μ_2,...μ_m,τ_1,τ_2,...,τ_m], where m is the channel number of the convolution feature. We denote this process as ϕ. In this way, we construct the latent codes for Y^o, Y^wl (the well exposed LDR data), Y^pl (the poorly exposed LDR data), and Y^h, and they are denoted as z_D^o, z_D^wl, z_D^pl, and z_D^h respectively, where D represents these latent codes are from the discriminator features. Since Y^o and Y^h are different formats of the same content, z_D^h can be viewed as the intra-negative sample of the anchor z_D^o. Similarly, z_D^wl is the inter-positive sample and z_D^pl is the inter-negative sample since they have different contents from the anchor. Therefore, our domain-based contrastive learning loss can be formulated as ℒ_CLD = E[-logs(z^o_D, z^wl_D)/s(z^o_D, z^wl_D)+∑_i=1^Ns(z^o_D, z^h_i_D)] + E[-logs(z^o_D, z^wl_D)/s(z^o_D, z^wl_D)+∑_i=1^Ns(z^o_D, z^pl_i_D)], where the first (second) term utilizes z_D^h (z_D^pl) as negative samples and N is the negative sample number. We propose to combine the cosine distance and ℓ_1 distance to measure the similarity between the latent codes, i.e., s(u, v)=exp(u^T v/η+c|u-v|_1), where η and c denote weighting parameters to balance the two distances. ℒ_D-CL = E[-logsim(F^O_D, F^WL_D)/sim(F^O_D, F^WL_D)+∑_i=1^Nsim(F^O_D, F^H_D)] + E[-logsim(F^O_D, F^WL_D)/sim(F^O_D, F^WL_D)+∑_i=1^Nsim(F^O_D, F^BL_D)], where sim(u, v)=exp(u^T v/c+k|u-v|_1), we combine cosine distance and L1 distance to measure the similarity between feature vectors, c and k denote weighting parameters to balance two distances. And we take F^WL_D as positive sets, take F^H_D and F^BL_D as negative sets in the first and second item respectively. Instance-based Contrastive Learning Loss Besides contrastive learning with images (videos) from different domains, we further make the generator learn from itself dynamically. We observe that for one batch of images (videos), some samples are tone-mapped well while some are not. Therefore, we propose instance-based contrastive learning to push the output apart from the poorly tone-mapped samples and pull the output close to the well tone-mapped samples. We utilize TMQI <cit.> metric to evaluate the tone-mapped result. For each batch, the image with the highest TMQI score is selected as the positive sample, and the image with the lowest TMQI score is selected as the negative sample. Since the results of one batch have different TMQI scores, their features before the final output layer of the generator also contain many differences. Therefore, we utilize the generator's feature maps before the last convolution to construct the latent codes. The construction process is the same as that in domain-based contrastive learning loss. The latent codes for the inter-positive and inter-negative samples are denoted as z_G^wo and z_G^po, respectively. The latent codes for the whole batch are denoted as z_G^o. In this way, our instance-based contrastive learning loss can be formulated as ℒ_CLI = E[-logs(z^o_G, z^wo_G)/s(z^o_G, z^wo_G)+ s(z^o_G, z^po_G)], where s(u, v) is the same as that defined in Eq. <ref>. ℒ_I-CL = E[-logsim(F^O_D, F^WO_D)/sim(F^O_D, F^WO_D)+∑_i=1^Nsim(F^O_D, F^BO_D)], §.§.§ Naturalness Loss We further propose the naturalness loss by measuring the naturalness of an image with its mean brightness and mean contrast (which is calculated according to <cit.>). On the one hand, we supervise the naturalness of the output with other well LDR data (namely inter supervision), which have pleasant brightness and contrast. This loss is formulated as ℒ_N_1 = ∑_t=1^T|ϕ(Y^wl_t)-ϕ(Y^o_t)|_1, where ϕ denotes the operation for calculating naturalness. On the other hand, we observe that for one image, there exist some areas well-tone-mapped. Therefore, we split the output into n×n (n is set to 2 in our experiment) patches and select the patch with the highest TMQI score as the intra label, denoted as Y^wp_t. This loss is formulated as ℒ_N_2 = ∑_t=1^T|ϕ(Y^wp_t)-ϕ(Y^o_t)|_1. The two terms together form our naturalness loss. For image TMO, the T in the above two formulas is equal to 1. Real-label Naturalness Loss Well LDR videos has the pleasant brightness and contrast. We take LDR videos as real label to supervise the naturalness of generator's output. Our real-label naturalness loss can be formulated as ℒ_R-N = ∑_t=1^T|𝒩(Y^WL_t)-𝒩(Y^O_t)|_1, where 𝒩 denotes the operation for caculating naturalness. Pseudo-label Naturalness Loss For each iteration, in the output of generator, there exists some area enhanced well. We split the output into n×n patches and select the patch with highest TMQI score as pseudo label Y^P_t. Our pseudo-label naturalness loss can be formulated as ℒ_P-N = ∑_t=1^T|𝒩(Y^P_t)-𝒩(Y^O_t)|_1, §.§.§ Total Variation Loss To remove magnified noise in dark regions, we further apply total variation (TV) loss to the generator's output Y^o_t, denoted as ℒ_TV = ∑_t=1^T (|∇_xY^o_t|+|∇_yY^o_t|)^2, where T is the number of video frames in video TMO, and is equal to 1 in image TMO. ∇_x and ∇_y represent the horizontal and vertical gradient operations, respectively. With the aforementioned loss functions, our full loss function can be denoted as ℒ = ℒ_Struct + λ_1 ·ℒ_DCL-Adv + λ_2 ·ℒ_CLD + λ_3 ·ℒ_CLI + λ_4 ·ℒ_N_1 + λ_5 ·ℒ_N_2 + λ_6 ·ℒ_TV where the weighting parameters (λ_1 ... λ_6) are used to control the ratio of each loss. § DATASET §.§ Image Tone Mapping Dataset Following <cit.>, we also utilize 1000 HDR images from HDR+ dataset and the well-exposed LDR images from DIV2K dataset <cit.> for image tone mapping training. Since our domain-based CL loss needs poorly-exposed LDR data, we further utilize 1300 images with unpleasant brightness and contrast from <cit.> as poorly-exposed LDR images for training. Follow the settings of <cit.>, we crop and rescale every training image to a size of 256×256. We evaluate the performance on the HDR Survey <cit.>, HDRI Haven <cit.> and LVZ-HDR dataset <cit.>, which is the same as <cit.>. §.§ Video Tone Mapping Dataset There is no available supervised or unsupervised dataset for video tone mapping and there is no perfect solution to generate ground truth LDR videos for HDR inputs. Therefore, we construct the unpaired HDR-LDR video dataset to enable the unsupervised training of our network. First, we construct the unpaired HDR-LDR video dataset with real captured videos. We collect HDR videos from traditional HDR tone mapping works <cit.> and HDR reconstruction works <cit.>. Considering that the HDR videos with large flicker artifacts will affect the evaluation of tone mapping algorithms, we remove them and totally collect 100 HDR videos with high quality. For LDR videos, we select 80 well-exposed LDR videos from DAVIS dataset <cit.> for adversarial learning and constructing positive pairs in contrastive learning. Most of our collected HDR videos are 1280×720, so that we resize the other videos (1920×1080, 1476×753) to 1280×720 to unify the resolution, which will simplify the following patch cropping process. The 100 HDR videos are split into training and validation set (80 videos), and testing set (20 videos). Considering that both adversarial learning and contrastive learning require a large amount of training data to improve the optimization process, we further construct synthesized HDR and LDR videos. Specifically, we synthesize videos from static images by dynamic random cropping. We utilize 1000 HDR images from HDR+ dataset <cit.>, 780 well LDR images from DIV2K dataset <cit.> and 1300 poorly LDR images with unpleasant brightness and contrast from <cit.>. For one image, We first randomly downsample it with a ratio of γ and then randomly crop T patches with a resolution of 256×256 to construct a sequence with T frames. The downsampling ratio γ ranges from 1 to 2.8. When γ is small, the probability that the cropped patches have overlapped regions is small. In this case, we simulate videos with large movements and vice versa. The synthesized poorly-LDR videos are used for negative pair construction in CL. The well LDR videos are used for adversarial learning and positive pair construction. In summary, our video tone mapping dataset contains 1100 HDR videos, 860 well LDR videos, and 1300 poorly LDR videos. Among them, 20 real captured HDR videos are selected for testing. § EXPERIMENTS §.§ Training Details During image TMO training, each image is cropped and rescaled to provide two 256×256 images, which is the same as <cit.>. During video TMO training, we resize the real HDR and LDR videos from 1920×1080 to 455×256, and randomly crop 256×256 squences for training. The synthetic HDR and LDR videos are also downsampled and then cropped to 256×256 squences, which has been described in Section <ref>. Therefore, the training patches has a large dynamic range. The batch size is set to 8. For video tone mapping, the frame number T is set to 3. We train our generator and discriminator with learning rate 1e-5 and 1.5e-5 respectively, and they decay by half for every 10 epochs. For each iteration in the training process, we first optimize the discriminator by maximizing Eq. <ref> and then optimize the generator by minimizing Eq. <ref>. The sample number N in Eqs. <ref>, <ref> and <ref> is set to 16. The parameters η and c in Eq. <ref> are set to 1e-2 and 1. The weighting parameters λ_1 ... λ_6 for different loss functions are dynamically updated. At the early stage (smaller than 7 epochs), we optimize the network mainly by adversarial learning and contrastive learning. Therefore, λ_1 ... λ_6 are set to 1, 0.5, 0.1, 0.001, 0.001, 0.001, respectively. At the middle stage (7-10 epochs), we magnify the weight λ_4 (by setting it to 0.5), which forces the network to generate better brightness and contrast. At the later stage (10-20 epochs), we further force the network to learn from itself and λ_5, λ_6 are set to 0.5 and 0.2, respectively. §.§ Ablation Study In this section, we perform ablation study to demonstrate the effectiveness of the proposed loss functions and TFR, SFE modules. To explore the influence of each component for the tone mapping and temporal consistence, we perform ablation study on our video TMO test data. We utilize two measurements to evaluate the tone-mapping quality. The first is the widely used TMQI <cit.> score. The second is warping error (WE) <cit.>, which is widely used to evaluate the temporal consistence of processed frames. However, it tends to reward the tone-mapping methods that generate dark results which are not the aim of the tone-mapping task. Therefore, we propose the relative warping error (RWE) measurement by dividing the warping error by the mean intensity, which is formulated as Y̅^o_t = ψ(Y^o_t,Y^o_t-1) RWE = 2/HW∑_i=1^H ∑_j=1^W |Y^o_t-1(i,j)-Y̅^o_t(i,j)|/Y^o_t-1(i,j)+Y̅^o_t(i,j), where ψ(x,y) denotes warping x towards y, and Y̅^o_t is the warping result. H and W denote the height and width of Y^o_t. In this work, we utilize deepflow <cit.> to serve as the warping operation. For each video, we select the first six frames and calculate the mean TMQI and RWE scores for all the testing videos. The results are given in Table <ref>. For the baseline model (ℒ_Struct), we utilize structure consistency loss and GAN loss. It can be observed that the TMQI score is consistently improved by introducing the proposed loss functions. After introducing the proposed contrastive loss, the RWE score is increased since more details are revealed. Fortunatelly, after introducing the TV loss, the RWE score is reduced and TMQI score is also increased slightly. When the TFR module is removed , the TMQI score is degraded and the RWE value is increased from 4.38 to 4.92. It verifies that the propsoed TFR module is beneficial for temporal consistency. In addition, the proposed SFE module can improve the TMQI score since it encourages information exchange in non-local regions. We further give the ablation for the detailed settings of our contrastive learning (CL) loss and naturalness loss. 1) Negtative pair ablation. CL methods for low-level vision usually assume low-quality inputs as negative samples and high-quality targets as positive sample <cit.>. Different from them, we utilize extra poorly-exposed LDRs as negative samples to calculate our domain-based contrastive learning loss, which has been formulated as Eq. <ref>. The first and the second term utilizes input HDR z_D^h and poorly-exposed LDRs z_D^pl as negative samples, respectively. To analyze the influence of poorly-LDR negative samples, we remove the second term, and the results are given in the first row of Table <ref>. When the poorly-LDR negative samples are removed, the TMQI score is decreased and the RWE value is increased, which demonstrates that the introduced poorly-LDR samples are important to the success of contrastive learning. 2) Latent code ablation. In our CL loss, our latent code is built by the the mean value (μ_i) and the mean contrast (τ_i) of each feature channel (C_i). Here, we evaluate it by replacing it by an intuitive setting. Specifically, we replace our latent code with global averaging of feature maps. It can be observed that the TMQI score is degraded by replacing our latent code with the intuitive one, as shown in Table <ref>. 3) Distance measurement ablation. We propose a new distance measurement to calculate the similarity between latent codes, which has been formulated as Eq. <ref>. To demonstrate the effectiveness of the distance measurement, we replace it with cosine distance. As shown in Table <ref>, our proposed distance measurement is much better than cosine distance. and list the quantitative comparison results on our HDR video test set in Table <ref>. The averaged TMQI scores of all frames are listed in the second column of the Table <ref>. Warping Error (WE) <cit.> is a common metric to evaluate the temporal stability of models, but not suitable for tone-mapping results with different brightness. For example, Warping Error will reduce when multiply the results with a darkness factor. We propose the Relative Warping Error (RWE) to evaluate the temporal stability of HDR video tone mapping results. We calculate RWE by dividing WE by the image pixel, which can be formulated as Y̅^O_t = Warp(Y^O_t,Y^O_t-1) RWE = 1/H× W∑_i=1^H ∑_j=1^W |Y^O_t-1-Y̅^O_t|_1/Y^O_t-1+Y̅^O_t, where Y̅^O_t denotes warping current frame Y^O_t to previous frame Y^O_t-1, H and W denote the height and width of images. Fig. <ref> presents the visual comparison results for the ablation study. It can be observed that introducing contrastive loss can improve the contrast for both dark and over-exposed areas. It is mainly due to that our domain-based contrastive learning can push the output away from the poorly LDR videos which contain lots of under-exposed and over-exposed regions. Our instance-based contrastive learning can further help the network learn form itself to generate better results. By introducing the naturalness loss, the dark areas can be further lightened. §.§ Comparison for HDR Image Tone Mapping To demonstrate the effectiveness of the proposed TMO for image tone mapping, we compare with state-of-the-art image tone mapping methods on HDR Survey dataset <cit.>, HDRI Haven dataset <cit.> and LVZ-HDR dataset <cit.>, respectively. Since TMOCAN<cit.> did not release the pretrained model, we retrain it on the HDR+ dataset for fair comparison. The results are shown in Tables <ref>, <ref>, and <ref>, respectively. Besides TMQI, we further utilize blind TMQI (BTMQI) <cit.> to evaluate the tone mapping quality. It can be observed that our method achieves the best TMQI and BTMQI scores in all three image TMO datasets. For HDR Survey dataset, our method outperforms the second best method UnpairedTMO by 0.013 and 0.06 gain for TMQI and BTMQI scores. For HDR Haven dataset, our method outperforms the second best method by 0.014 and 0.11 gain for TMQI and BTMQI scores. For LVZ-HDR dataset, our method outperforms the second best method by 0.016 and 0.131 gain for TMQI and BTMQI scores. Fig. <ref> present the visual comparison results on the three image TMO datasets respectively. Among them, DeepTMO <cit.> sometimes generates results with false colors, such as the bluish tree in the first row of Fig. <ref>. The work in <cit.> generates over-enhanced results which have unnatural contrast and textures. The works in <cit.> and <cit.> sometimes generate under-exposed results, especially on several scenes in the HDRI Haven dataset. The work in <cit.> usually generates over-exposed results, as shown in Fig. <ref> (c). UnpairedTMO <cit.> can generate better results, but there usually exists under-exposed and over-exposed areas. Compared with these methods, our method has the best visual quality with suitable brightness and contrast. §.§ Comparison for HDR Video Tone Mapping In this section, we further demonstrate the effectiveness of the proposed TMO for video tone mapping. Since there is no DNN-based video TMOs, we compare with state-of-the-art traditional image <cit.> and video tone mapping methods <cit.>, DNN-based image tone mapping methods <cit.> and image enhancement methods <cit.> on our proposed HDR video test set. Among them, the works in <cit.> only utilize HDR data for training, namely zero-reference based solution. The works in <cit.> and our method utilize unpaired HDR-LDR data for unsupervised learning. For fair comparison, we retrain all the DNN-based methods on our dataset (due to this reason, many tone-mapping methods without codes cannot be compared). Table <ref> lists the quantitative results. It can be observed that our proposed method achieves the best TMQI and BTMQI scores. For TMQI, our method outperforms the second best method UnpairedTMO <cit.> by 0.013 and meanwhile our RWE value is smaller than that of <cit.>. It demonstrates that our method is good at revealing details and keeping temporal consistency. Compared with image enhancement methods, our method achieves nearly 0.15 and 2 gain for TMQI and BTMQI scores, respectively. This verifies that the enhancement methods are not suitable for tone mapping. Compared with traditional tone mapping methods, our method still achieves obvious gains in terms of TMQI and BTMQI scores. Note that the video tone mapping method <cit.> achieves the best RWE value but its TMQI and BTMQI scores are much worse than other methods. It implies that the lower RWE value of <cit.> may be caused by results with low contrast. Fig. <ref> presents the visual comparison results on four scenes in our test set. Since the retrained image enhancement methods have uncompetitive results and the page space is limited, we only show the visual comparison results with the video tone mapping method (a) <cit.> and two DNN based tone-mapping methods (b) TMOCAN <cit.>, and (c) UnpairedTMO <cit.>. Full comparisons are provided in our supplementary file. It can be observed that our method has the best visual quality with suitable brightness and contrast. The video tone mapping method <cit.> generates darker results than other methods, but the lantern in the third row is over-exposed. <cit.> generates over-enhanced results which have unnatural contrast and textures. For example, for the fourth image, the buildings are under-enhanced and the clouds are over-enhanced. UnpairedTMO <cit.> can generate better results, but the wall and curtain in the first and third scenes are under-exposed. In contrast, our results have pleasant brightness and contrast in all areas. §.§ Computing Complexity In this section, we further give the computing complexity comparison in terms of multiply-add operations (MACs), as shown in Table <ref>. For our method, we give three realizations with different channel numbers. Specifically, we reduce the channel number of IVTMNet_full to construct IVTMNet_0.75 and IVTMNet_0.5, whose channel numbers are 0.75 and half of our full solution, respectively. It can be observed that IVTMNet_full, IVTMNet_0.75 and IVTMNet_0.5 are the top three models in terms of TMQI and BTMQI scores. IVTMNet_0.5 has the lowest MACs and its RWE value is slightly worse than that of IVTMNet_full. IVTMNet_0.75 achieves a good balance between tone mapping performance and computing complexity. § CONCLUSION In this paper, we explore unsupervised image and video tone mapping by proposing an effective IVTMNet and a set of unsupervised loss functions. It is convenient to switch between image and video TMO by introducing TFR module, which can improve the temporal consistency of video tone-mapped results. To improve unsupervised training, we propose domain and instance based contrastive learning loss and propose a new latent space in which to measure the similarities in negative and positive pairs. Experimental results on image and video tone mapping dataset demonstrate the superiority of the proposed method in enhancing brightness and contrast and keeping temporal consistency of tone-mapped results. IEEEtran
http://arxiv.org/abs/2303.07328v1
20230313174802
Perturbations of Fefferman spaces over CR three-manifolds
[ "Arman Taghavi-Chabert" ]
math.DG
[ "math.DG", "gr-qc", "math-ph", "math.CV", "math.MP", "Primary 53C18, 32V05, 53C50, 83C15, Secondary 32V10, 32V30, 53B30" ]
We introduce a generalisation of Fefferman's conformal circle bundle over a contact Cauchy–Riemann three-manifold. These can be viewed as exact `perturbations' of Fefferman's structure by a semi-basic one-form, which encodes additional data on the CR three-manifold. We find conditions on the Weyl tensor and the Bach tensor for a Lorentzian conformal four-manifold equipped with a twisting non-shearing congruence of null geodesics to be locally conformally isometric to such a perturbed Fefferman space. We investigate the existence of metrics in the perturbed Fefferman conformal class satisfying appropriate sub-conditions of the Einstein equations, such as the so-called pure radiation equations. These metrics are defined only off cross-sections of Fefferman's circle bundle, and are conveniently expressed in terms of densities that generalise Gover's notion of almost Einstein scales. Our setup allows us to reduce the prescriptions on the Ricci tensor to the underlying CR three-manifold in terms of differential constraints on a complex density and the CR data of the perturbation one-form. One such constraint turns out to arise from a non-linear, or gauged, analogue of a second-order differential operator on densities. A solution thereof provides a criterion for the existence of a CR function and, under certain conditions, for the realisability of the CR three-manifold. These findings are consistent with previous works by Lewandowski, Nurowski, Tafel, Hill, and independently, by Mason. We also provide an analysis of the Weyl curvature of such conformal structures in terms of the underlying CR data. In particular, we arrive at a CR formulation of the asymptotic Einstein condition by viewing conformal infinity as a cross-section of Fefferman's circle bundle. Faculty of Physics, University of Warsaw, ul. Pasteura 5, 02-093 Warszawa, Polandarman.taghavi-chabert@fuw.edu.pl [2020]Primary 53C18, 32V05, 53C50, 83C15; Secondary 32V10, 32V30, 53B30 Perturbations of Fefferman spaces over CR three-manifolds Arman Taghavi-Chabert March 30, 2023 at ========================================================= § INTRODUCTION This article is concerned with the interaction between Lorentzian conformal geometry and Cauchy–Riemann geometry, where the latter arises as the leaf space of a foliation by null geodesics on the former. This geometric setting can be found in two distinct and independent contexts. The first of these is the well-known construction due to Fefferman <cit.> that associates a non-degenerate or contact CR structure of hypersurface type to a conformal structure of Lorentzian signature on a canonical circle bundle. There are various approaches to the construction: in the original version, Fefferman shows how a conformal structure can be constructed from the standard Kähler structure on the complex space ^m+1 in which the CR hypersurface is embedded. Later formulations allow for the CR manifold (M,H,J) to be abstract, that is, not necessarily embeddable. Of particular relevance in this article is the construction due to Lee <cit.>, who showed that Fefferman's conformal structure lives on the total space of a circle bundle over (M,H,J), which is a certain quotient of the canonical bundle C over M. Čap and Gover <cit.> later substituted C for a certain root thereof, which allows them to work within the framework of parabolic geometry and tractor calculus. In all of these versions, one associates to each contact form θ a so-called Fefferman metric g_θ = 4 θ⊙ω^W_θ + h , where ω^W_θ is the induced Weyl connection one-form compatible with θ, and h is the (degenerate) metric induced from the Levi form of θ. Conformally related contact forms yield conformal related Fefferman metrics. The conformal structure thus constructed is characterised by the existence of a null conformal Killing field, and the CR manifold is recovered as the leaf space of its space of integral curves. There is no global Einstein metric in the Fefferman conformal class, and at best, there exists only local ones defined off two cross-sections of M→M. Each such metric can be shown to arise from a so-called CR–Einstein structure, which is determined by a certain complex density σ satisfying a system of CR invariant equations <cit.>. This density determines a contact form θ, and thus a Fefferman metric g_θ. Using σ to trivialise M→M with local coordinate ϕ, and off the sections ϕ = ±π/2, the metric g = ^2 ϕ·g_θ , is Einstein. Rather disappointingly, a CR–Einstein three-manifold is flat, i.e. locally CR equivalent to the Heisenberg group or the three-sphere, and this implies in turn that the Fefferman space is conformally flat <cit.>. There is, however, another, less-known, story connecting three-dimensional CR manifolds to four-dimensional Lorentzian metrics, which goes back to the Golden Age of mathematical relativity. And more importantly, these metrics are exact solutions to the vacuum Einstein's field equations, which include Einstein metrics. These are said to be algebraically special, meaning that the Weyl tensor is algebraic degenerate. A theorem due to Golberg and Sachs <cit.> tells us that such a property is equivalent to the existence of a so-called non-shearing congruence of null geodesics, that is, a (local) foliation by curves generated by a null vector field k, which preserves the conformal structure along directions orthogonal to it. For our purpose, we also assume that the congruence is twisting, i.e. the orthogonal complement ot k is non-integrable. Viewed in this light, our local Fefferman–Einstein metric is a special case, albeit conformally flat. But there are of course many other, non-conformally flat, algebraically special Einstein metrics. In local coordinates (u, ζ, ζ, r), broadly following <cit.>, they may be cast as g = 4 ϱ·ω⊙λ'_ω + 2 (r^2 + ϱ^2) ·ω^1⊙ω ^1̅ . where ω = 1/2 ϱ(ụ + Z ζ̣+ Zζ) , ω^1 = ζ̣ , λ'_ω = ṛ + Wω^1 + Wω^1 + Uω . Here, the coordinate r is an affine parameter along the null geodesics of the congruence defined by the null vector field k, and (u, ζ, ζ) are coordinates on the leaf space, with u real, and ζ complex. The non-vanishing complex-valued function Z and real function ϱ are defined on M, and the one-forms ω and ω^1 define the contact CR structure on the leaf space, with ω̣= ıω^1 ∧ω^1̅ω. The r-dependence of the complex-valued function W and real function U is fully determined by virtue of the algebraical degeneracy of the Weyl tensor and (a subset of) Einstein's field equations, the so-called reduced Einstein equations. This form of the metric has the advantage of being amenable to asymptotics analysis as shown in <cit.>. A more convenient form for these metrics was obtained by Lewandowski and Nurowski in <cit.>, who found that any algebraically special pure radiation metric can be cast in the form g = ϱ^2 ^2 (ϕ - ϕ )·( 4 θ⊙λ + 2 θ^1 ⊙θ^1̅) , where ϕ is an affine parameter along the geodesics of the congruence, the one-forms θ and θ^1 define the CR structure on the leaf space M, with θ̣= ıθ^1 ∧θ^1, and ϱ and ϕ are smooth functions on M, but, as argued in <cit.>, both ϱ and ϕ can be eliminated by a rescaling of the contact form θ and a reparametrisation of the geodesics respectively. The components of the null one-form λ all admit finite Fourier expansions in ϕ, so their coefficients are functions on M. The coordinates ϕ and r from our previous form are related by the transformation r = ϱtan (ϕ - ϕ). We can then see at once that each of the metrics (<ref>) and (<ref>) with (<ref>) live on a circle bundle with some cross-sections removed, and this strongly suggests that they only differ from each other by some `perturbation' semi-basic one-form ξ, i.e. λ = ω^W_θ + ξ, and one of the aims of this article will be to establish this fact formally. From the relation between the two coordinates r and ϕ, we see that r →±∞ as ϕ→±π/2, so one can interpret the hypersurfaces where the metric g blows up as conformal infinity. To accommodate these singularity sets, we shall put Gover's notion of almost Einstein scale into good use. These are certain densities σ on M satisfying a conformally invariant second-order differential equation, which encapsulates the existence of an Einstein metric in the conformal class, but defined only off the singularity set of σ, if non-empty. A by-product of the investigation of these non-shearing congruences of null geodesics, which is the focus of Lewandowski1990a,Hill2008 is the discovery of analytic properties of CR three-manifolds arising from some subset of Einstein's field equations: these concern the existence of CR function, of which Kerr's complex coordinate ζ in (<ref>) is an example, or even the realisability of the CR manifold, under suitable conditions. More recently, the authors of <cit.> revisited the work of Lewandowski1991,Hill2008 by focussing on a variant of Fefferman's construction, which admits non-conformally flat solutions of a certain subset of Einstein's field equations, and by appealing to Jacobowitz's work on the realisability of CR manifolds <cit.>. The present article will delve further into these ideas. Finally, many of the computations necessary to derive the present results were carried out by the author in arbitrary even dimensions in <cit.>. In dimensions greater than four, all Einstein metrics on Lorentzian conformal manifolds of even dimension admitting a twisting non-shearing congruence of null geodesics were found to be contained in a three-parameter family of metrics, which include the Taub–NUT–(A)dS metric. We shall return to these findings in a separate article. The overall aim of the article is two-fold: * To introduce and study CR invariant differential equations for contact CR manifolds, in connection with the existence of CR functions and the CR embeddability. These naturally occur in the investigation of algebraically special Einstein Lorentzian four-manifolds. * To show that algebraically special Lorentzian four-manifolds with prescribed Ricci curvature can find a natural formulation in the context of Fefferman spaces. To be precise, these belong to the same conformal class as `perturbed' Fefferman metrics, i.e. they are of the form g = cosϕ·( g_θ + 4 θ⊙ξ) where g_θ is a Fefferman metric for some contact form θ, ξ is a semi-basic one-form, determined by some CR data, and ϕ a local fibre coordinate arising from a distinguished trivialisation of the Fefferman bundle. We presently outline the structure of the paper while highlighting its main results. Section <ref> gives a review of CR geometry in any odd dimensions, but new interpretations are also obtained in connection with realisability of contact CR structures. In particular, we recast two results due to Jacobowitz <cit.> in terms of solutions to a CR invariant second-order differential equation in Proposition <ref> and Theorem <ref>. In fact, this equation can be defined in terms of a so-called first BGG operator as pointed out in Remark <ref>. A non-linear analogue of this equation, which we term a Webster–Weyl structure provides in dimension three a criterion for the existence of CR functions — Theorem <ref>. Theorem <ref> shows that this non-linear equation can always be `linearised' in a certain sense. Section <ref> contains a review of conformal geometry and so-called optical geometries which are at the heart of non-shearing congruences of null geodesics. In Definitions <ref> and <ref>, we introduce formal definitions of certain metrics with prescribed Ricci curvature, which we term weakly half-Einstein, half-Einstein and pure radiation metrics, and their almost Lorentzian scale analogues as generalisations of almost Einstein scales — Proposition <ref>. We briefly recall the Fefferman construction in Section <ref>, and define their perturbation by a semi-basic form, which is shown in Lemma <ref> to arise from some CR data understood as a tuple of densities on the CR manifold. In Section <ref>, we start our investigation of optical geometries with twisting non-shearing null geodesics in dimension four and their relation to perturbed Fefferman spaces. In particular, we prove Theorem <ref>, which can be summarised as follows: Let (M,c) be a Lorentzian conformal four-manifold with twisting non-shearing congruence of null geodesics K. Suppose that for any generator k of K, the Weyl tensor and the Bach tensor of c satisfy (k,v,k,·) = 0 , (k,k) = 0 , respectively. Then (M,c) is locally conformally isometric to a perturbation of a Fefferman space over a contact CR three-manifold. In Section <ref>, we investigate almost (weakly) half-Einstein and pure radiation scales on perturbed Fefferman spaces. Their zero set are shown to arise from a distinguished density on the CR base space — see Proposition <ref>. Next, in the same framework, Theorems <ref>, <ref> and <ref> show how various prescriptions on the Ricci curvature can be translated into CR invariant differential equations. They provide CR invariant articulations of the results of Lewandowski1990,Mason1998. Of interest is Proposition <ref>, which gives an alternative characterisation of algebraically special optical geometries as perturbed Fefferman spaces. Drawing from Section <ref>, we also recover the results of Lewandowski1990a,Hill2008 regarding CR realisability in Proposition <ref>, Theorems <ref> and <ref>. On that matter of realisability, Corollary <ref> adds new results in some specific cases of perturbed Fefferman spaces. In Proposition <ref> of Section <ref>, we provide a detailed description of the Weyl tensor of an important class of perturbed Fefferman spaces in terms of weighted tensors on the base space. These are shown to satisfy algebraic conditions in the presence of an almost half-Einstein scale or an almost pure radiation scale in Propositions <ref> and <ref>. The asymptotic behaviour of the curvature at conformal infinity is examined Propositions <ref>, <ref> and <ref>. We end the article with Section <ref> by commenting briefly on conformal symmetries and their interpretation in terms of CR invariant differential equations. Four appendices are included: Appendix <ref> contains some technical results regarding adapted coframes in dimension three, which are used in Section <ref>. In Appendices <ref> and <ref>, we provide computations of parts of the Bach tensor and the Ricci tensor used in Sections <ref> and <ref> respectively. In Appendix <ref>, we sketch how to recover the Debney–Kerr–Schild metric from our approach. Acknowledgments: The author would like to thank Rod Gover and Jerzy Lewandowski for helpful and stimulating conversations. The research leading to these results has received funding from the Norwegian Financial Mechanism 2014-2021 UMO-2020/37/K/ST1/02788. § CR GEOMETRY §.§ General definitions In this article, an almost CR structure on a smooth (2m+1)-dimensional manifold M consists of a pair (H,J) where H is a rank-2m distribution, J a bundle complex structure on H, i.e. J∘J = -, where is the identity map on H. This means that the complexification ^H of H splits as ^H = H^(1,0)⊕H^(0,1) where H^(1,0) and H^(0,1) are the rank-m ı-eigenbundle and -ı-eigenbundle of J respectively. When H^(1,0) is involutive, i.e. [H^(1,0),H^(1,0)] ⊂ H^(1,0), we refer to (M,H,J) as a CR manifold. The complex line bundle C := ⋀^m+1(H^(0,1)) is known as the canonical bundle of (M,H,J). We refer to <cit.> for a review on the topic. A (complex) infinitesimal symmetry of H^(1,0) is a complex-valued vector field v on M that preserves the distribution H^(1,0) in the sense that _v w ⊂Γ(H^(1,0)) for any w ∈Γ(H^(1,0)). An infinitesimal symmetry of (M,H,J) is a real vector field v on M that preserves H^(1,0). In particular, since it is real, it preserves H^(1,0) too. An infinitesimal symmetry v of either H^(1,0) or (H,J) is said to be transverse (to H), if it satisfies v θ≠ 0, for any θ∈Γ((H)). A complex infinitesimal symmetry of H^(1,0) as we have defined it is not an infinitesimal symmetry in the strict sense of the term since it does not generate a one-parameter family of diffeomorphisms preserving the CR structure unless it is real. Its geometric interpretation will be given in Jacobowitz Proposition <ref> below. Real hypersurfaces in ^m+1 are the prototypical examples of CR manifolds. Not every CR manifold arises in this way, but those that do are referred to as (locally) realisable or embeddable, in the sense that locally there exists an embedding from M to ^m+1 with the property that the bundle complex structure J on H is induced from the ambient complex structure on ^m+1. A CR function on (M, H,J) is a smooth complex-valued function f defined in the neighbourhood of a point of M that satisfies X(f) = 0 for any section X of H^(0,1). We shall say that a set of CR functions { f_1, … f_r} on some subset U⊂M is independent if they satisfy f̣_1 ∧…∧f̣_r ≠ 0 , at every point, and strongly independent if they satisfy f̣_1 ∧f_1∧…∧f̣_r ∧f_r≠ 0 , at every point of U. Realisability is then equivalent to the existence of m+1 independent CR functions. We shall give further criteria for realisability below. Before that, we give the following criterion for the existence of a CR function: Locally, a CR manifold (M, H,J) admits a strongly independent CR function if and only if there exists a smooth complex-valued one-form α annihilated by H^(0,1) such that α∧α̣= 0 and α∧α≠ 0. More precisely, one can find two non-vanishing smooth complex-valued functions w and z on M such that α = w^-1ẓ. Locally, a CR manifold (M, H,J) is realisable if and only if it admits a complex transverse infinitesimal symmetry of H^(1,0). The existence of a (real) transverse infinitesimal symmetry of (M,H,J) is sufficient but not necessary for realisability. On a realisable CR manifold of dimension 2m+1, the pullback of any holomorphic (m+1,0)-form from ^m+1 to M gives rise to a closed section of the canonical bundle. So realisability provides an abundance of such forms. However, a closed section of the canonical bundle does not guarantee realisability <cit.>, unless one has enough CR functions at disposal: Locally, a (2m+1)-dimensional CR manifold is realisable if and only if it admits m strongly independent CR functions and a closed section of the canonical bundle. In dimension three, it follows that once we know that (M,H,J) admits a CR function, realisability becomes equivalent to the existence of a closed section of the canonical bundle. For ease of reference, we summarise the various criteria for the realisability of a CR manifold below. Given the following statement on a CR manifold (M,H,J): * there is a (real) transverse symmetry of (H,J); * there is a (complex) transverse symmetry of H^(1,0); * the CR structure is realisable; * there are m+1 independent CR functions; * there are m strongly independent CR functions and a closed section of C; * there is a closed section of C; we have that (1) ⟹ (2) ⟺ (3) ⟺ (4) ⟺ (5) ⟹ (6) . Local sections of H^(0,1) can be interpreted as so-called Cauchy–Riemann operators, sometimes called Lewy operators. CR functions thus correspond to smooth complex functions that lie in the kernel of all such operators. For a CR manifold embedded as a real hypersurface in complex space, these operators arise from the restriction of the standard Cauchy–Riemann operators on ^m+1. We say that a Cauchy–Riemann operator ∂ is solvable at a point, if for each sufficiently smooth complex-valued function ξ in its neighbourhood, there exists a complex-valued function z in a possibly smaller neighbourhood such that ξ = ı∂log z . In dimension three, even for realisable CR manifolds, there exists a ξ for which there is no z solving (<ref>) <cit.>. In other words, the ∂-Poincaré Lemma does not hold in CR geometry in general. §.§ Contact CR structures We shall be mostly interested in the case where our CR manifold (M,H,J) is contact, that is, the distribution H is contact, i.e. maximally non-integrable in the sense that T M = H + [H,H]. This is particularly convenient as there is a well-developed theory of such geometries available <cit.>. We also assume M and H to be oriented. A choice of contact form θ∈Γ((H)) is referred to as a pseudo-hermitian structure in the present context. Its Levi form, that is, the restriction h of θ̣ to H, has signature (p,q) with p+q=m, p positive, q negative eigenvalues. It provides a hermitian form on ^ H, and thus a bundle metric on H of signature (2p,2q). The Reeb vector field of θ is the unique vector field ℓ, satisfying θ (ℓ) = 1 and θ̣ ( ℓ , · ) = 0. Since there is in general no preferred pseudo-Hermitian structure on (M,H,J), we obtain a subconformal structure c_H on H compatible with J. It will be convenient to assume that the canonical bundle C admits a -1/m+2-th root, and define the line bundle E(1,0) := C^-1/m+2, its complex conjugate E(0,1) = E(1,0), dual E(-1,0) := E(1,0)^*. More generally, we define CR density bundles E(w,w') := E(1,0)^w ⊗E(1,0)^w' for any w, w' ∈ such that w - w' ∈. By definition, it follows that E(w,w') = E(w',w). There are canonical sections θ of T^* M⊗E(1,1) and h of (H^(1,0))^* ⊗ (H^(0,1))^* ⊗E(1,1) with the property that for each CR scale, that is, a (real) section 0 < s ∈Γ(E(1,1)), then θ = s^-1θ is a contact form with Levi form h = s^-1h. This reflects the fact that T M/H injects into E(1,1). The weighted Levi form h allows us to identify H^(1,0) with (H^(0,1))^*⊗E(1,1) and H^(0,1) with (H^(1,0))^*⊗E(1,1). One can also understand the relation between CR scales and contact forms as follows: to each section ζ of C = E(-(m+1),0), there is a unique contact form θ with Reeb vector field ℓ for which ζ is volume-normalised, i.e. θ∧ (θ̣)^m = ı^m^2 m! (-1)^q θ∧ (ℓζ) ∧ (ℓζ) . This equation tells us that at every point p there is a circle of volume-normalised elements of C_p associated to a non-zero element of (H_p). §.§ Webster connections Each choice of CR scale s with contact form θ=s^-1θ and Reeb vector field ℓ induces a splitting ^ T M = ^⟨ℓ⟩⊕H^(1,0)⊕H^(0,1) , Before we proceed, we introduce plain and overlined minuscule Greek abstract indices in the following way: E^α := H^(1,0) , E^α̅ := H^(0,1) , E_0 := (H) , E_α := (H^(1,0))^* , E_α̅ := (H^(0,1))^* , E^0 := ((H))^* . In effect, indices can be raised and lowered using h_αβ̅, e.g. v_α = h_αβ̅v^β̅. Clearly, complex conjugation on ^H changes the index type, and, in general, unless stated otherwise, we shall write v^α̅ for v^α, and so on. These indices will also be used in a concrete way, in which case, they run from 1 to m. Complete ℓ to a (complex) frame ( ℓ , e_α , e_β̅ ), α, β̅ = 1, …, m, adapted to (H, J), i.e. ( e_α ) and ( e_β̅ ), α, β̅ = 1, …, m, span H^(1,0) and H^(0,1) respectively. Denote by ( θ , θ^α , θ^α̅ ), the coframe dual to ( ℓ , e_α , e_β̅ ), α, β̅ = 1, … , m. Then the contact form θ satisfies dθ = ıh_αβ̅θ^α∧θ^β̅ , where we realise the Levi form h_αβ̅=s^-1h_αβ̅ of θ as a Hermitian matrix of functions. We refer to (θ^α) as an admissible coframe for (H^(1,0))^*, and to (θ, θ^α, θ^α̅) as an adapted coframe for (M,H,J). An admissible or adapted coframe is said to be unitary if h_αβ̅ = δ_αβ̅ with respect to (θ^α, θ^α̅). In dimension three, we shall sometimes qualify such a coframe as being of the first kind, to distinguish it from an adapted coframe of the second kind as described in Appendix <ref>. For each contact form θ, there is a unique linear connection ∇ on T M and associated bundles with the property that for a chosen adapted coframe ( θ , θ^α , θ^β̅ ), ∇ satisfies ∇θ = 0 , ∇θ^α = - Γ_β^α⊗θ^β , ∇θ^α̅ = - Γ_β̅^α̅⊗θ^β̅ , where Γ_β^α and Γ_β̅^α̅ denote the connection one-form of ∇ in that coframe. In addition, ∇ is required to preserve the Levi form h_αβ̅, from which it follows that ḥ_αβ̅ - ( Γ_α^γh_γβ̅ + Γ_β̅^γ̅h_αγ̅) = 0 . For a unitary adapted coframe, we have Γ_αβ̅ = - Γ_β̅α. The torsion of this connection splits into two pieces: the Levi-form h_αβ̅ and the Webster or pseudo-hermitian torsion tensor _αβ with conjugate _α̅β̅. The latter satisfies the symmetries _αβ = _(αβ). They can be identified within the Cartan structure equations: dθ = ıh_αβ̅θ^α∧θ^β̅ , dθ^α = θ^β∧Γ_β^α + ^α_β̅θ∧θ^β̅ , dθ^α̅ = θ^β̅∧Γ_β̅^α̅ + ^α̅_βθ∧θ^β . The Webster connection extends to a connection on the density bundles E(w,w'). If σ∈Γ(E(w,0)) is such that σ^-m+2/w = θ∧θ^1 ∧…∧θ^m for some adapted coframe (θ,θ^α, θ^α̅). Then ∇σ = w/m+2Γ_α^ασ , where Γ_α^β is the connection one-form of ∇ corresponding to θ. By complex conjugation, one obtains a similar formula for densities of weight (0,w). Note that ∇ preserves the weighted contact form θ, i.e. ∇θ = 0. Thus if θ = s^-1θ for some CR scale s, ∇ also preserves s. This implies that for any σ∈Γ(E(1,0)) such that s = σσ, we must have σ^-1∇σ = - σ^-1∇σ. For future use, we record the commutators of the Webster connection when (M,H,J) is of dimension three only. For any λ_α∈Γ(E_α), we have (∇_α∇^α - ∇^α∇_α ) λ_γ + ı∇_0 λ_γ = - 4 Ρλ_γ , (∇_α∇_0 - ∇_0∇_α ) λ_γ - _αβ∇^βλ_γ = - λ_β∇^β_αγ , (∇^α∇_0 - ∇_0∇^α ) λ_γ - ^αβ∇_βλ_γ = (∇_γ^αδ) λ_δ , where Ρ is the Webster–Schouten scalar. For any smooth density f ∈Γ(E(w,w')), (∇_α∇^α - ∇^α∇_α ) f = 4/3 (w -w') Ρ f - ı∇_0f , (∇_α∇_0 - ∇_0∇_α ) f = 1/3 (w -w') ∇^β_αβ f + _α^β̅∇_β̅f . Finally, the Cartan tensor is the fourth-order CR invariant of weight (-1,-1) defined by _αβ := ı∇_0 _αβ - 2 ı∇_α𝖳_β + 2 Ρ_αβ , Its vanishing is equivalent to CR flatness, that is, _αβ = 0 if and only if (M, H,J) is locally CR equivalent to the CR three-sphere. While we shall mostly be using the Webster connection throughout this article, it is worth introducing an alternative canonical connection, namely the Weyl connection ∇^W of (H,J,θ) — see <cit.>. It agrees with the Webster connection ∇ along directions tangent to H, but differs from it along the Reeb direction. In particular, on a density σ of weight (1,0), we have ∇^W σ = ∇σ + ı/m+2 (w - w')Ρθσ . §.§ Gauged partial Webster connections In what follows, E_∙ will denote any multiple tensor products of E_α and E_α̅. Choose a Webster connection ∇, and view ∇_α and ∇_α̅ as partial connections along sections of E^α and E^α̅. Then, for any choice of ξ_α∈Γ(E_α), we define the partial connection ξ∇_α : Γ(E_∙(w,w')) ⟶Γ(E_α⊗E_∙(w,w')) : f↦ξ∇_αf := ∇_αf - ı (w - w') ξ_αf . Clearly, ξ∇_α coincides with ∇_α on any section of E_∙(w,w). We shall often use the short-hand ξ∇_α = ∇_α + ξ_α to mean (<ref>). We shall call the partial connection defined by (<ref>) the partial Webster connection gauged by ξ_α. If ξ_α = ı∇_αlog z for some complex-valued function z, we refer to the partial gauge ξ_α as being exact. To carry out explicit computations, it is convenient to choose σ∈E(1,0) such that ∇ (σσ)=0 so that we can trivialise f as the function f = fσ^-wσ^w'. Then σ^wσ^-w'ξ∇_αf = ∇_α f + (w -w') (σ^-1ξ∇_ασ) f . In full analogy, a one-form ξ can be used to gauge a Webster connection as ξ∇ : Γ(E_∙(w,w')) ⟶Γ(T^* M⊗E_∙(w,w')) : ξ∇f := ∇f - ı (w - w') ξf . This gauged connection will however play little in this article. It is nevertheless instructive to compute the curvature F of this gauge: writing ξ = ξ_αθ^α + ξ_α̅θ^α̅ + ξ_0θ, we have F := ξ̣= F_αβθ^α∧θ^β + F_α̅β̅θ^α̅∧θ^β̅ + 2 F_αβ̅θ^α∧θ^β̅ + 2 F_0 βθ∧θ^β + 2 F_0 β̅θ∧θ^β̅ , where F_αβ = ∇_[αξ_β] , F_αβ̅ = 1/2( ∇_αξ_β̅ - ∇_β̅ξ_α + ıξ_0h_αβ̅) , F_0 β = 1/2( ∇_0ξ_β - ∇_βξ_0 + ξ_α̅A^α̅_β) . The following lemma follows from a straightforward computation: For any two pairs σ, ξ_α and σ', ξ'_α, where σ, σ' ∈Γ(E(1,0)) and ξ_α, ξ'_α∈Γ(E_α) are related by σ' = z σ , ξ'_α = ξ_α + ı∇_αlog z , for some smooth non-vanishing complex-valued function z, we have σ'^-1ξ'∇_ασ' = σ^-1ξ∇_ασ . Clearly, if the gauge is exact, one can always find a rescaling (<ref>) such that σ'^-1∇_ασ' = σ^-1ξ∇_ασ §.§ Transformations under a change of contact form Let s and s be two CR scales related by s = ^-φ s, for some smooth function φ on M so that the Levi form transforms as h_αβ̅ = ^φ h_αβ̅, and the induced change of adapted coframes are related by θ^0 = ^φθ , θ^α = θ^α + ıΥ^αθ , θ^α = θ^α - ıΥ^αθ , where Υ = φ̣. The induced change of the Webster connections will be denoted by the short-hand notation ∇ = ∇ + Υ , meaning that, for any τ_α∈Γ( E_α), ∇_ατ_β = ∇_ατ_β - 2 Υ_(ατ_β) , ∇_β̅τ_α = ∇_β̅τ_α + h_αβ̅Υ^γτ_γ , ∇_0τ_β = ∇_0τ_β + ıΥ^γ̅∇_γ̅τ_β - ıΥ^γ∇_γτ_β - ı( ∇_γΥ^γ - Υ_γΥ^γ) τ_β , while, for any f ∈Γ( E(w,w')), ∇_α f = ∇_α f + w Υ_α f , ∇_α̅ f = ∇_α̅ f + w' Υ_α̅ f , ∇_0 f = ∇_0 f + ıΥ^β̅∇_β̅ f - ıΥ^β∇_β f + 1/m+2[ (w +w') Υ_0 + ı w Υ^β_β - ı w' Υ_β^β + ı (w' - w) Υ^βΥ_β] f . The Webster torsion and Webster–Schouten scalar transform as _αβ = _αβ + ı∇_αΥ_β - ıΥ_αΥ_β , Ρ = Ρ - 1/2( ∇^αΥ_α + ∇_αΥ^α) - 1/2Υ^γΥ_γ , respectively. Gauged (partial) Webster connections undergo the same transformation as their ungauged counterpart: if ξ∇_α and ξ∇_α are the partial Webster connections gauged by some ξ_α∈Γ(E_α), and ∇ and ∇ related by (<ref>), then ξ∇_αf = ξ∇_αf + w Υ_αf , for any section f of E_∙(w,w'). §.§ CR densities We now naturally extend the notion of CR functions to densities. We shall say that a density τ of weight (w,0) for any w ∈ on a contact CR manifold (M,H,J) is a CR density if it satisfies the CR invariant equation ∇_α̅τ = 0 . This definition should not be confused with that of a CR scale introduced earlier, that is a positive real density of weight (1,1). When w=0, we then recover the definition of a CR function. For a strongly independent CR function, we need the additional requirement that τ≠τ and ∇_ατ≠ 0. If the latter does not hold, we clearly conclude from (<ref>) that τ is constant. The space of CR densities is clearly closed under multiplication, that is, if σ and τ are two CR densities of weight (w,0) and (w',0) respectively, then στ is a CR density of weight (w+w',0). Further, since a section ε of the canonical bundle is a density of weight of -m-2, choosing any -w/m+2-th root of ε for any w ∈ yields a section of E(w,0). In particular, the structure equations (<ref>) together with (<ref>) gives a straightforward proof of the next result. Locally, a contact CR manifold admits a closed section of the canonical bundle if and only if it admits CR densities of weight (w,0) with 0 ≠ w ∈. Now, since any realisable (M,H,J) admits closed sections of C, we have: Any realisable contact CR manifold (M,H,J) admits CR densities of weight (w,0) for any w ∈. Since CR densities and CR functions are on the same footing, Jacobowitz's Theorem <ref> feels very natural in that respect: in this light, the closed section of the canonical bundle is just a CR density. Lee showed <cit.> that locally, the existence of a closed section of C is essentially equivalent to the existence of a so-called pseudo–Einstein structure, that is, the existence of a contact form θ such that the Webster–Schouten tensor is proportional to the Levi form (but not necessarily by a constant factor). §.§ Complex infinitesimal transverse symmetries It is straightforward to check that for any density σ of weight (1,w), w ∈, the equation ∇_α∇_βσ + ı_αβσ = 0 , is CR invariant. In the language of parabolic geometries, the solution σ lies in the kernel of a so-called first Bernstein–Gel'fand-Gel'fand (BGG) operator <cit.> — see also for instance <cit.>, especially Section 8.2 there for the case m=1. For w≥0, the operator occurs as part of a resolution of an irreducible (m+1,1)-representation. In the case where w=1, the geometric interpretation of its solutions is given in the next proposition. Any solution σ∈Γ(E(1,1)) to (<ref>) is equivalent to the existence of a complex infinitesimal transverse symmetry of H^(1,0). In a local adapted frame (ℓ, e_α, e_α̅), a vector field v on (M,H,J) can be expressed as v = v^0ℓ + v^α e_α + v^α̅e̅_α̅ , for complex v^0∈Γ(E), v^α∈Γ(E^α) and v^α̅∈Γ(E^α̅). Note we are not assuming that v^α̅ is the complex conjugate of v^α in general. A straightforward computation shows that v preserves H^(1,0), i.e. _v e_α∈Γ(H^(1,0)), if and only if v_α - ı∇_α v^0 = 0 , ∇_α v_β + ı_αβ = 0 . The condition that v be transverse to H means that v^0 is non-vanishing. Setting σ := v^0 s where s is the CR scale preserved by ∇, we see that σ satisfies (<ref>). The converse is clearly true: let σ∈Γ(E(1,1)) be a solution of (<ref>), choose a CR scale s with Webster connection ∇, and set v^0 := σ s^-1. Then v^0 is non-zero, and v_α := ı∇_α v^0 satisfies (<ref>) by virtue of (<ref>). Define v := v^0 ℓ + v^α e_α + v^α̅e_α̅ for any choice of section v^α of E^α. Then σ yields a complex transverse symmetry of H^(1,0). In the special case where a density σ of weight (1,1) is real, i.e. σ is a CR scale, and solves (<ref>), then the Reeb vector field defined by σ is an infinitesimal transverse symmetry of (M,H,J). Note that in this case the assumption that (H,J) is contact forces the symmetry of (H,J) to be transverse. We shall nevertheless retain the terminology. Such solutions have already been investigated in e.g. <cit.> in the context of deformations of (almost) CR structures. On the other hand, the correspondence between complex densities of weight (1,1) satisfying (<ref>) and complex transverse symmetries is not one-to-one in general, since the (1,0)-part of the latter is completely arbitrary. This is to be expected since H^(1,0) is involutive. Thus if one solution exists, so do infinitely many. In the context of contact CR manifolds and in the light of Proposition <ref>, we can re-express Jacobowitz's Proposition <ref> in the following terms: Locally, a contact CR manifold (M,H,J) is realisable if and only if it admits a solution σ∈Γ(E(1,1)) to (<ref>). §.§ Webster–Weyl structures §.§.§ General odd dimensions In this section, we introduce a CR invariant structure that may be thought of as a non-linear analogue to (<ref>), and will play a key rôle in the subsequent sections. We start with a simple lemma, whose proof follows from the transformation rule (<ref>) of the Webster torsion tensor. Let ∇ and ∇ be two Webster connections on a contact CR manifold (M,H,J) related by (<ref>). Then a section λ_α of E_α is a solution to ∇_(αλ_β) - ıλ_αλ_β - _αβ = 0 , if and only if λ_α = λ_α + ıΥ_α , is a solution to ∇_(αλ_β) - ıλ_αλ_β - _αβ = 0 . Considering the close resemblance of (<ref>) to the Einstein–Weyl equation, we make the following definition. A Webster–Weyl structure on (M,H,J) is an equivalent class [∇_α,λ_α] of pairs (∇_α,λ_α), where ∇_α is a (partial) Webster connection and λ_α∈Γ(E_α), with the property that these satisfy the Webster–Weyl equation (<ref>), and (∇_α, λ_α) ∼ (∇_α,λ_α) whenever ∇_α and ∇_α related by (<ref>), and λ_α and λ_α by (<ref>). It is not difficult to check that equation (<ref>) for a real density σ∈Γ(E(1,1)) is a particular case of (<ref>) where, for every choice of representative [∇_α,λ_α], we have that λ_α = ı∇_αψ for some real smooth function ψ on M. In particular, there is a representative for which λ_α = 0, which tells us that the Reeb vector field corresponding to σ is an infinitesimal symmetry of (M,H,J). There is an analogue of equation (<ref>), closely related to (<ref>) for gauged partial connections: Let ξ∇_α be a partial Webster connection gauged by some ξ_α∈Γ(E_α). Then ξ∇_(αξ∇_β)σ + ı_αβσ = 0 , is a well-defined CR invariant on densities of weight (1,w). In fact, CR invariance simply follows from the following easy observation: Suppose that σ∈Γ(E(1,w)) for any w ∈ is a solution to (<ref>). Then λ_α = ıσ^-1ξ∇_ασ = ıσ^-1∇_ασ + ξ_α , satisfies the Webster–Weyl equation (<ref>). Conversely, suppose that λ_α solves (<ref>). Fix some σ∈E(1,w), w ∈, and define a partial gauge ξ_α∈Γ(E_α) by (<ref>). Then σ satisfies (<ref>). Thus, we can interpret equation (<ref>) in three different ways: * as an equation on the density σ for ξ_α fixed; * as an equation on the partial gauge ξ_α for σ fixed; * as an equation on the pair (σ, ξ_α) subject to the freedom (<ref>) since by Lemma <ref>, it leaves λ_α as defined by (<ref>) unchanged. A consequence of Lemma <ref> is the following: For any non-vanishing complex-valued function z, any solution σ∈Γ(E(1,0)) to (<ref>) yields a solution z σ to (<ref>) where the partial gauge is given by ξ_α =ı∇_αlog z. Suppose that ξ_α = ı∇_αlog z for some non-vanishing complex-valued function z. Then any solution to (<ref>) gives rise to a solution to (<ref>). Once a solution to (<ref>) is known for some gauge, it is easy to produce more by using CR densities of weight (1,0) as `raising' or `lowering' operators: Suppose that (M,H,J) admits a CR density τ of weight (w,0) for some w ∈ Z. Then any solution s of weight (1,w') to (<ref>) for some w' ∈ Z gives rise to a solution σ=s τ^-1 of weight (1,w'-w) to (<ref>). It thus follows from Lemmata <ref> and <ref> that for realisable (M,H,J), densities of weight (1,0) that satisfies (<ref>) exists in plentiful. We note that the geometric interpretation of a solution to (<ref>) crucially depends on the weight of the density since in general only weight (1,1) implies realisability. However, Jacobowitz's Theorem <ref> already hints at a way to remedy this issue. Locally, a contact CR manifold (M,H,J) is realisable if and only if it admits two densities σ and τ of weight (1,0) that satisfy ∇_α∇_βσ + ı_αβσ = 0 , ∇_α̅τ = 0 , respectively. Suppose that (M,H,J) is realisable. Then Lemma <ref> provides a solution τ to (<ref>), and Proposition <ref> provides a solution to (<ref>). Hence, by Lemma <ref> we obtain a solution to (<ref>). Conversely, we apply Lemma <ref> to our solutions σ and τ to (<ref>) and (<ref>) respectively, to produce a solution στ^-1∈Γ(E(1,1)) to (<ref>). Realisability then follows by Proposition <ref>. In the special case, where τ=σ in Theorem <ref>, the pair of equations (<ref>) and (<ref>) define what is referred to as an (almost) CR–Einstein structure in <cit.>. In this case, the solution σ defines a pseudo-hermitian structure θ for which _αβ = 0 , ( Ρ_αβ̅)_∘ = 0 , ∇_αΡ = 0 . In dimension three, any solution thereof immediately tells us that (M,H,J) is CR–flat. §.§.§ Dimension three Henceforth, we assume that (M,H,J) has dimension three. Then the tensor product of any number of copies of H^(1,0) and H^(0,1) is of rank 1, so symmetrisation is a vacuous operation, and we have that H^(1,0)⊗H^(0,1)≅E(1,1), since for any A^α∈Γ(E^α), B^α̅∈Γ(E^α̅), we can write A^αB^β̅ = A^γB_γh^αβ̅. While the use of indices, which concretely only take the numerical value 1, may appear to be of rather limited utility, they turn out to be extremely useful for book keeping and ultimately makes the geometric interpretation of our computations much more transparent, and the relation to the general case more direct. We now return to the problem of characterising the existence of a CR function. Let us choose an arbitrary local adapted coframe (θ, θ^α, θ^α̅) on (M,H,J) with dual (ℓ,e_α,e_α̅). Starting in greater generality, let λ_α be an arbitrary section of E_α, and set ω = θ , ω^α = θ^α + λ^αθ , ω^α̅ = θ^α̅ + λ^α̅θ . Note that by (<ref>) and (<ref>), ω^α does not depend on the choice of contact form. Using the structure equations (<ref>), we then find ω̣ = ıh_αβ̅ω^α∧ω^β̅ + ω∧( ıλ_αω^α - ıλ_α̅ω^α̅) , ω̣^α = ( Γ_β̅γ^γ + ıλ_β̅) ω^α∧ω^β̅ + ( - Γ_0 δ^δδ_β^α - e_β( λ^α ) + λ^γ̅Γ_γ̅δ^δδ_β^α + ıλ^αλ_β) ω∧ω^β + ( ^α_β̅ - ∇_β̅λ^α - ıλ_β̅λ^α) ω∧ω^β̅ , ω^α̅ = ( Γ_βγ̅^γ̅ - ıλ_β) ω^α̅∧ω^β + ( - Γ_0 δ̅^δ̅δ_β̅^α̅ - e_β̅( λ^α̅ ) + λ^γΓ_γδ̅^δ̅δ_β̅^α̅ - ıλ^α̅λ_β̅) ω∧ω^β̅ + ( ^α̅_β - ∇_βλ^α̅ + ıλ_βλ^α̅) ω∧ω^β . In particular, ω^γ∧ω̣^α = ( ∇_β̅λ^α + ıλ_β̅λ^α - ^α_β̅) ω∧ω^γ∧ω^β̅ , and similarly for its complex conjugate. We thus conclude ω^α∧ω̣^β = 0 ⟺ ∇_αλ_β - ıλ_αλ_β - _αβ = 0 . Further, we have ω^α∧ω^β̅ = θ^α∧θ^β̅ + θ∧( λ^αθ^β̅ - λ^α̅θ^β̅) ≠ 0 . Hence, by Lemma <ref>, we conclude: Locally, a contact CR three-manifold admits a strongly independent CR function if and only if it admits a Webster–Weyl structure. This, together with Lemma <ref>, allows us to recast Jacobowitz's Theorem <ref> in the following terms: Locally, a smooth contact CR three-manifold is realisable if and only if it admits a Webster–Weyl structure and a CR density of weight (1,0). It is interesting to note that in dimension three, if one considers equation (<ref>) alone, realisability can only be guaranteed if the weight of σ is (1,1). For any other weight (1,w) with w ≠ 1, we must content ourselves with only one CR function by Theorem <ref> via Lemma <ref> with ξ_α=0. In the following, we translate the condition of functional independence of two CR functions into a statement on their Webster–Weyl structures. Let (M,H,J) be a contact CR three-manifold. Then any two CR functions are independent if and only if their corresponding Webster–Weyl structures [∇_α,λ_α] and [∇_α,λ_α'] differ by a non-vanishing (1,0)-form, i.e. λ'_α = λ_α + μ_α for some non-vanishing μ_α. In particular, given a Webster–Weyl structure (∇_α,λ_α), any other (∇_α,λ_α') arises from a solution μ_α to the CR invariant equation ∇_αμ_β - 2 ıλ_αμ_β - ıμ_αμ_β = 0 , and setting λ'_α = λ_α + μ_α. Let ω^1 and ω'^1 be two forms annihilated by H^(0,1) and satisfying ω^1∧ω̣^1 = 0 and ω'^1∧ω̣'̣^1 = 0, so that by Lemma <ref>, ω^1 = z^-1ẉ and ω'^1 = z'^-1ẉ' for some non-vanishing complex-valued functions z, w, z' and w' on M. With no loss, we may choose an adapted coframe (θ^0, θ^1, θ^1̅) and, possibly after some rescaling of ω^1, write ω^1 = θ^1 + λ^1θ and ω'^1 = θ^1 + λ'^1θ for some solutions λ_α and λ'_α to the Webster–Weyl equation (<ref>). The condition that the CR functions w and w' be independent is then equivalent to ω^1 ∧ω'^1 = ( λ^1 - λ'^1) θ^0 ∧θ^1 ≠ 0, from which the result follows immediately. As it will next emerge, in dimension three, one can always `linearise' a solution to the Webster-Weyl equation, in the sense of turning a one-form solving (<ref>) into a density of weight (1,-2) solving (<ref>): Let (M,H,J) be a contact CR three-manifold endowed with a Webster–Weyl structure [∇_α,λ_α]. Then locally, there exists a smooth density σ of weight (1,0) such that for any choice of representative (∇_α, λ_α), we have λ_α = ıσ^-1σ^2∇_α( σσ^-2) , or equivalently, λ_α = ıσ^-1ξ∇_ασ := ıσ^-1∇_ασ + ξ_α , ξ_α := - 2 ıσ^-1∇_ασ , with the property that if (θ, θ^1, θ^1̅) is the unitary adapted coframe determined by σ, i.e. σ^3 = θ∧θ^1, and ((θ)∇_α,(θ)λ_α) is the representative of [∇_α,λ_α] determined by θ = (σσ)^-1θ, then the one-form ω^1 = θ^1 + λ^1θ is given by ω^1 = ẉ for some CR function w, and (θ)∇_α(θ)λ^α - ı(θ)λ_α(θ)λ^α + 3 σ^-1(θ)∇_0σ = 0 . In particular, σσ^-2∈Γ ( E(1,-2) ) satisfies ∇_α∇_β( σσ^-2) + ı_αβ( σσ^-2) = 0 . Any other density σ of weight (1,0) related to σ by σ = z^-3/2z^-1/2σ , for some smooth CR function z satisfying ∇_0 z - λ^α∇_α z = 0, will share the same property as σ. Since (M,H,J) admits a Webster–Weyl structure, by Theorem <ref>, it locally admits a CR function w, and we can find a unitary adapted coframe (θ, θ^1, θ^1̅) such that (ω, ω^1, ω^1̅) as defined by (<ref>) is an adapted coframe of the second type, as described in Appendix <ref>, with the property that ω^1 = ẉ. This choice picks out a representative ((θ)∇_α,(θ)λ_α) of [∇_α,λ_α]. We now return to equation (<ref>), and to emphasise the dependence on the choice of frame, we adorn the geometric quantities with (θ)·. Then ω̣^1 = 0 implies that (θ)∇_β̅(θ)λ^α + ı(θ)λ_β̅(θ)λ^α - (θ)^α_β̅ = 0 , (θ)Γ_β̅γ^γ + ı(θ)λ_β̅ = 0 , - (θ)Γ_0 γ^γδ_β^α - e_β( (θ)λ^α ) + (θ)λ^γ̅(θ)Γ_γ̅δ^δδ_β^α + ı(θ)λ^α(θ)λ_β = 0 . Clearly, equation (<ref>) is vacuous. By (<ref>), equation (<ref>) tells us that (θ)λ_α̅ = 3 ıσ^-1(θ)∇_α̅σ for some density σ of weight (1,0) such that σ^-3 = θ∧θ^1 and θ = (σσ)^-1θ. However, this expression depends on the coframe, and thus on the choice of connection. To resolve this issue, we note that since (θ)∇(σσ) = 0, we can write (θ)λ_α = ıσ^-1(θ)∇_ασ - 2 ıσ^-1(θ)∇_ασ = ıσ^-1σ^2 (θ)∇_α (σσ^-2 ) . This new expression gives the appropriate transformation for (θ)λ_α under a change of contact form. In particular, it does not depend on the particular choice of representative of [∇_α, λ_α], and we can safely drop the adornment (θ)·, thereby establishing (<ref>). We can now recast (<ref>) as (<ref>). Plugging now (<ref>) into (<ref>) yields (<ref>). Finally, we note that if z is some non-zero complex-valued function that satisfies ∇_α̅ z = 0 (so z is a CR function) and ∇_0 z - λ^α∇_α z = 0, the one-form ω^1 = z ω^1 is also exact with a CR potential. Rescaling σ as in (<ref>) yields a unitary adapted coframe of the first kind (θ, θ^1, θ^1̅) where θ = z zθ and θ^1 = z θ^1 + Υ^1θ. Carrying out the analysis as before, we find that λ_α = ıσ^-1∇_ασ - 2 ıσ^-1∇_ασ , and we may verify for consistency that λ_α = λ_α + ıΥ_α. Theorem <ref> tells us that we obtain an equivalence class of densities related by (<ref>), for which the solution λ takes the form (<ref>). Each of these densities singles out a connection ∇ in which the connection one-form component Γ_αβ̅^β̅ in the associated adapted coframe can be identified with ıλ_α. This falls short of a distinguished connection, but nevertheless partially mimics the behaviour of Einstein–Weyl structure in the conformal setting. While Theorem <ref> singles out a family of unitary adapted coframes, and in particular, of contact forms, in the context of CR functions, these might not be the most convenient ones when it comes to geometric structures. Indeed, a local transverse symmetry determines a unique contact form θ for which the Reeb vector field is its generator. But in general, there will be no admissible unitary coframe (θ^1) such that θ^1 = ẉ where w is a CR function. We end this section by an application of Theorem <ref>, which weakens the assumptions of Theorem <ref> in dimension three: Locally, a contact CR three-manifold (M,H,J) is realisable if and only if it admits two densities σ and τ of weight (1,0) that satisfy ξ∇_αξ∇_βσ + ı_αβσ = 0 , ξ∇_α̅τ = 0 , where ξ∇_α = ∇_α + ξ_α for some gauge ξ_α∈Γ(E_α). We work locally. Suppose that σ and τ solve (<ref>) and (<ref>) respectively. Then λ_α = ıσ^-1ξ∇_ασ satisfies the Webster-Weyl equation (<ref>), and so by Theorem <ref>, there exists a density σ of weight (1,0) such that λ_α = ı( σ^-1σ^2) ∇_α( σσ^-2) , and it immediately follows that ξ_α = ıϱ^-1∇_αϱ , We shall now produce a CR density with the data provided. Define τ' = ϱ^-1τ∈Γ(E(3,0)). Since, by assumption, (<ref>) holds, ∇_α̅τ = ıξ_α̅τ and ∇_α̅ϱ = ıξ_α̅ϱ, and so ∇_α̅τ' = ∇_α̅( ϱ^-1τ) = ( ∇_α̅ϱ^-1) τ + ϱ^-1( ∇_α̅τ) = - ıξ_α̅ϱϱ^-2τ + ıξ_α̅ϱ^-1τ = 0 . Hence, ∇_α̅τ' = 0, and thus, by Theorem <ref>, (M,H,J) is locally realisable. The converse is immediate. § CONFORMAL GEOMETRY Let (M, c) be an oriented and time-oriented conformal smooth manifold of dimension four and of Lorentzian signature (+,+,+,-). Two metrics g and g belong to the conformal class c if and only if g = ^2 φg , Following <cit.>, for each w ∈, there are naturally associated density bundles denoted E[w], and the Levi-Civita connection of g extends to a linear connection on E[w]. In particular, there is a one-to-one correspondence between metrics in c and sections of the bundle of conformal scales, denoted E_+[1], which is a choice of square root of E[2]. The correspondence is achieved by means of the conformal metric g, which is a distinguished non-degenerate section of ^2 T M⊗E [2]: if σ∈E_+[1], then g = σ^-2g is the corresponding metric in c. We shall refer to such a non-vanishing density as a Lorentzian scale. The Levi-Civita connection ∇ of g also preserves σ, and it follows that g is preserved by the Levi-Civita connection of any metric g in c. We thus have a canonical identification of T M with T^* M⊗E [2] via g. We shall often use the abstract index notation, whereby sections of T M, respectively, T^* M will be adorned with upper, respectively, lower minuscule Roman indices starting from the beginning of the alphabet, e.g. v^a ∈Γ(T M), and ξ_a b∈Γ(⋀^2 T^* M). Symmetrisation will be denoted by round brackets, and skew-symmetrisation by square brackets, e.g. λ_[a b] = 1/2( λ_a b - λ_b a) and λ_(a b) = 1/2( λ_a b + λ_b a). In particular, we will write E_[a_1 … a_k] for the k-th exterior power of the cotangent bundle ⋀^k T^* M, and E_(a_1 … a_k) for its k-th symmetric power ^k T^* M. Its tracefree part ^k_∘ T^* M will by denoted E_(a_1 … a_k)_∘. By convention, we take the Riemann tensor of a given metric g_a b in c to be defined by 2 ∇_[a∇_b]α_c = - _a b^d_cα_d , α_a ∈Γ(E_a[w]) . It decomposes as _a b c d = _a b c d + 4 g_[a|[cΡ_d]|b] , where _a b c d is the conformally invariant Weyl tensor and Ρ_a b the Schouten tensor, which is related to the Ricci tensor _a b = _c a^c_b and the Ricci scalar = _a^a by Ρ_a b = 1/2( _a b - /6g_a b) . The Schouten scalar is defined to be Ρ := Ρ_a bg^a b = 1/6. One construct the Cotton tensor and the Bach tensor as _a b c = 2 ∇_[bΡ_c] a , _a b = - ∇^c_a b c + Ρ^c d_a c b d , respectively. The former vanishes whenever g is an Einstein metric, while the latter is a conformally invariant obstruction to the existence of an Einstein metric. By the Bianchi identities, we have _a b c = ∇^d _d a b c . For any two metrics g and g in c related by (<ref>), their respective Levi-Civita connections ∇ and ∇ are related by ∇_a α_b = ∇_a α_b + (w - 1) Υ_a α_b - Υ_b α_a + Υ_c α^c g_a b , α_a ∈Γ(E_a[w]) where Υ_a := ∇_a φ. The Schouten tensor, Schouten scalar and Cotton tensor transform as Ρ_a b = Ρ_a b - ∇_aΥ_b + Υ_aΥ_b - 1/2Υ^cΥ_cg_a b , Ρ = Ρ - ∇^aΥ_a - Υ^cΥ_c , _a b c = _a b c + Υ^d _d a b c , respectively. §.§ Non-shearing congruences of null geodesics We briefly review some notions that have been introduced and studied variously in <cit.>. We shall refer to a null line distribution K on (M,c) as an optical structure, and the triple (M,c,K) as an optical geometry. The orientation and time-orientation on (M,c) induces an orientation on K. It is a subbundle of its orthogonal complement K^⊥ with respect to c, i.e. K⊂K^⊥⊂ T M, and the screen bundle H := K^⊥ / K of K inherits a conformal structure of Riemannian signature from c. Since H has rank two it admits a bundle complex structure J, and thus a splitting ^H = H^(1,0)⊕H^(0,1) into the eigenbundles of J. One can show that there is a unique complex rank-two distribution N, totally null with respect to c, such that ^K = N∩N and N / ^K = H^(0,1). Conversely, any totally null complex rank-two distribution arises in this way. We refer to the pair (N,K) as the almost Robinson structure associated to K. Any non-vanishing section k of K generates a congruence of null curves K tangent to K. These curves are oriented since K is oriented. The local leaf space M of K inherits geometric structures from (M,c,K) under certain conditions. The weakest of all is when the curves of K are geodesics, that is, _kκ (v) = 0 , v ∈Γ(K^⊥) . where κ = g (k,·) for some metric g in c. This means that H descends to a rank-two distribution H on M. We shall suppose that in addition, K is non-shearing, that is, the conformal structure on H is preserved along the flow of k, i.e. _kg (v , w ) = ϵg (v , w ) , v, w∈Γ(K^⊥) , for some smooth function ϵ. Then H inherits a bundle conformal structure from H, and thus a bundle complex structure J. In fact, the property that K is non-shearing is equivalent to the associated almost Robinson structure (N,K) being involutive, in which case we refer to (N,K) as a Robinson structure. The subbundle H^(1,0) descends to the ı-eigenbundle H^(1,0) of J. This makes (M,H,J) a CR three-manifold. Our last requirement will be that K is twisting, i.e. K^⊥ is non-integrable: for any generator k and any metric g in c, the one-form κ = g (k,·) satisfies κ ( v , w) ≠ 0 , v, w ∈Γ(K^⊥) . By virtue of (<ref>), the leaf space (M,H,J) of K is then a contact CR three-manifold. For a congruence of null curves, the properties regarding the geodesy, shear and twist are all conformally invariant and do not depend on the choice of generator of K. The next question that we need to address is how metrics in c are related to contact forms for (M,H,J). To this end, we shall use the following canonical structures arising from our geometric setup <cit.>: * There is a conformal subclass n.e.c of metrics in c with the property that whenever g is in n.e.c, the congruence K is non-expanding, i.e. _kg (v , w ) = 0 , v, w ∈Γ(K^⊥) , Any two metrics in n.e.c differ by a factor constant along K. * From the twisting property of K, there is a distinguished generator k of K with the property that for any metric g in n.e.c, we have that κ = g(k,·) = 2 θ , where θ is a contact form for (H,J) Thanks to k and n.e.c, we obtain a `tight' relation between (M,c,K) and the leaf space (M,H,J) of K. To be precise, there is a one-to-one correspondence between metrics in n.e.c and contact forms for (H,J). Further, each metric g_θ in n.e.c associated to some contact form θ takes the form g_θ = 4 θ⊙λ + h , where h is (the metric induced from) the Levi form of θ, and λ is a unique null one-form satisfying kλ = 1. Choosing an admissible coframe (θ^α) for θ, and an affine parameter ϕ along the geodesics of k so that k=ϕ, we can write h = 2 h_αβ̅θ^α⊙θ^β̅ , λ = ϕ̣+ λ_αθ^α + λ_α̅θ^α̅ + λ_0 θ^0 , for some complex-valued functions λ_α and λ_α̅=λ_α, and real function λ_0 on on M. Differentiation with respect to ϕ will be denoted by a dot, i.e. ḟ := _kf for any smooth tensor-valued function f on M, and this notation will be extended to tensor components. Any other choice of metric g_θ = ^φg_θ in n.e.c for some smooth function φ on M is given by g_θ = 4 θ⊙λ + h , where θ = 1/2g_θ(k, ·) = ^φθ , h = ^φ( h - 2 ıΥ_αθ^α⊙θ + 2 ıΥ_α̅θ^α̅⊙θ + 2 Υ_αΥ^αθ⊙θ) , λ = λ + 1/2ıΥ_αθ^α - 1/2ıΥ_α̅θ^α̅ - 1/2Υ_αΥ^αθ , with (θ^α) being admissible for (H,J,θ), and Υ_α = ∇_αφ. On the other hand, a change of affine parametrisation ϕ↦ϕ'= ϕ - ϕ , for some smooth function ϕ on M accompanied with the redefinition λ'_α = λ_α + ∇_αϕ , λ'_0 = λ_0 + ∇_0ϕ , preserves the form of the metric (<ref>) and clearly the vector field k=∂/∂ϕ'. We shall henceforth denote an optical geometry with twisting non-shearing congruence of null geodesics by the triple (M,c,k). The perturbed Fefferman spaces to be introduced in Section <ref> are a special case of these. §.§ Almost Einstein scales and generalisations Recall that a metric g in c is said to be Einstein if its Ricci tensor satisfies = Λg , for some constant Λ. In the context of optical geometries, one can make further definitions whereby the Einstein condition is weakened. Let (M,c,K) be an optical structure with associated almost Robinson structure (N,K). We say that a metric g in c is: * a weakly half-Einstein metric if its Ricci tensor satisfies _a bv^a v^b = 0 , * a half-Einstein metric if it is weakly half-Einstein and has constant Ricci scalar curvature; * a pure radiation metric if it is half-Einstein and the tracefree part of the Ricci tensor satisfies κ_[a( _b] c)_∘ = 0 , i.e. _a b = Λg_a b + Φκ_aκ_b , for some constant Λ and smooth function Φ on M. For our considerations, these conditions are somewhat too strong. For this reason, and motivated by the notion of almost pseudo-Riemannian structure in <cit.>, we make the following definition: Let σ be a section of E[1] with zero set Z. We say that σ is an almost Lorentzian scale if ∇_aσ≠ 0 on Z where ∇ is the Levi-Civita connection of some (and thus any) metric in c. That this definition does not depend on the choice of metric, follows from the transformation rule ∇_aσ = ∇_aσ + Υ_aσ, and the fact that the second term vanishes on Z. The density σ defines a metric g = σ^-2g in c, but regular only off Z. First introduced by Gover in <cit.> — see also <cit.> — an almost Einstein scale is an almost Lorentzian scale σ that satisfies the conformally invariant equation ( ∇_a∇_bσ + Ρ_a bσ)_∘ = 0 . If σ has empty zero set Z, then it is referred to as an Einstein scale, and it defines a (global) Einstein metric. Otherwise, if Z is non-empty, then off Z, the metric g = σ^-2g is Einstein. A useful interpretation of Z is as the conformal infinity of some Lorentzian Einstein manifold — see <cit.> for more details. We can readily generalise this idea to the metrics introduced in Definition <ref>. Let σ∈Γ(E[1]) on an optical geometry (M,c,K) with associated almost Robinson structure (N,K). We say that σ is * an almost weakly half-Einstein scale if it satisfies ( ∇_a∇_bσ + Ρ_a bσ)_∘ = 1/2Φ_a bσ , for some tracefree symmetric tensor Φ_a b satisfying Φ_a bv^a v^b = 0 , * an almost half-Einstein scale if it is an almost weakly half-Einstein scale, and Φ_a^b∇_bσ - 1/2σ∇_bΦ_a^b = 0 ; * an almost pure radiation scale if it is an almost half-Einstein scale, and Φ_a [bκ_b] = 0 , All the conditions given in the above definition are conformally invariant. Note that condition (<ref>) is equivalent to Φ_a b = Φκ_aκ_b , The relation between Definition <ref> and Definition <ref> is given below. Let (M,c,K) be a four-dimensional optical geometry, and let σ∈Γ(E[1]) so that g = σ^-2g∈c is a smooth metric off the zero set of σ. Then * σ is an almost weakly half-Einstein scale if and only if g is a weakly half-Einstein metric; * σ is an almost half-Einstein scale if and only if g is a half-Einstein metric; * σ is an almost pure radiation scale if and only if g is a pure radiation metric. Throughout ∇^(g) will denote the Levi-Civita connection preserving g, so that for any other connection ∇, ∇ = ∇^(g) + Υ where Υ = σ^-1∇σ. We first prove the implication ⇒ for each of the cases, working off the zero set of σ: * Suppose σ satisfies (<ref>). Multiplying (<ref>) through by σ^-1 and using the transformation rule for the Schouten tensor (<ref>), we find ( ^(g)_a b)_∘ = 1/2Φ_a b, and comparing (<ref>) with (<ref>) tells us that g is a weakly half-Einstein metric. * Suppose that σ satisfies (<ref>) in addition to (<ref>). By case (1), we already know g is weakly half-Einstein metric. We proceed to check that its scalar curvature is constant. Multiplying (<ref>) through by σ^-1 gives the transformation rule ∇^(g)_bΦ_a^b = ∇_bΦ_a^b + 2 Υ_bΦ_a^b . The right-hand-side is zero by virtue of (<ref>). On the other hand, we have (^(g)_a b)_∘ = Φ_a b, and the contracted Bianchi identity tells us that ∇_a^(g) = 4 ∇^(g)_bΦ_a^b = 0 , i.e. ^(g) is constant, which makes g a half-Einstein metric. * Suppose that Φ_a b satisfies (<ref>), in addition to σ being a solution to (<ref>). Then clearly (<ref>) follows from (<ref>). For the converse direction, if we assume that the metric g defined by σ is weakly half-Einstein off the zero set Z of σ, then choosing ∇ to preserve σ tells us that (<ref>) is satisfied off Z . But (<ref>) clearly holds on Z too. Thus σ is an almost weakly-Einstein scale. The remaining cases are similar. §.§ Principal null directions and Petrov types of the Weyl tensor Let (M, c,K) be a four-dimensional optical geometry. We first assume that c is not conformally flat, i.e. the Weyl tensor is nowhere zero. We shall adapt a number of definitions from mathematical relativity to the present setting — see <cit.> for details. We say that K is a principal null direction (PND) of the Weyl tensor if (k,v,k,v) = 0 , and it is said to be repeated if it satisfies (k,v,k,·) = 0 , Further degeneracy conditions are possible, namely, (k,v,w,·) = 0 , (k,·,·,·) = 0 , In this case, we refer to a PND K as * simple if it satisfies (<ref>) but not (<ref>), * double if it satisfies (<ref>) but not (<ref>), * triple if it satisfies (<ref>) but not (<ref>), * quadruple if it satisfies (<ref>) and ≠ 0. On the other hand, at any point of a four-dimensional non-conformally flat Lorentzian conformal manifold (M,c), the Weyl tensor always determines at most four distinct PND, and thus locally, at most four distinct optical structures. The multiplicity of each of these PNDs form the basis of the Petrov classification of the Weyl tensor <cit.>. We say that is algebraically special if it admits a repeated PND, and algebraically general otherwise. In more details, now allowing for conformal flatness, it is said to be * of Petrov type I if does not admit any repeated PNDs, * of Petrov type II if admits a single double PND, * of Petrov type D if admits a pair of distinct double PNDs, * of Petrov type III if admits a triple PND, * of Petrov type N if admits a quadruple PND, * of Petrov type O if is identically zero. It is a standard result that if K is a non-shearing congruence of null geodesics, then K is a PND of the Weyl tensor. Another important result is the so-called Goldberg–Sachs theorem <cit.>, which in the present context, can be formulated in these terms: Let (M,c) be a four-dimensional Lorentzian manifold that admits an almost Einstein scale. Then the Weyl tensor is algebraically special if and only if it admits a non-shearing congruence of null geodesics. We omit the proof, which is similarly to that of Theorem <ref> below. There are variations of this theorem, and for our purpose, we shall need the following reformulation of a result due to <cit.>. Let (M,c,K) be an optical structure with non-shearing congruence of null geodesics that admits an almost weakly half-Einstein scale. Then K is a repeated PND of the Weyl tensor. By hypothesis, the almost weakly half-Einstein scale σ defines a weakly half-Einstein metric g off the zero set Z of σ. By Theorem 5.9 of <cit.>, we already know that off Z, K is a repeated PND of the Weyl tensor. This property smoothly extends to Z. Of course, the Weyl tensor may degenerate further on the zero set, as will be investigated in Section <ref>. We end this section by introducing some notation. Let (M,c,K) be an optical geometry with congruence of null curves K and associated almost Robinson structure (N,K). For a given choice of metric in c, it is convenient to choose an frame (e_0, e_α,e_α̅,e^0) adapted to (N,K), that is g(e_0 , e^0) = 1 , g(e_1 , e^1) = 1 , and all other pairings zero. Set Ψ_0 := _α^0_β^0 , Ψ_1 := ^0_α^0_0 , Ψ_2 := _α 0^α 0 , Ψ_3 := _0 α_0^0 , Ψ_4 := _α 0_β 0 . We shall now assume that K is geodesic and non-shearing (so that Ψ_0 = 0), and in addition that K is a repeated PND, so that Ψ_0 = Ψ_1 = 0 . We suppose further that K is non-twisting. Referring to the setup of Section <ref>, we choose two metrics g and g in n.e.c, so that the corresponding change of adapted frames induces the change Ψ_2 = Ψ_2 , (Ψ_3)_α = (Ψ_3)_α - 3/2ıΥ_αΨ_2 , (Ψ_4)_αβ = (Ψ_4)_αβ + 2 ıΥ_α (Ψ_3)_β - 3/2Υ_αΥ_βΨ_2 . Here, we have adjoined abstract indices to Ψ_3 and Ψ_4 to emphasize the transformation laws. The table below characterises the remaining possible Petrov types in terms of the Ψ_i defined in (<ref>): Petrov type Conditions on Ψ_i [0.5ex] D 4 (Ψ_3)^2 - 6 Ψ_2 Ψ_4 = 0 III Ψ_2 = 0 N Ψ_2 = Ψ_3 = 0 O Ψ_2 = Ψ_3 = Ψ_4 = 0 § THE FEFFERMAN CONSTRUCTION AND ITS VARIANTS §.§ Fefferman spaces In this section, we follow the approach of <cit.> closely. Let (M,H,J) be a contact CR three-manifold. The bundle E(-1,0) with its zero-section removed is a principal bundle with structure group ^*, and taking its quotient by the natural _>0-action yields a circle bundle M over M. The projection from E(-1,0) with its zero section removed to M sends a density τ of weight (-1,0) to an equivalence class [τ], where τ, τ' ∈ [τ] if and only if τ = ϱτ' for some positive real function ϱ on M. Let us fix a contact form θ. We then have a natural identification of sections of M with volume-normalised densities of weight (-1,0) via (<ref>). Thus, choosing a non-vanishing section τ∈Γ(E(-1,0)) yields a trivialisation of M such that θ = ττθ, and we may define a fibre coordinate ϕ∈ [ - π, π) such that ^ıϕτ is a section of M. The Fefferman metric associated to θ is the Lorentzian metric on M given by g_θ = 4 θ⊙( ϕ̣+ ı/2( σ^-1∇σ - σ^-1∇σ) - 1/3Ρθ) + h , where σ = τ^-1∈Γ(E(1,0)), and h is the degenerate metric induced by the Levi form of θ. One can conveniently eliminate σ by noting that since σ determines ∇, we have that ∇(σσ) =0, i.e. σ^-1∇σ = - σ^-1∇σ. Using (<ref>), we can also easily recover the more familiar form of the Fefferman metric in terms of the connection one-form: g_θ = 4 θ⊙( ϕ̣+ 1/3( ıΓ_α^α - ı/2 h^αβ̅ḥ_αβ̅ - Ρθ) ) + h . Note the following: * Since, for any other section τ' = ^ıϕτ, the corresponding change of coordinate is ϕ' = ϕ - ϕ, the expression (<ref>) does not depend on the choice of trivialisation σ. * Under a change of contact form θ = ^φθ for smooth function φ on M, the metric transforms conformally as g_θ = ^φg_θ. We therefore have a conformal class of Fefferman metrics in c. Further, c admits a canonical conformal Killing field k, i.e. _kg = 0, namely the generator k = ∂/∂ϕ of the fibers of M→M. In fact, it is Killing for each of the Fefferman metrics in c, i.e. _kg_θ = 0 for any contact form θ for (H,J). We shall refer to (M,c,k) ⟶ (M,H,J) as the Fefferman space of (M,H,J). §.§ Perturbed Fefferman spaces We generalise the Fefferman conformal structure as follows. Let (M,c,k) ⟶ (M,H,J) be a Fefferman space. Let ξ be a semi-basic one-form on M, that is, kξ = 0. Given a Fefferman metric g_θ in c, we define the Fefferman metric perturbed by ξ as g_θ,ξ = g_θ + 4 θ⊙ξ . This naturally extends to a conformal structure c_ξ, which we refer to as the Fefferman conformal structure perturbed by ξ, and we call ξ the perturbation one-form of (M,c,k), and the triple (M,c_ξ,k) as a perturbed Fefferman space. The next straightfoward result encapsulates the issue at stake in this article. With respect to the conformal structure c_ξ, the vector field k generates a twisting non-shearing congruence of null geodesics. It is conformal Killing if and only if kξ = 0. Since ξ lives on a circle bundle, its components can be Fourier expanded, and in fact, the Fourier coefficients should be understood as trivialised CR densities as the lemma below makes clear. Example <ref> should clarify any ambiguity in the notation adopted. Let (M,c_ξ,k) ⟶ (M,H,J) be a perturbed Fefferman space. For any subsets I⊂, J⊂_≥ 0, consider the tuple ( ξ^(i)_α , [∇, ξ^(j)_0] )_i ∈I, j ∈J where * for k ∈I, ξ_α^(k)∈Γ(E_α(k2,-k2)), * for k ∈J, [∇, ξ^(k)_0] denotes the equivalence class (∇, ξ_0^(k)) ∼ (∇, ξ_0^(k)) where ∇, ∇ are Webster connections related by ∇ = ∇ + Υ for some exact Υ, and for k ∈I, ξ_0^(k) and ξ_0^(k) are sections of E(k2-1,-k2-1) related by ξ^(k)_0 = ξ^(k)_0 - ıξ^(k)_αΥ^α + ıξ^(k)_α̅Υ^α̅ , with the understanding that, for i ∈I, j ∈J, ξ_α̅^(i) = ξ_α^(-i), ξ_0^(j) = ξ_0^(-j). In particular ξ_0^(0) is real. Choose some non-vanishing σ∈Γ(E(1,0)) to trivialise M→M with fibre coordinate ϕ, and set ξ_α^(k) = ξ_α^(k)σ^-k2σ^k2 , ξ_α̅^(k) = ξ_α̅^(k)σ^-k2σ^k2 , ξ_0^(k) = ξ_0^(k)σ^1-k2σ^1+k2 . Then, viewing ξ_α = ∑_k ∈Iξ_α^(k)^k ıϕ , ξ_α̅ = ∑_k ∈Iξ_α̅^(-k)^-k ıϕ , ξ_0 = ∑_k ∈ - J∪Jξ_0^(k)^k ıϕ , as components with respect to some adapted coframe (θ^0 , θ^α, θ^α̅) with θ^0 = θ = (σσ)^-1θ, the semi-basic one-form ξ = ξ_αθ^α + ξ_α̅θ^α̅ + ξ_0θ , is well-defined on M. Conversely, any semi-basic one-form on M arises in this way. Starting from the CR data, we only need to check that (<ref>) and (<ref>) are well-defined. First, ξ is real by virtue of from the reality conditions on the CR data. Next, ξ does not depend on the choice of trivialisation, since under the transformation σ' = ^-ıϕσ, ϕ'= ϕ - ϕ, the relations (<ref>) tell us that the Fourier coefficients (<ref>) transform as ξ'_α^(k) = ^k ıϕξ_α^(k) , ξ'_0^(k) = ^k ıϕξ_0^(k) . Finally, ξ does not depend on the choice of adapted coframe as follows from (<ref>). The converse works analogously. We shall refer to the tuple ( ξ^(i)_α , [∇, ξ^(j)_0] )_i ∈I, j ∈J given in Lemma <ref>, where I⊂, J⊂_≥ 0, as the CR data associated to the perturbation one-form ξ. A perturbation one-form ξ with CR data ( ξ_α^(-2), ξ_α^(0), [∇, ξ_0^(0), ξ_0^(2)], ξ_0^(4)) means that with a choice of trivialisation σ of M with fibre coordinate ϕ, and adapted coframe (θ,θ^α, θ^α̅) with θ^0 = (σσ)^-1θ, the one-form ξ is given by ξ = ( ξ_α^(0) + ξ_α^(-2)^-2ıϕ) θ^α + ( ξ_α̅^(0) + ξ_α̅^(2)^2ıϕ) θ^α̅ + ( ξ_0^(4)^4ıϕ + ξ_0^(2)^2ıϕ + ξ_0^(0) + ξ_0^(-2)^-2ıϕ + ξ_0^(-4)^-4ıϕ) θ where ξ_α^(0) = ξ_α^(0), ξ_α^(-2) = σσ^-1ξ_α^(-2), ξ_0^(0) = σσξ_0^(0), ξ_0^(-2) = σ^2 ξ_0^(-2), ξ_0^(-4) = σ^3 σ^-1ξ_0^(-4), and similar for their complex conjugates. Note that ξ_0^(4) = ξ_0^(4) under a change of contact forms, which justifies our notation for the tuple. § ALGEBRAICALLY SPECIAL PERTURBED FEFFERMAN SPACES In this section and the next, we shall consider a four-dimensional optical geometry(M,c,k) ⟶ (M,H,J) with twisting non-shearing congruence of null geodesics K. We refer the reader to Section <ref> for the general setup and notation concerning these geometries. In addition, since a perturbed Fefferman metric is in particular a special case of an optical geometry with twisting non-shearing congruence of null geodesics, it will be convenient to write g_θ,ξ = 4 θ⊙λ + h , λ := ω_θ - 1/3Ρθ + ξ , where ω_θ is the induced Webster connection one-form on M with Schouten tensor Ρ. Just as we did in Lemma <ref>, we can Fourier expand the components of λ with respect to an adapted coframe. We start with a technical lemma. Let (M,c,k) ϖ⟶ (M,H,J) be an optical geometry with twisting non-shearing congruence of null geodesics. Let g_θ∈n.e.c for some contact form θ so that it is given by (<ref>). Suppose that λ_α = ∑_k ∈Iλ_α^(k)^k ıϕ , λ_α̅ = ∑_k ∈Iλ_α̅^(-k)^-k ıϕ , λ_0 = ∑_k ∈ - J∪Jλ_0^(k)^k ıϕ , for some I⊂, J⊂_≥0. Then (M,c,k) is locally conformally isometric to a perturbed Fefferman space (M',c'_ξ,k') ⟶ (M,H,J) with perturbation one-form ξ determined by the CR data (ξ_α^(i), [∇,ξ_0^(j)] )_i ∈I, j ∈J, where for each choice of trivialisation σ∈Γ(E(1,0)) of M, we have λ_α^(0) = ıσ^-1∇_ασ + ξ_α^(0) , λ_0^(0) = ıσ^-1∇_0σ + ξ_0^(0) - 1/3Ρ , λ_α^(k) = ξ_α^(k) , λ_0^(k) = ξ_0^(k) , k ≠ 0 . where ξ_α^(i) and ξ_0^(j) are given by (<ref>). Since (M,H,J) is a contact CR three-manifold, we associate to it its conformal Fefferman space (M',c',k') ϖ'⟶ (M,H,J). To the contact form θ, we have an associated Webster connection ∇ with induced connection one-form ω_θ on M', and a corresponding Fefferman metric g'_θ in c'. Next, choose a non-vanishing density σ of weight (1,0) such that θ = (σσ)^-1θ and denote by ϕ' the corresponding fibre coordinate on M' →M. The map that sends a point p in M to (ϖ(p) , ^ıϕ∘ϖ(p) σ^-1 ) in M' is a bundle map ι from (M,c,k) to (M',c',k'): clearly ϖ' ∘ι = ϖ, and any change of affine parametrisation of k of the form ϕ = ϕ - ϕ induces a change of trivialisation as σ = ^-ıϕσ, so ι does not depend on the choice of trivialisation. Let us now write ω_θ := ω_θ - ϕ̣= ıσ^-1∇σ - 1/3Ρθ , and define ξ_α^(0) = λ_α^(0) - ıσ^-1∇_ασ , ξ_0^(0) = λ_0^(0) - ıσ^-1∇_0σ + 1/3Ρ , ξ_α^(k) = λ_α^(k) , ξ_0^(k) = λ_0^(k) , k ≠ 0 . It is then straightforward to check that under an affine reparametrisation of the geodesics of k and a change of contact form, the induced transformations of ξ_0^(k) and ξ_0^(k) allow us to view them as the trivialisations of some CR data (ξ_α^(i), [∇,ξ_0^(j)] )_i ∈I, j ∈J. We can therefore define a perturbation one-form ξ from this CR data, and an associated perturbed Fefferman metric g'_θ,ξ := g'_θ + 4 θ⊙ξ . One can also verify that under a change of contact form, the metrics thus constructed rescale by the same conformal factor. Checking that ι is a conformal isometry that sends each metric g_θ in n.e.c to a perturbed Fefferman metric g'_θ,ξ, is routine. In particular, ι_* k|_p = k'|_ι(p) at every point p of M. We shall use Lemma <ref> in Proposition <ref>, Theorem <ref> and Proposition <ref> to relate twisting non-shearing congruences of null geodesics to perturbed Fefferman spaces. As a first step, we have: Let (M,c,k) ⟶ (M,H,J) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics. Let g_θ be any metric in n.ec so that it takes the form (<ref>). The following two conditions are equivalent: * ⟨k⟩ is a repeated principal direction of the Weyl tensor , i.e. it satisfies (k, v, k, ·) = 0 , so that is of Petrov type II or more degenerate. * The component λ_α takes the form λ_α = λ_α^(0) + λ_α^(-2)^-2 ıϕ , for some (1,0)-forms λ_α^(0) and λ_α^(-2) on (M,H,J). This is already computed in Lewandowski1990,TaghaviChabert2022. Condition (<ref>) is equivalent to Ψ_1 = 0 in the notation of Section <ref>. This can be seen to be equivalent to the second-order linear ordinary differential equation λ̈_α + 2 ıλ̇_α = 0, which has general solution (<ref>). Applying Lemma <ref> to a perturbed Fefferman space gives: Let (M,c_ξ,k) ⟶ (M,H,J) be a four-dimensional perturbed Fefferman space. Then ⟨k⟩ is a repeated PND of the Weyl tensor of c_ξ if and only if the perturbation one-form ξ is determined by some CR data ( ξ_α^(-2), ξ_α^(0), [∇,ξ_0^(k)] )_k ∈I for some subset I⊂_≥0. Starting from the hypotheses of Lemma <ref>, further assumptions are needed in order to fully integrate out the dependence of the metric on the fibre coordinate. We start with a stronger constraint on the Weyl curvature. Let (M,c,k) ⟶ (M,H,J) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics. Suppose that ⟨k⟩ is a triple or quadruple PND of the Weyl tensor , i.e. (k, v, w, ·) = 0 , so that is of Petrov type III or more degenerate. Then (M,c,k) is locally conformally isometric to a perturbed Fefferman space (M',c'_ξ,k') ⟶ (M,H,J), and the perturbation one-form ξ is determined by the CR data (ξ_α^(0), ξ_α^(-2) , [∇, ξ_0^(0), ξ_0^(2)] ) where ξ_0^(0) = ı∇_αξ^α_(0) - ı∇^αξ_α^(0) + 3 ξ^α_(2)ξ_α^(-2) , ξ_0^(2) = ıξ∇_αξ^α_(2) , where ξ∇_α is the partial Webster connection gauged by ξ_α^(0). As before, we work with a metric g_θ in n.e.c with the form (<ref>). Condition (<ref>) clearly implies (<ref>), so we know by Lemma <ref> that the component λ_α is given by (<ref>). We proceed to show that under the assumption (<ref>), the component λ_0 takes the form λ_0 = λ_0^(-2)^-2 ıϕ + λ_0^(0) + λ_0^(2)^2 ıϕ , where λ_0^(0) and λ_0^(± 2) are smooth functions on M, with λ_0^(0) = λ_0^(0) and λ_0^(2) = λ_0^(-2). Using Appendix A of <cit.>, we compute the component Ψ_2 of the Weyl tensor, as defined in Section <ref>, under the assumption (<ref>). For convenience, we separate the real and imaginary parts of Ψ_2. We find Ψ_2 + Ψ_2 = 1/6λ̈ _0 - 4/3λ_0 + 4/3ı( ∇_αλ^α_(0) - ı∇^αλ_α^(0) + 3 λ^α_(2)λ_α^(-2) + Ρ) + ı( ∇_αλ^α_(2) - 2 ıλ_α^(0)λ^α_(2)) ^2 ıϕ - ı( ∇^αλ_α^(-2) + 2 ıλ^α_(0)λ_α^(-2)) ^-2 ıϕ , and ı ( Ψ_2 - Ψ_2 ) = λ̇_0 + ( ∇_αλ^α_(2) - 2 ıλ_α^(0)λ^α_(2)) ^2 ıϕ + ( ∇^αλ_α^(-2) + 2 ıλ^α_(0)λ_α^(-2)) ^-2 ıϕ . Each of these parts must vanish separately. Differentiating (<ref>) = 0 with respect to ϕ, and substituting the resulting expression for λ̈_0 into (<ref>) = 0, we can immediately solve for λ_0 algebraically, and find that it takes the form (<ref>), where λ_0^(0) = ı∇_αλ^α_(0) - ı∇^αλ_α^(0) + 3 λ^α_(2)λ_α^(-2) + Ρ , λ_0^(2) = ı∇_αλ^α_(2) + 2 λ_α^(0)λ^α_(2) . Next, we use the relations (<ref>) and the commutation relation (<ref>), multiply the resulting expressions by σσ and σ^-2 respectively, and using (<ref>), we arrive at (<ref>) and (<ref>) respectively. To complete the proof, we simply apply Lemma <ref>. We note that both ξ_0^(0) and ξ_0^(2) transform as (<ref>) as required. In the present context, the condition that the Weyl tensor is of Petrov type III or more degenerate has the following conformally invariant consequence: Let (M,c,k) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics. Suppose that ⟨k⟩ is a triple or quadruple PND of the Weyl tensor, i.e. (<ref>) holds. Then the Bach tensor satisfies (k,k) = 0. This is a long and tedious computation. Details are given in Appendix <ref>. Formula (<ref>) gives (k,k) as a linear combination of the real and imaginary parts of the component Ψ_2 of the Weyl tensor and its derivatives with respect to k. The lemma follows immediately. The converse of Lemma <ref> is not true in general, and this allows us to weaken the assumption of Proposition <ref>: Let (M,c,k) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics. Suppose that the Weyl tensor and the Bach tensor satisfy (k, v, k, ·) = 0 , (k,k) = 0 , respectively. Then (M,c,k) is locally conformally isometric to a perturbed Fefferman space (M',c'_ξ,k') ⟶ (M,H,J). More precisely, the perturbation one-form ξ is determined by the CR data(ξ_α^(0), ξ_α^(-2) , [∇,ξ_0^(0), ξ_0^(-2)], ξ_0^(-4)) where ξ_0^(0) = ı∇_αξ^α_(0) - ı∇^αξ_α^(0) + 3 ξ^α_(2)ξ_α^(-2) . Again we refer to the setup given at the beginning of this section. The line of arguments follows that of the proof of Proposition <ref>. In particular, condition (<ref>) already tells us that λ_α is given by (<ref>). We proceed to show that condition (<ref>) forces the coefficient λ_0 to take the form λ_0 = λ_0^(-4)^-4 ıϕ + λ_0^(-2)^-2 ıϕ + λ_0^(0) + λ_0^(2)^2 ıϕ + λ_0^(4)^4 ıϕ , where λ_0^(2k), |k|=0,1,2, are smooth functions on M, real for k=0, complex for k ≠ 0. By Proposition <ref>, we already know that this is true with λ_0^(4) = 0 when ⟨k⟩ is a triple PND of , and Lemma <ref> tells us that this is consistent with (<ref>). Let us now assume that ⟨k⟩ is a double PND of . This means that the component Ψ_2 of defined in (<ref>) is not zero. Using (<ref>) and (<ref>) and taking further derivatives with respect to ϕ, and plugging the resulting expressions into (<ref>), we find that condition (<ref>) is equivalent to the fourth-order linear ordinary differential equation ⃜λ_0 + 20 λ̈_0 + 64 λ_0 = 64 ( ı∇_αλ^α_(0) - ı∇^αλ_α^(0) + 3 λ^α_(2)λ_α^(-2) + Ρ) , on λ_0. The general solution is given by (<ref>) where λ_0^(0) = ı∇_αλ^α_(0) - ı∇^αλ_α^(0) + 3 λ^α_(2)λ_α^(-2) + Ρ , and λ_0^(-2), λ_0^(-4) are arbitrary complex-valued functions on (M,H,J). The end of the proof is just as that of Proposition <ref>. § DISTINGUISHED ALMOST LORENTZIAN SCALES In contrast with Section <ref>, we now investigate the consequences of the existence of the distinguished almost Lorentzian scales that we introduced in Section <ref>. Let (M,c,k) ϖ⟶ (M,H,J) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics. Then in the neighbourhood U of any point, we can always find an almost Lorentzian scale σ∈Γ(E[1]) that satisfies k^ak^b( ∇_a∇_bσ + Ρ_a bσ) = 0 , and whose zero set Z consists of the union of sections of ϖ: U→U := ϖ (U) ⊂M parametrised by the integers . More specifically, there exists an affine parameter ϕ along the geodesics of k, unique up to transformations ϕ↦ϕ + k π for any k ∈ such that Z = {ϕ = 2 k + 1/2π | k∈} , and a unique contact form θ for (H,J) so that the metric g = σ^-2g takes the form g = ^2 ϕ·g_θ , where g_θ∈n.e.c is the metric associated to θ, and off Z, the Ricci tensor of g satisfies (k,k) = 0 . In particular, we can write σ = cosϕ·σ_θ , where σ_θ is the Lorentzian scale of g_θ Locally, any almost Lorentzian scale σ on M such that the Ricci tensor of g = σ^-2g satisfies (<ref>) arises in this way. If a density σ satisfying (<ref>) exists, then off its zero set Z, the metric g = σ^-2g will satisfy (<ref>). This follows from the same argument used in the proof of Proposition <ref>. So we first show that a metric g with the required Ricci prescription exists. To this end, we may work on some open set U and assume that g = ^φg_θ , for some smooth function φ on M, and where g_θ∈n.e.c for some contact form θ. The condition that the Ricci tensor of g satisfies (<ref>) is equivalent to φ satisfying φ̈ - φ̇^2 = 1 <cit.>. On U∖Z, this has a unique solution, up to sign, ^φ = ϱ·cos(ϕ - ϕ) , for some smooth functions ϱ and ϕ on M, where ϱ is nowhere vanishing. We can then rescale θ by ϱ, and reparametrise the geodesics of k as in (<ref>), and this allows us to define Z by (<ref>). Then, the zero set of σ is precisely Z, and off Z, its associated metric is given by (<ref>) with Ricci tensor satisfying the required property (<ref>). Since g_θ = σ_θ^-2g for some σ_θ∈Γ(E_+[1]) is regular on U, the almost Lorentzian scale corresponding to g can be expressed by (<ref>). Condition (<ref>) is in fact conformal invariant if we restrict ourselves to conformal changes of the metric that are induced from changes of contact forms on (M,H,J) — this can be seen from the transformation law (<ref>) for the Schouten tensor. This therefore places no condition on the existence of any particular (almost) Lorentzian scales. Since the zero set of the density σ in Proposition <ref> is never empty, we obtain as a corollary: Let (M,c,k) ϖ_∘⟶ (M,H,J) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics. Then there is no global metric in c whose Ricci tensor satisfies (k,k) = 0. While g_θ in Proposition <ref> is regular on U, in general there is still no guarantee that it is periodic, which prevents us to conclude that (M, c, k) is a circle bundle. Let us now suppose that the optical geometry in Proposition <ref> is in fact a perturbed Fefferman conformal structure, which means that we work on a circle, rather than line, bundle, and as described in Section <ref>, the fibre coordinate ϕ, the contact form θ and the perturbed Fefferman metric g_θ,ξ are all determined by a choice of non-vanishing section σ∈Γ(E(1,0)). We now define σ := z σ where z = ϱ^-ıϕ with ϱ and ϕ being the functions of integrations in (<ref>). This induces a change of contact form, and thus a change of perturbed Fefferman metric g_θ,ξ, and a change of fibre coordinate. For notational convenience, we drop the hats, i.e. σ is our new density σ. Then σ is an almost Lorentzian scale given by σ = cosϕ·σ_θ, where σ_θ is the Lorentzian scale for g_θ,ξ, and it is not difficult to see that it must satisfy k^ak^b( ∇_a∇_bσ + Ρ_a bσ) = 0 , by virtue of (<ref>). Finally, since the fibre coordinate ϕ lies in [-π, π), the zero set of σ is now simply the hypersurfaces ϕ = ±π/2, which, by definition of the Fefferman bundle, can be identified as the cross-sections [±ıσ] : M→M. We can now reformulate Proposition <ref> as follows: Let (M,c_ξ,k) ϖ⟶ (M,H,J) be a four-dimensional perturbed Fefferman space. Then any choice of non-vanishing density σ of weight (1,0) on M determines an almost Lorentzian scale σ∈Γ(E[1]) on M that satisfies k^ak^b( ∇_a∇_bσ + Ρ_a bσ) = 0 , and whose zero set Z of σ consists of the union Z_+ ∪Z_- of the sections Z_± = { [±ıσ^-1] : M→M} for some unique, up to sign, density σ of weight (1,0) on M. In particular, the metric g = σ^-2g takes the form g = ^2 ϕ·g_θ,ξ , where g_θ,ξ is the perturbed Fefferman metric associated to the contact form θ = (σσ)^-1θ, and ϕ is the fibre coordinate determined by σ. Off Z, the Ricci tensor of g satisfies (k,k) = 0 . Conversely, any almost Lorentzian scale σ on M satisfying (<ref>) arises from a non-vanishing density σ∈Γ(E(1,0)), unique up to sign. The sign ambiguity of the density σ in Proposition <ref> is harmless since the change σ↦ -σ leaves the contact form θ unchanged, and merely interchanges the two connected components Z_+ and Z_+ of the zero set of σ. §.§ Almost weakly half-Einstein scales We can proceed with a discussion of the almost Lorentzian scales introduced in Section <ref>. The next proposition is a reformulation of a classical result that has its roots in the work of Robinson, Trautman and Kerr, to name but a few, but was subsequently interpreted in the language of CR geometry in Lewandowski1990a,Hill2008. A four-dimensional optical geometry (M,c,k) ⟶ (M,H,J) with twisting non-shearing congruence of null geodesics admits an almost weakly half-Einstein scale if and only if (M,H,J) locally admits a CR function. If (M,c,k) admits an almost weakly half-Einstein scale, then off its zero set Z, the Ricci tensor of the metric g = σ^-2g satisfies (<ref>). By Proposition <ref>, there exists λ_α∈Γ(E_α) that satisfies (<ref>), which is none other than the Webster–Weyl equation (<ref>). By Theorem <ref>, we can conclude that (M,H,J) admits a CR function. The converse works just analogously. Let us now specialise to the case where we start from a perturbed Fefferman space. This will allow us to determine the nature of the Webster–Weyl equation in this context. A four-dimensional perturbed Fefferman space (M,c_ξ,k) ⟶ (M,H,J) admits an almost weakly half-Einstein scale σ if and only if ξ is determined by some CR data ( ξ_α^(-2), ξ_α^(0), [∇,ξ_0^(k)] )_k ∈I for some subset I⊂_≥0, and there exists a non-vanishing density σ∈Γ(E(1,0)) such that ξ∇_α̅σ + 2ıξ_α̅^(2)σ = 0 , ξ∇_αξ∇_βσ + ı_αβσ = 0 , where ξ^(-2)_α = σσ^-1ξ_α^(-2) and ξ∇_α denotes any partial Webster connection gauged by ξ_α^(0). In addition, the zero set Z of σ consists of the union Z_+ ∪Z_- of the sections Z_± = { [±ıσ^-1] : M→M}. We have two immediate consequences of the existence of an almost weakly half-Einstein scale σ. First, by Theorem <ref>, ⟨ξ⟩ is a repeated PND of the Weyl tensor of c_ξ, and so by Corollary <ref>, the perturbation one-form ξ is determined by some CR data ( ξ_α^(-2), ξ_α^(0), [∇,ξ_0^(k)] )_k ∈I for some subset I⊂_≥0. Second, since σ satisfies (<ref>) in particular, we have by Proposition <ref> a distinguished non-vanishing density σ such that [±ıσ^-1] are the zero set Z of σ. In terms of the fibre coordinate ϕ defined by σ, the metric g = σ^-2g takes the form (<ref>). We already know that its Ricci tensor satisfies (<ref>). The remaining consequences of the condition (<ref>), i.e. (v , v ) = 0 for any v∈Γ(N) are given in Proposition <ref> as (<ref>) and (<ref>), which, using the identification (<ref>), imply ξ∇_ασ + 2 ıξ_α ^(-2)σ = 0 , ξ∇_αξ∇_βσ + ı_αβσ = 0 , respectively. The second of these equations is just (<ref>), and since we are using the Webster connection compatible with σσ, the complex conjugate of the first is just (<ref>). For the converse, we assume that we have the CR data as given and a density σ of weight (1,0) that satisfies (<ref>) and (<ref>). By Proposition <ref>, σ gives rise to an almost Lorentzian scale σ satisfying (<ref>) with zero set Z determined by [±ıσ^-1]. By appealing to Proposition <ref>, it is then a simple matter to check that off Z, the Ricci tensor of the metric g = σ^2g satisfies (<ref>): Choose ∇ to be compatible with θ = (σσ)^-1θ, and trivialise (<ref>) and (<ref>) to obtain (<ref>) and (<ref>) as required. In two special cases, we obtain the following consequences: Let (M,c_ξ,k) ⟶ (M,H,J) be a four-dimensional perturbed Fefferman space. * Suppose that ξ is determined by some CR data (ξ_α^(0), [∇,ξ_0^(k)] )_k ∈I for some subset I⊂_≥0. Then (M,c_ξ,k) admits an almost weakly half-Einstein scale σ if and only if (M,H,J) is realisable. * Suppose that ξ is determined by some CR data (ξ_0^(k))_k ∈I for some subset I⊂_≥0. Then (M,c_ξ,k) admits an almost weakly half-Einstein scale σ if and only if (M,H,J) is CR–Einstein. For the first part, (<ref>) and (<ref>), with ξ_α^(-2) = 0, are simply (<ref>) and (<ref>) respectively with τ = σ. By Theorem <ref> the result follows. For the second part, if in addition ξ_α^(0) = 0, (<ref>) and (<ref>) are the defining equations for a CR–Einstein structure — see Remark <ref> The second part of Corollary <ref> also tells us that the underlying CR structure is flat. Weaker conditions are certainly possible if one assumes that ξ_α̅^(0) or ξ_α̅^(2) are `exact'. We leave the details to the reader. §.§ Almost weakly half-Einstein scales and null vacuum Maxwell two-forms Drawing from the terminology used in physics, a vacuum Maxwell two-form on a four-dimensional Lorentzian conformal manifold (M,c) is a two-form F that is both closed and co-closed, i.e. F = 0 , ⋆F = 0 . Here, ⋆ is the (conformally invariant) Hodge dual operator on two-forms on M. Such a two-form will be said to be null or algebraically special if there exists a null vector field k such that kF = 0 , κ∧F = 0 . where κ = g (k , · ). In this case, we shall refer to the span of k as a repeated principal null direction (PND) of F. Both (<ref>) and (<ref>) are conformally invariant. Condition (<ref>) tells us that we can write F = F^+ + F^- where F^± are simple complex two-forms satisfying F^± = F^∓ and ⋆F^± = ±ıF^±. More precisely, k defines an optical structure K := ⟨k⟩ on (M,c) with almost Robinson structure (N,K), and F^+ ∈Γ(⋀^2 (N)). By (<ref>), F^± are closed, so N is involutive, which is equivalent to k being tangent to a non-shearing congruence of null geodesics K. This is essentially the content of Mariot's Theorem <cit.>: a null vacuum Maxwell two-form locally always gives rise to a non-shearing congruence of null geodesics. In particular, the leaf space of K is a CR three-manifold (M,H,J), contact if the congruence is twisting, and by (<ref>) and (<ref>), using a suitable orientation on M, F^+ is the pull-back of a closed section of the canonical bundle of (M,H,J). This already suggests that a converse of Mariot's Theorem will not in general be possible: starting from a twisting non-shearing congruence of null geodesics, a null vacuum Maxwell two-form would have to arise from a closed section of the canonical bundle of a contact CR three-manifold. But the existence is in general not guaranteed unless (M,H,J) is realisable. In particular, if one works in the analytic category, the CR three-manifold is certainly realisable and admits closed sections, and one can construct analytic null vacuum Maxwell two-forms. This is known as Robinson's Theorem <cit.>. Tafel <cit.> showed that Robinson's result may fail otherwise, and indeed, highlighted its failure in terms of a Lewy operator on the CR three-manifold. The following result is a reformulation of <cit.> and <cit.>. Let (M,c,k) → (M,H,J) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics. Then locally c admits an almost weakly half-Einstein scale and ⟨k⟩ is a repeated PND of a null vacuum Maxwell two-form if and only if (M,H,J) is realisable. Suppose that (M,c, k) admits an almost weakly half-Einstein scale. Then Proposition <ref> provides a CR function and the null Maxwell two-form the closed section of the canonical bundle. By Theorem <ref>, realisability follows. The converse follows from Proposition <ref> alone. §.§ Almost half-Einstein scales Our next result is an alternative characterisation of four-dimensional optical geometries with twisting non-shearing congruence of null geodesics arising from perturbed Fefferman spaces. Let (M,c,k) ⟶ (M,H,J) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics that admits an almost half-Einstein scale σ. Then (M,c,k) is locally conformally isometric to a perturbed Fefferman space (M',c'_ξ,k') ⟶ (M,H,J) where the pertubation one-form ξ is determined by some CR data(ξ_α^(0), ξ_α^(-2), [∇ , ξ_0^(0), ξ_0^(2)], ξ_0^(4)). Since (M,c,k) admits an almost half-Einstein scale, ⟨k⟩ is a repeated PND of the Weyl tensor by Theorem <ref>. By Lemma <ref>, the dependence of the component λ_α on the fibre coordinate ϕ is fully determined as (<ref>). Next, off the zero set of σ, the Ricci tensor of g = σ^-2g satisfies (<ref>) and has constant Ricci scalar. Referring to Proposition <ref>, this implies that the ϕ-dependence of the component λ_0 is fully determined as the Fourier expansion (<ref>). The proof is completed by an application of Lemma <ref>. The next theorem describes the CR data of the perturbation one-form alluded to in Proposition <ref>. A four-dimensional perturbed Fefferman space (M,c_ξ,k) ⟶ (M,H,J) admits an almost half-Einstein scale σ if and only if ξ is determined by some CR data(ξ_α^(0), ξ_α^(-2), [∇ , ξ_0^(0), ξ_0^(2)], ξ_0^(4)), and there exists a non-vanishing density σ∈Γ(E(1,0)) such that ξ∇_α̅σ + 2ıξ_α̅^(2)σ = 0 , ξ∇_αξ∇_βσ + ı_αβσ = 0 , where ξ^(-2)_α = σσ^-1ξ_α^(-2), ξ∇_α denotes any partial Webster connection gauged by ξ_α^(0), and ξ_0^(0) = ı( ∇_αξ^α_(0) - ∇^αξ_α^(0)) + 3 ξ_α^(-2)ξ^α_(2) + 6 ( μ) σ^-1σ^-1 , ξ_0^(2) = 1/2ıξ∇_αξ^α_(2) + 2 ξ_0^(4)σ^-1σ + 2 ( μ) σ^-2 , ξ_0^(4) = 1/2( 3/4( ∇_α( σ^-1ξ∇^ασ) + ∇^α( σ^-1ξ∇_ασ) - (σ^-1ξ∇_ασ) ( σ^-1ξ∇^ασ) ) . . - 1/2( ∇_αν^α + ∇^αν_α - ν_αν^α) + Ρ) σ^2 σ^-2 + ( - 1/6Λ + μ) σσ^-3 , for some real constant Λ and complex valued function μ on (M,H,J), and where ∇_α (σσ) = ν_ασσ. In addition, the zero set Z of σ consists of the union Z_+ ∪Z_- of the sections Z_± = { [±ıσ^-1] : M→M}. Off Z, the half-Einstein metric g = σ^-2g has Ricci scalar 4 Λ, and is given g = ^2 ϕ·g_θ, ξ, where g_θ, ξ is the perturbed Fefferman metric associated to σ and contact form θ, and ϕ the local fibre coordinate. Since σ is an almost half-Einstein scale, we already know by Proposition <ref> that the perturbation one-form ξ is determined by some CR data (ξ_α^(0), ξ_α^(-2), [∇ , ξ_0^(0), ξ_0^(2)], ξ_0^(4)). Further the existence of a density σ∈Γ(E(1,0)) that satisfies (<ref>) and (<ref>) is guaranteed by Theorem <ref>. To establish the precise form of the remaining densities, we look at the next relevant conditions on the Ricci curvature, which tells us by Proposition <ref> that the component λ_0 is determined by (<ref>) with (<ref>). We can rewrite the latter as λ_0^(0) = ı( ∇_αλ^α_(0) - ∇^αλ_α^(0)) + 3 λ_α^(-2)λ^α_(2) + Ρ + 6 ( μ) , λ_0^(2) = 2 λ_0^(4) + 1/2ı∇_αλ^α_(2) + λ_α^(0)λ^α_(2) + 2 ( μ) , λ_0^(4) = 1/8( 4 Ρ + 3 ı( ∇_αλ^α_(0) - ∇^αλ_α^(0)) - 3 λ_α^(0)λ^α_(0) - 4/3Λ) + μ , for some real constant Λ and complex valued function μ on (M,H,J). Using the relations (<ref>), these become ξ_0^(0) = ı( ∇_αξ^α_(0) - ∇^αξ_α^(0)) + 3 ξ_α^(-2)ξ^α_(2) + 6 ( μ) , ξ_0^(2) = 2 ξ_0^(4) + 1/2ı∇_αξ^α_(2) + ıσ^-1ξ∇_ασξ^α_(2) + 2 ( μ) , ξ_0^(4) = 1/2( 3/4( ∇_α( σ^-1ξ∇^ασ) + ∇^α( σ^-1ξ∇_ασ) ) . . - 3/4( σ^-1ξ∇_ασ) ( σ^-1ξ∇^ασ) - 1/3Λ + Ρ) + μ . Next, we multiply (<ref>), (<ref>) and (<ref>) through by σ^-1σ^-1, σ^-2 and σσ^-3 respectively, so that using (<ref>), we obtain (<ref>), (<ref>) and (<ref>), where we have added terms involving ν_α = (σσ)^-1∇_α (σσ) to ensure CR invariance. The converse is straightforward: the distinguished density σ allows us to trivialise the CR data. Choosing the Webster connection for which ν_α = 0, we can similarly trivialise equations (<ref>) and (<ref>). Again, using (<ref>), and computing the Ricci tensor, we find that the components of λ satisfy the conditions given in Proposition <ref>. §.§ Almost pure radiation scales While the Bach tensor of a conformal four-manifold is an obstruction to the existence of an almost Einstein scale, its vanishing is not necessary for the existence of an almost pure radiation scale. For our purposes, we shall need the following weaker condition. Let (M,c,k) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics that admits an almost pure radiation scale. Then ⟨k⟩ is a repeated PND of the Weyl tensor, and the Bach tensor satisfies (k,k) = 0. Let σ be an almost pure radiation scale. Then ⟨k⟩ is a repeated PND of the Weyl tensor by Theorem <ref>. Let g = σ^-2g be the pure radiation metric off the zero set of σ. By (<ref>), the Schouten tensor of g can be written as Ρ_a b = 1/2Φκ_aκ_b + 1/2Λg_a b , for some smooth function Φ on M, constant Λ and where κ = g(k,·). By (<ref>), we must compute the expression k^a k^b _a b = - k^a k^b ∇^c_a b c + k^a k^b Ρ^c d_a c b d , The second term of the RHS of this expression is then clearly zero, and we are left with the first term, which by the product rule, can be re-arranged as k^a k^b ∇^c_a b c = ∇^c( k^a k^b _a b c) - ( ∇^ck^a ) k^b _a b c - ( ∇^ck^b ) k^a _a b c . Now, using equation (<ref>) for the definition of the Cotton tensor, the product rule and the fact that Ρ_a bk^b = 0, we k^a k^b _a b c = 0, thus, the first term of the RHS of (<ref>) is zero. Next, using (<ref>) and substituting in (<ref>), we find ( ∇^ck^a ) k^b _a b c = 0, so that the second term of the RHS of (<ref>) vanishes, and so does the third term by the symmetries of _a b c. Hence, B(k,k) = 0 off the zero set of σ. These conformally invariant conditions extend smoothly to the zero set of σ. By Lemma <ref> and Theorem <ref>, we immediately obtained the following corollary. Let (M,c,k)⟶ (M,H,J) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics that admits an almost pure radiation scale. Then it is locally conformally isometric to a perturbed Fefferman space (M',c'_ξ,k')⟶ (M,H,J) where the perturbation one-form ξ is determined by some CR data (ξ_α^(0), ξ_α^(-2) , [∇,ξ_0^(0), ξ_0^(-2)], ξ_0^(-4)) where ξ_0^(0) = ı∇_αξ^α_(0) - ı∇^αξ_α^(0) + 3 ξ^α_(2)ξ_α^(-2) . The differential properties of the CR data are given next. A four-dimensional perturbed Fefferman space (M,c_ξ,k) ⟶ (M,H,J) admits an almost pure radiation scale σ if and only if ξ is determined by CR data(ξ_α^(0), ξ_α^(-2) , [∇,ξ_0^(0), ξ_0^(-2)], ξ_0^(-4)) and there exists a non-vanishing density σ∈Γ(E(1,0)) such that ξ∇_α̅σ + 2ıξ_α̅^(2)σ = 0 , ξ∇_αξ∇_βσ + ı_αβσ = 0 , where ξ^(-2)_α = σσ^-1ξ_α^(-2), ξ∇_α denotes any partial Webster connection gauged by ξ_α^(0), and ξ_0^(0) = ı∇_αξ^α_(0) - ı∇^αξ_α^(0) + 3 ξ^α_(2)ξ_α^(-2) , ξ_0^(2) = - 1/2ıξ∇^αξ_α^(-2) + 4 σσ^-1ξ_0^(-4) , ξ^(4)_0 = σ^2σ^-23/8( ∇^α( σ^-1ξ∇_ασ) + ∇_α( σ^-1ξ∇^ασ) ) - 3/8( σ^-1ξ∇_ασ) ( σ^-1ξ∇^ασ) + Ρ - 1/4( ∇_αν^α + ∇^αν_α - ν_αν^α) + μσσ^-3 , for some real constant Λ and complex valued function μ on (M,H,J) satisfying μ= -μ, and where ∇_α (σσ) = ν_ασσ, and in addition ξ∇_αξ_0^(4) - ( ν_α - 2 ıξ_α^(-2)) ξ^(4)_0 = 0 . In addition, the zero set Z of σ consists of the union Z_+ ∪Z_- of the sections Z_± = { [±ıσ^-1] : M→M}. Off Z, σ determines a pure radiation metric g = ^2 ϕ·g_θ, ξ, where g_θ, ξ is the perturbed Fefferman metric associated to σ and contact form θ, and ϕ the local fibre coordinate. In addition, the Ricci tensor of g is given by = 4 ·cos^2 ϕ·Φ·θ⊗θ + Λg , for some density Φ of weight (-2,-2) on (M,H,J). Since σ is an almost pure radiation scale, and in particular, an almost half-Einstein scale, we know by Theorem <ref> that the perturbation one-form is determined by some CR data (ξ_α^(0), ξ_α^(-2), [∇ , ξ_0^(0), ξ_0^(2)], ξ_0^(4)), and that there exists a density σ∈Γ(E(1,0)) that satisfies (<ref>) and (<ref>), and ξ_0^(0), ξ_0^(2) and ξ_0^(4) must are given by (<ref>), (<ref>) and (<ref>) respectively. Referring to Proposition <ref>, in particular equation (<ref>), the next relevant conditions on the Ricci curvature tells us that (μ) = 0, which immediately gives the required expressions (<ref>), (<ref>) and (<ref>). In addition, we turn (<ref>) into (<ref>) by setting ξ_0^(4) = λ_0^(4) and λ_α = ıσ^-1ξ∇_ασ, multiplying it through by σσ^-3 and adding a term involving ν_α = (σσ)^-1∇_α (σσ) to ensure CR invariance. The converse is just as was explained in the proof of Theorem <ref>. Finally, the form of the Ricci tensor (<ref>) follows from Lemma <ref>. We note that in the case where our conformal manifold is the canonical Fefferman space, equations (<ref>) and (<ref>) reduce to the CR–Einstein equations (<ref>) and (<ref>) with τ = σ, which is consistent with what is found in <cit.>. We end this section by reformulating a result due to <cit.> and <cit.> regarding the connection between the realisability of the CR structure and the Petrov type II or D condition. We provide an alternative proof based on the ideas of Section <ref>. Let (M,c_ξ,k) → (M,H,J) be a four-dimensional perturbed Fefferman space that admits an almost pure radiation or Einstein scale. Suppose c_ξ is of Petrov type II or D but no more degenerate. Then (M,H,J) is realisable. Suppose that (M,c_ξ,k) admits an almost pure radiation scale. By Theorem <ref>, there exists σ∈Γ(E(1,0)) and CR data ( ξ_α^(0) , ξ_α^(-2) , [ξ_0^(0)], [ξ_0^(-2)], ξ_0^(-4)) such that (<ref>), (<ref>) and (<ref>) hold, where ∇_α (σσ) = ν_ασσ and ξ_α^(-2) = σσ^-1ξ_α^(-2). The condition that c_ξ is of Petrov II or D implies that ξ_0^(4) is not zero — see <cit.> or Proposition <ref> below. Using the definition of ν_α, (<ref>) implies ξ∇_ασ - ( ν_α - 2ıξ_α^(-2)) σ = 0 . Hence, by (<ref>) and (<ref>), we have that ξ∇_α( σ^-1ξ_0^(4)) = ( ξ∇_ασ^-1) ξ_0^(4) + σ^-1( ξ∇_αξ_0^(4)) = - ( ν_α - 2 ıξ_α^(-2)) σ^-1ξ^(4)_0 + ( ν_α - 2 ıξ_α^(-2)) σ^-1ξ^(4)_0 = 0 . Choose τ∈Γ(E(1,0)) such that τ^-3 = σ^-1ξ_0^(-4)∈Γ(E(-3,0)). Then applying Theorem <ref> proves realisability of (M,H,J). Suppose that (M,H,J) is realisable. Then Theorem <ref> tells us that there exists σ and τ of weight (1,0) that satisfy (<ref>) and (<ref>) for some gauge ξ_α^(0) respectively. Define ν_α by ∇_α (σσ) = ν_ασσ. Then ξ_0^(4) := στ^-3∈Γ(E(1,-3)) satisfies (<ref>). We can then define ξ^(-2)_α by (<ref>), and ξ^(0)_0 and ξ^(2)_0 by (<ref>) and (<ref>) respectively. A converse to Theorem <ref> would then boil down to whether these definitions are compatible with the remaining equation (<ref>). § PROPERTIES OF THE WEYL TENSOR AND ASYMPTOTICS The following proposition can be obtained from a brute force computation using Appendix A of <cit.>. We also recall that the definition of F_αβ̅ and F_0 α are given by (<ref>) with ξ_α^(0) and ξ_0^(0) in place of ξ_α and ξ_0. Let (M,c_ξ,k) ⟶ (M,H,J) be a perturbed Fefferman space where the perturbation one-form ξ is determined by some CR data (ξ^(-2)_α, ξ^(0)_α, [∇, ξ^(0)_0, ξ^(2)_0], ξ^(4)_0) so that ⟨k⟩ is a repeated PND of the Weyl tensor . In particular, is algebraically special. Choose a non-vanishing density σ of weight (1,0) to trivialise M→M with fibre coordinates ϕ. Let g_θ be a perturbed Fefferman metric in c_ξ for the contact form θ = (σσ)^-1θ. Then the Fourier expansions of the components of the Weyl tensor defined by (<ref>) are found to be Ψ_2 = Ψ_2^(-4)^-4 ıϕ + Ψ_2^(-2)^-2 ıϕ + Ψ_2^(0) , Ψ_3 = Ψ_3^(-6)^-6 ıϕ + Ψ_3^(-4)^-4 ıϕ + Ψ_3^(-2)^-2 ıϕ + Ψ_3^(0) + Ψ_3^(2)^2 ıϕ , Ψ_4 = Ψ_4^(-8)^-8 ıϕ + Ψ_4^(-6)^-6 ıϕ + Ψ_4^(-4)^-4 ıϕ + Ψ_4^(-2)^-2 ıϕ + Ψ_4^(0) + Ψ_4^(2)^2 ıϕ + Ψ_4^(4)^4 ıϕ , for some tensors Ψ_2^(i), (Ψ_3^(i))_α and (Ψ_4^(i))_αβ on (M,H,J) that correspond to densities Ψ_2^(k) = σ^k2-1σ^-k2-1Ψ_2^(k) ∈Γ(E(k2-1,-k2-1)) , k = -4, -2 , 0 , (Ψ_3^(k))_α = σ^k2-1σ^-k2-1 (Ψ_3^(k))_α ∈Γ(E_α(k2-1,-k2-1)) , k = -6, -4, -2 , 0 , 2 , (Ψ_4^(k))_αβ = σ^k2-1σ^-k2-1 (Ψ_4^(k))_αβ ∈Γ(E_αβ(k2-1,-k2-1)) , k = -8, -6, -4, -2 , 0 , 2, 4 . given by Ψ_2^(-4) = 4 ξ_0^(-4) , Ψ_2^(-2) = ıξ∇^γξ^(-2)_γ + 2 ξ_0^(-2) , Ψ_2^(0) = 4ı/3 F_α^α - 2 ξ^γ_(2)ξ_γ^(-2) , Ψ_3^(-6) = - 6 ξ_α^(-2)ξ_0^(-4) , Ψ_3^(-4) = - 1/2ξ_α^(-2)Ψ_2^(-2) + 2 ıξ∇_αξ_0^(-4) , Ψ_3^(-2) = -1/4ξ∇_βξ∇^βξ_α^(-2) + 3 ı/2ξ∇_αξ_0^(-2) -ıξ∇_0ξ_α^(-2) , Ψ_3^(0) = 1/2∇_α F_β^β + 3 ı/2 F_0 α -3 ı/2ξ∇_βξ^β_(2)ξ_α^(-2) -ıξ∇_βξ_α^(-2)ξ^β_(2) , Ψ_3^(2) = 1/4( ξ∇_αξ∇_βξ^β_(2) - 3 ı_βαξ^β_(2)) +ı/2ξ∇_αξ_0^(2) +2 ξ_α^(-2)ξ_0^(4) , Ψ_4^(-8) = 6 ξ_0^(-4)ξ_α^(-2)ξ_β^(-2) , Ψ_4^(-6) = -ıξ_0^(-4)ξ∇_αξ_β^(-2) - 3 ıξ_α^(-2)ξ∇_βξ_0^(-4) , Ψ_4^(-4) = -1/2( ξ∇_αξ∇_βξ_0^(-4) -3 ı_αβξ_0^(-4)) -ıξ_α^(-2)( ξ∇_βξ_0^(-2) - ξ∇_0ξ_β^(-2)) , Ψ_4^(-2) = -1/2( ξ∇_αξ∇_βξ_0^(-2) - 2 ı_αβξ_0^(-2)) +1/2ξ∇_αξ∇_0ξ_β^(-2) -1/2_αβξ∇^γξ_γ^(-2) , Ψ_4^(0) = ı/2_αβ -1/2∇_α F_0β +2 ıξ∇_αξ_β^(-2)ξ_0^(2) +3 ıξ_α^(-2)ξ∇_αξ_0^(2) -3 ı_αγξ^γ_(2)ξ_β^(-2) +6 ξ_α^(-2)ξ_β^(-2)ξ_0^(4) , Ψ_4^(2) = -1/2ξ∇_αξ∇_βξ_0^(2) +3 ıξ∇_αξ_β^(-2)ξ_0^(4) +5 ıξ_α^(-2)ξ∇_βξ_0^(4) +1/2ξ∇_γ_αβξ^γ_(2) + _αβξ∇_γξ^γ_(2) , Ψ_4^(4) = -1/2( ξ∇_αξ∇_βξ_0^(4) + ı_αβξ_0^(4)) . We note that in the case of a Fefferman space, i.e. ξ =0, there is only one component left, namely, Ψ_4^(0) = ı/2_αβ where _αβ is the Cartan invariant (<ref>) obstructing CR flatness. Thus, we have that the Weyl tensor is of type N, and the Fefferman conformal structure is flat if and only if the CR structure is flat, as was already demonstrated in <cit.>. From (<ref>), under a change of perturbed Fefferman metrics (or equivalently, change of contact forms), these transform as Ψ_2^(k) = Ψ_2^(k) , k = -4, -2 , 0 , (Ψ_3^(k))_α = (Ψ_3^(k))_α - 3/2ıΥ_αΨ_2^(k) , k = -6, -4, -2 , 0 , 2 , (Ψ_4^(k))_αβ = (Ψ_4^(k))_αβ + 2 ıΥ_α (Ψ_3^(k))_β - 3/2Υ_αΥ_βΨ_2^(k) , k = -8, -6, -4, -2 , 0 , 2, 4 . We immediately obtain: Let (M,c_ξ, k ) ⟶ (M,H,J) be a perturbed Fefferman space as in Proposition <ref>. Then Ψ_αβ^(k) = ∑_i,j =k( 4 (Ψ_3^(i) )_α (Ψ_3^(j))_β - 6 Ψ_2^(i) (Ψ_4^(j))_αβ) , k = -12, -10, … , 4 , are CR invariant sections of E_αβ(k-2,-k-2). Further, Ψ^(-12)_αβ=0. The transformations (<ref>) of the densities allow us to determine which of these are CR invariant under various conformal curvature conditions such as Petrov types and so on. We have collected this information in the table below: Interestingly, for Petrov type II and D, the CR invariant Ψ_4^(4) is nothing but the gauged Webster–Weyl operator acting on a density of weight (1,-3), which is known to be CR invariant in the first place. Another property easy to check is that Ψ_2^(0) is real-valued. The interpretation of its vanishing is given next. Let (M,c_ξ, k ) ⟶ (M,H,J) be a perturbed Fefferman space as in Proposition <ref>. Then the Bach tensor satisfies (k,k) = 0 if and only if Ψ_2^(0) = 0. This is immediate on comparison between the expression for Ψ_2^(0) in Proposition <ref> and (<ref>) in Theorem <ref>. §.§ Distinguished almost Lorentzian scales If we now assume that the perturbed Fefferman space admits a distinguished almost Lorentzian scale as discussed in Section <ref>, the expressions for the densities of the Weyl curvature given in Proposition <ref> may simplify or vanish altogether. We shall make no attempt to provide a full account, and focus on the two specific cases below. §.§.§ Almost half-Einstein scales Let (M,c_ξ, k ) ⟶ (M,H,J) be a perturbed Fefferman space as in Proposition <ref>, and suppose it admits an almost half-Einstein scale σ. Let σ∈Γ(E(1,0)) be the unique (up to sign) non-vanishing density given in Theorem <ref>. Then σσΨ_2^(0) - σ^2 Ψ_2^(2) + σ^-1σ^3 Ψ_2^(4) = 0 . Combining (<ref>) and (<ref>), we obtain σσ( ξ_0^(0) - ı( ∇_αξ^α_(0) - ∇^αξ_α^(0)) - 3 ξ_α^(-2)ξ^α_(2)) - 3 σ^2 ( ξ_0^(2) - 1/2ıξ∇_αξ^α_(2)) + 6 σ^-1σ^3 ξ_0^(4) = 0 . Hence, on comparing with the expressions for Ψ_2^(0), Ψ_2^(-2) and Ψ_2^(-4) in Proposition <ref>, we deduce (<ref>). §.§.§ Almost pure radiation scales Let (M,c_ξ, k ) ⟶ (M,H,J) be a perturbed Fefferman space as in Proposition <ref>, and suppose it admits an almost pure radiation scale σ. Let σ∈Γ(E(1,0)) be the unique (up to sign) non-vanishing density given in Theorem <ref>. Then Ψ_2^(0) = 0 , Ψ_2^(2) = σ^-1σΨ_2^(4) , On inspection of Ψ_2^(0), Ψ_2^(-2) and Ψ_2^(-4) in Proposition <ref>, conditions (<ref>) and (<ref>) are seen to follow from (<ref>) and (<ref>) respectively. Equation (<ref>) can also be obtained from Proposition <ref> and Lemma <ref>. §.§ Asymptotics We now investigate the behaviour of the Weyl tensor on the zero set of some distinguished almost Lorentzian scale. Let (M,c_ξ, k ) ⟶ (M,H,J) be a perturbed Fefferman space as in Proposition <ref>. Choose any density σ of weight (1,0) and let σ be any almost Lorentzian scale whose zero set Z consists of the union Z_+ ∪Z_- of the sections Z_± = { [±ıσ^-1] : M→M}. Then the Weyl tensor is * of Petrov type D or more degenerate on Z if and only if ∑_k=-5^2 (-1)^kσ^-k+1σ^k+1Ψ_αβ^(2k) = 0 ; * of Petrov type III or more degenerate on Z if and only if σ^3 σ^-1Ψ_2^(-4) - σ^2 Ψ_2^(-2) + σσΨ_2^(0) = 0 ; * of Petrov type N or more degenerate on Z if and only if (<ref>) holds, and - σ^4σ^-2Ψ_3^(-6) + σ^3σ^-1Ψ_3^(-4) - σ^2Ψ_3^(-2) + σσΨ_3^(0) - σ^2Ψ_3^(2) = 0 ; * of Petrov type O on Z if and only if (<ref>) and (<ref>) holds, and σ^5σ^-3Ψ_4^(-8) - σ^4σ^-2Ψ_4^(-6) + σ^3σ^-1Ψ_4^(-4) - σ^2Ψ_4^(-2) + σσΨ_4^(0) - σ^2Ψ_4^(2) + σσ^3Ψ_4^(4) = 0 . In terms of the fibre coordinate, Z consists of the hypersurfaces ϕ = ±π/2. The expressions (<ref>) evaluated at ϕ = ±π/2 simply correspond to (<ref>), (<ref>) and (<ref>). The computation of (<ref>) is similar. Comparing (<ref>) from Proposition <ref> and (<ref>) from Proposition <ref>, we obtain: Let (M,c_ξ, k ) ⟶ (M,H,J) be a perturbed Fefferman space as in Proposition <ref>, and suppose it admits an almost half-Einstein scale σ with zero set Z. Then the Weyl tensor is of Petrov type III or more degenerate on Z. Let us now delve further into the causal properties of Z. We start in greater generality by assuming the existence of an almost Lorentzian scale σ on a perturbed manifold (M,c_ξ). Then, for each choice of Levi-Civita connection ∇, we have a weighted one-form ν_a := ∇_aσ∈Γ( E_a[1]) . This depends on the choice of metric in c_ξ since under a conformal change, ν_a transforms as ν_a = ν_a + Υ_aσ. However, on restriction to Z, any of these weighted forms coincides with the weighted normal covector of Z <cit.>. Let us assume further that σ is an almost half-Einstein scale. By Theorem <ref>, σ is determined by some non-vanishing σ∈Γ(E(1,0)) trivialising M→M with fibre coordinate ϕ and with contact form θ = (σσ)^-1θ, associated Fefferman scale σ_θ,ξ so that σ = cosϕ·σ_θ,ξ. Its zero set is given by Z = Z_+ ∪Z_- where Z_± = { [±ıσ^-1] : M→M}. This means two things: First, for each choice of Levi-Civita connection ∇, the weighted one-form (<ref>) reads as ν = - σ_θ,ξ·sinϕ·ϕ̣+ cosϕ·∇σ_θ,ξ . Second, we may choose our Levi-Civita connection to preserve the distinguished perturbed Fefferman scale σ_θ,ξ to single out the one-form of weight 1 and vector field of weight -1 (θ)ν = - σ_θ,ξ·sinϕ·ϕ̣ , (θ)n = g^-1 ( (θ)ν , · ) . Computing the length squared of (θ)n on restriction to Z, we find g ((θ)n, (θ)n) |_Z = -1/3Λ . We can then immediately reformulate a standard result of mathematical relativity Penrose1965,Penrose1986 in terms of almost half-Einstein scales: Let (M,c_ξ,k) ⟶ (M,H,J) be a four-dimensional perturbed Fefferman space that admits an almost half-Einstein scale σ, so that off the zero set Z of σ, the metric g = σ^-2g is half-Einstein with constant Ricci scalar 4 Λ. Then * Z is null if and only if Λ = 0; * Z is spacelike if and only if Λ > 0; * Z is timelike if and only if Λ < 0. In general, while Z is expected to have merely a conformal, rather than metric, structure — see for instance <cit.> — in our case, by virtue of the almost half-Einstein equations, we do in fact have a distinguished regular metric on Z, namely, the perturbed Fefferman metric (<ref>) pulled back to Z: g_θ,ξ |_Z = 4 θ⊙( ı/2( σ^-1∇σ - σ^-1∇σ) - 1/3Ρθ + ξ|_Z) + h . This clearly depends on the pseudo-hermitian data. Proposition <ref> can also derived by computing the determinant ( .g_θ,ξ|_Z) = -4/3Λ. When (θ))n is null, it is tangent to Z and the metric g_θ,ξ is degenerate. With this result at hand, we are now in the position of proving the following: Suppose (M,c_ξ,k) admits an almost pure radiation scale σ with zero set Z. Then c_ξ is conformally flat on Z. Let us take another covariant of the defining equation (<ref>) for σ with (<ref>) and (<ref>). Then commuting the covariant derivatives, we derive the integrability condition _a b c dν^d + _c a bσ = T_a b cσ - Φκ_cκ_[aν_b] , for some tracefree tensor T_a b c regular on M, and where ν_a = ∇_aσ. We already know by Lemma <ref> that Φ = 0 on Z. Hence _a b c dν^d = 0 , There are two cases to consider: * If Λ≠ 0, then by Proposition <ref>, Z is spacelike or timelike, and so ν_a is non-null. It is easy to verify that in dimension four, at any point, given such a non-null vector, the Weyl tensor generically takes the form _a b c d = (ν_[a_b] c d + ν_[c_d] a b)_∘ for some tracefree _a b c=_a [b c] satisfying _[a b c] = 0. Condition (<ref>) now implies that =0 on Z. * If Λ = 0, then by Proposition <ref>, Z is null, and so is ν_a. Hence (<ref>) implies that ν_a is a quadruple PND of on Z. This would mean that k degenerates to a quadruple PND of and so would be proportional to ν^a on Z. But this is impossible since ν^a is tangent to the null hypersurface Z and k^a is transverse to it. Hence, =0 on Z. This ends the proof. Combining Proposition <ref> and Proposition <ref>, and on inspection of Table <ref>, we have Let (M,c_ξ, k ) ⟶ (M,H,J) be a perturbed Fefferman space as in Proposition <ref>, and suppose it admits an almost pure radiation scale σ with zero set Z. Then σ^3 σ^-1Ψ_2^(-4) - σ^2 Ψ_2^(-2) = 0 , - σ^4σ^-2Ψ_3^(-6) + σ^3σ^-1Ψ_3^(-4) - σ^2Ψ_3^(-2) + σσΨ_3^(0) - σ^2Ψ_3^(2) = 0 , σ^5σ^-3Ψ_4^(-8) - σ^4σ^-2Ψ_4^(-6) + σ^3σ^-1Ψ_4^(-4) - σ^2Ψ_4^(-2) + σσΨ_4^(0) - σ^2Ψ_4^(2) + σσ^3Ψ_4^(4) = 0 . Following Penrose <cit.>, we shall call the set of equations (<ref>) the strong asymptotic Einstein condition, regardless of whether our manifold admits an almost Einstein scale or not. Drawing from <cit.>, we may think of (M,c_ξ,k) admitting a half-Einstein scale σ with zero set Z as the conformal compactification of some algebraically special optical geometry (M', g,k) with twisting non-shearing congruence of null geodesics, where M' = M∖Z and g=σ^-2g is a half-Einstein metric. We can then think of M' as the bulk of some manifold M with boundary Z, at least locally. Note however that these results are very much local, and assumptions on (M',g,k) such as being asymptotically simple <cit.> may be too strong. Indeed, it is demonstrated in <cit.> that this condition is too stringent in our context: the only algebraically special asymptotically simple Ricci-flat Lorentzian four-manifold is Minkowski space. Nevertheless, one may assume that the geodesics of the congruence generated by k reach only some portions of conformal infinity. One could then use the above results to describes the asymptotic properties of such spacetimes, but only along the congruence. Thus, from Proposition <ref>, we may say that the M' is asymptotically conformally flat along the geodesics of k, and by Proposition <ref>, more specifically asymptotically flat, de Sitter or anti Sitter along the geodesics of k depending on the sign of the Ricci scalar. For instance, the Taub–NUT metric <cit.> is well-known to be globally non-asymptotically flat since the topology of its conformal infinity is S^3, but it is asymptotically flat along the geodesics of its twisting non-shearing congruences of null geodesics. § COMMENTS ON CONFORMAL SYMMETRIES Given a four-dimensional perturbed Fefferman space (M,c_ξ,k) ⟶ (M,H,J), one may naturally ask how conformal symmetries of (M,c_ξ,k) relate to solutions to CR invariant differential equations on its base (M,H,J). While this question goes beyond the scope of this article, we shall nevertheless outline some ideas towards the answer. Let us first review the situation in the unperturbed case, i.e. ξ = 0. It is shown in <cit.> that the space of all conformal Killing fields on a Fefferman space (M,c,k) splits into a direct sum of three spaces A_8 ⊕A_6 ⊕⟨k⟩ , where * any section of A_8 is transverse to ⟨k⟩^⊥ and arises from a real solution s ∈Γ(E(1,1)) of ∇_α∇_β s + ı_αβ s = 0 , and such a solution gives rise to transverse infinitesimal CR symmetries as we have already seen in Section <ref>; * any section of A_6 is tangent to ⟨k⟩^⊥ and arises from a solution w^α∈Γ(E^α(-1,1)) to ∇^(α w^β) = 0 , ∇_α w^β = δ_α^β∇_γ w^γ . In dimension three, however, the second condition is vacuous, while the first one reduces to ∇^α w^β = 0. For conformally flat (M,c,k), the dimensions of A_8 and A_6 are eight and six respectively, the former being the maximal dimension of the automorphism group of (M,H,J) as expected. Together with ⟨k⟩, these indeed add up to 15, the maximal dimension of the automorphism group of (M,c,k). There are two ways in which a perturbation of (M,c,k) by a semi-basic one-form ξ affects the decomposition (<ref>): first, k itself will cease to be conformal Killing (unless kξ = 0). Second, the perturbation one-form will affect the conformal curvature, and in particular, the dimension of each summand in (<ref>) will not be preserved. Suppose that we start with a conformally flat (M,c,k). Then we end up with non-conformally flat perturbed Fefferman spaces over a flat CR manifold. To illustrate this phenomenon, and following <cit.> a flat CR three-manifold (i.e. either the Heisenberg group or three-sphere) gives rise to four distinct perturbed Fefferman spaces, each admitting an almost Einstein scale σ with zero set Z: * the canonical conformally flat Fefferman conformal structure that contains the Minkowski metric off Z; * a perturbed Fefferman conformal structure that contains the Petrov type D Taub-NUT metric Taub1951,Newman1963 off Z; * a perturbed Fefferman conformal structure that contains the Petrov type N Hauser metric <cit.> off Z. Incidentally, since in dimension four, the `unperturbed' Fefferman conformal structure admits an almost Einstein scale if and only if it is conformally flat (or equivalently its underlying CR structure is flat), the main point of these perturbations is to enlarge the range of possible almost Einstein scales. In fact, a conformally flat space (M,c) can be viewed as a (perturbed) Fefferman space in an `infinitely' many ways: The space of all null geodesics in M is a contact CR five-fold PN of signature (1,1), and any contact CR submanifold of PN of dimension three gives rise to a twisting non-shearing congruences of null geodesics on M. In the analytic category, the so-called Kerr theorem tells us that such CR three-manifolds can be constructed as the intersection of PN⊂^3 with a complex surface in ^3, the twistor space of (M,c) <cit.>. For instance, the `massless' Kerr metric is flat, but its underlying CR three-manifold admits a two-dimensional group of symmetry. In <cit.>, the authors consider algebraically special pure radiation metrics, which can therefore be treated as almost pure radiation scales on a perturbed Fefferman space, with underlying contact CR three-manifold admitting an automorphism group of submaximal dimension (in this case, three). § ADAPTED CR COFRAMES OF THE SECOND KIND Let (M,H,J) be a contact CR three-manifold. Then any choice of non-vanishing section f_α of H^(1,0) determines a unique real non-vanishing vector field f_0 defined by the relation [f_α, f_β̅] = - ıδ_αβ̅f_0 . The triple ( f_0, f_α, f_α̅) will be referred to as a adapted frame of the second kind. Its dual coframe, which we shall denote ( ω, ω^α, ω^α̅), will be refer to as adapted coframe of the second kind. The commutation relation (<ref>) is then equivalent to the structure equations ω̣ = ıδ_αβ̅ω^α∧ω^β̅ + ω∧( Γ_αω^α + Γ_α̅ω^α̅) , ω̣^α = Ξ_β^αω∧ω^β + Ξ_β̅^αω∧ω^β̅ , ω^α̅ = Ξ_β̅^α̅ω∧ω^β̅ + Ξ_β^α̅ω∧ω^β , for some complex-valued functions Γ_α, Ξ_β^α, Ξ_β̅^α, where Γ_α̅ = Γ_α, Ξ_β̅^α̅ = Ξ_β^α and Ξ_β^α̅ = Ξ_β̅^α. Note that by definition, (f_α) and (ω^α) are necessarily unitary with respect to the Levi form of ω. As before, we raise and lower the indices freely using δ_αβ̅ and its inverse, i.e. v^α = δ^αβ̅ v_β̅, and so on. Now define θ = ω , θ^α = ω^α - ıΓ^αθ , θ^α̅ = ω^α̅ + ıΓ^α̅θ , or equivalently, ℓ = f_0 + ıΓ^αf_α - ıΓ^α̅f_α̅ , e_α = f_α , e_α̅ = f_α̅ . Then (θ, θ^α, θ^α̅) is a unitary coframe of the first kind with dual (ℓ, e_α, e_α̅), and by inspection of the structure equations (<ref>) with h_αβ̅ = δ_αβ̅, we obtain the relation Γ_α = Γ_αβ̅^β̅ , Γ_α̅ = Γ_α̅β^β , Ξ_β^α = - Γ_0 γ^γδ_β^α - ı e_β (Γ^α_γ^γ) , Ξ_β̅^α̅ = - Γ_0 γ̅^γ̅δ_β̅^α̅ + ı e_β̅ (Γ^α̅_γ̅^γ̅) , Ξ_β̅^α = ^α_β̅ - ı e_β̅(Γ^α_γ^γ) , Ξ_β^α̅ = ^α̅_β + ı e_β (Γ^α̅_γ^γ) . The above transformation from a coframe of the second kind to a unitary coframe of the first kind is clearly invertible. In addition, any such coframe determines the non-vanishing section of the canonical bundle given by θ^0 ∧θ^1 = ω∧ω^1. Conversely, any non-vanishing local section ζ of the canonical bundle determines a unique contact form θ by the volume normalisation condition (<ref>). The remaining freedom (θ^α) is to choose the admissible coframe such that ζ = θ^0 ∧θ^1. In summary: Locally, there is a one-to-one correspondence between * unitary adapted coframes of the first kind, * adapted coframes of the second kind, * non-vanishing sections of the canonical bundle. § PROPERTIES OF THE BACH TENSOR Let (M,c,k) be an optical geometry of dimension four equipped with a twisting non-shearing congruence of null geodesics. We refer the reader to Section <ref> for the general setup induced from such a geometry, that is, we work with a metric g in n.ec. This means that κ = g(k,·) is the pull-back of a contact form on the leaf space (M, H, J) and ∇_aκ_b = τ_a b + 2 E_(aκ_b) , for some two-form τ_a b and one-form E_a such that k^aτ_a b= k^aE_a = 0. In particular, k^b∇_bκ_a = 0 , ∇^aκ_a = 0 , as expected since the geodesics of k are affinely parametrised and the congruence is non-expanding. We assume from the outset that the Weyl tensor satisfies (k,v,k,·) = 0 , which is equivalently to (k,v,u,w) = 0 , This can be re-expressed as k^d_d a b c = κ_aϕ_[b c] - κ_[bϕ_c] a for some ϕ_a b satisfying k^aϕ_a [bκ_c] = 0, and this tells us that k^d_d a b ck^e_e^a b c = 0 . In addition, since ∇_[aτ_b c] = 0, equation (<ref>) gives ∇_aτ_b c = _b c^d_aκ_d + 2 τ_b cE_a + 2 ∇_[bE_c]κ_a . We are now in the position to compute, using the definition of the Bach tensor (<ref>), k^a k^b _a b = - k^a k^b ∇^c_a b c + k^a k^b Ρ^c d_a c b d , under our given assumptions. We break down the computation of the first term of (<ref>) into a number of steps. We first note that k^a k^b ∇^c_a b c = ∇^c( k^a k^b _a b c) - ( ∇^ck^a ) k^b _a b c - ( ∇^ck^b ) k^a _a b c , Using (<ref>), the product rule, multiple instances of (<ref>) and the fact that ⟨k⟩ is a repeated PND of the Weyl tensor, we find k^a k^b _a b c = ∇^d (k^a k^b _d a b c) - 3/2τ^d bk^a _d b a c . By (<ref>), we get k^a k^b _a b [cκ_d] = 0. This fact, together with (<ref>) and (<ref>), tells us that ( ∇^ck^b ) k^a _a b c = - τ^b ck^a _a b c , and using the fact that _[a b c] = 0, ( ∇^ck^a ) k^b _a b c = - 1/2τ^b ck^a _a b c . Hence, equation (<ref>) simplifies to k^a k^b ∇^c_a b c = ∇^c( k^a k^b _a b c) + 3/2τ^b ck^a _a b c . For the last term, we obtain τ^b ck^a _a b c = ∇^d (τ^b ck^a _d a b c) + 2 Ρ^b dk^ck^a _d a b c - τ^d aτ^b c_d a b c , where we have used (<ref>), the product rule, equations (<ref>), (<ref>), (<ref>), and (<ref>). Plugging this expression and (<ref>) into (<ref>) yields k^a k^b ∇^c_a b c = ∇^c∇^d (k^a k^b _d a b c) + 3 ∇^d (τ^b ck^a _d a b c) + 3 Ρ^b dk^ck^a _d a b c - 3/2τ^d aτ^b c_d a b c , and therefore, equation (<ref>) becomes k^a k^b _a b = - ∇^c∇^d (k^a k^b _d a b c) - 3 ∇^d ( τ^b ck^a _ d a b c ) + 3/2τ^d aτ^b c_d a b c - 2 k^a k^b Ρ^c d_a c b d . Using the symmetries of the Weyl tensor, and (<ref>) for the definition of Ψ_2, we find k^a k^b _d a b c = - κ_d κ_c (Ψ_2 + Ψ_2) , τ^b ck^a _d a b c = -2 ıκ_d (Ψ_2 - Ψ_2) , τ^d aτ^b c_d a b c = - 4 (Ψ_2 + Ψ_2) . Finally, substituting these into (<ref>) and using the product rule together with (<ref>) and (<ref>), we finally conclude k^a k^b _a b = (Ψ̈_2 + Ψ̈_2) + 6 ı (Ψ̇_2 - Ψ̇_2) - 8 (Ψ_2 + Ψ_2) , where we have made use of the fact that Ρ^a bκ_a κ_b = 1. § RICCI CURVATURE In this section, we present some consequences of prescriptions on the Ricci curvature tensor of some metric in the conformal class presented in Section <ref>. Let (M,c,k) → (M,H,J) be a four-dimensional optical geometry with twisting non-shearing congruence of null geodesics. Assume further that * (M,c,k) admits an almost pseudo-Riemann scale σ∈Γ(E[1]) that satisfies k^ak^b( ∇_a∇_bσ + Ρ_a bσ) = 0 , so that by Proposition <ref>, the zero set Z is the union of sections of ϖ : U→U := ϖ (U) ⊂M parametrised by the integers , and off Z, the metric g = σ^-2g takes the form g = ^2 ϕ·g_θ , where g_θ is a metric in n.e.c given by g_θ = 4 θ⊙λ + h , for some contact form θ for (H,J) with Levi form h, ϕ is an affine parameter along the geodesics of K, and λ a semi-basic one-form dual to k. The Ricci tensor of g satisfies (k,k) = 0 . * k is a repeated PND of the Weyl tensor of c, so that by Lemma <ref>, λ is given by λ = ϕ̣+ ( λ_α^(0) + λ_α^(-2)^-2ıϕ) θ^α + ( λ_α̅^(0) + λ_α̅^(2)^2ıϕ) θ^α̅ + λ_0θ , for some complex-valued functions λ_α^(0), λ_α^(-2) on M, and real function λ_0 on M. Then * (k,v) = 0 for any v∈Γ(⟨k⟩^⊥) if and only if 2 λ_α ^(-2) = λ_α^(0) =: λ_α . * (w,w) = 0 for any w∈Γ(N) if and only if (<ref>) holds ∇_αλ_β - ıλ_αλ_β - _αβ = 0 * (w,w) = 0 for any w∈Γ(N) and = 4 Λ for some real constant Λ if and only if (<ref>) and (<ref>) hold, and λ_0 = λ_0^(-4)^-4 ıϕ + λ_0^(-2)^-2 ıϕ + λ_0^(0) + λ_0^(2)^2 ıϕ + λ_0^(4)^4 ıϕ , where λ_0^(0) = ı( ∇_αλ^α - ∇^αλ_α) + 3/4λ_αλ^α + Ρ + 6 ( μ) , λ_0^(2) = 2 λ_0^(4) + 1/4ı∇_αλ^α + 1/2λ_αλ^α + 2 ( μ) , λ_0^(4) = 1/8( 4 Ρ + 3 ı( ∇_αλ^α - ∇^αλ_α) - 3 λ_αλ^α - 4/3Λ) + μ , for some arbitrary complex-valued function μ; * (v,w) = Λg(v,w) for any v∈Γ(⟨k⟩^⊥), w∈Γ(N) if and only if (<ref>) and (<ref>) hold, and λ_0 takes the form (<ref>) with λ_0^(0) = ı( ∇_αλ^α - ∇^αλ_α) + 3/4λ_αλ^α + Ρ , λ_0^(2) = 2 λ_0^(4) + 1/4ı∇_αλ^α + 1/2λ_αλ^α , λ_0^(4) = 1/8( 4 Ρ + 3 ı( ∇_αλ^α - ı∇^αλ_α) - 3 λ_αλ^α - 4/3Λ) + μ , for some arbitrary complex-valued function μ such that (μ) = 0. * (v,·) = Λg(v,·) for any v∈Γ(⟨k⟩^⊥) if and only if ∇_αλ_0^(4) - 3 ıλ_αλ_0^(4) = 0 . This is a long computation of the Ricci curvature of g based on Appendix A of <cit.>. We omit the details. Steps (<ref>) and (<ref>) are straightforward. For step (<ref>), using our assumptions, the condition =4Λ is equivalent to λ_0 being a solution to cos^2 ϕλ̈_0 + 6 cosϕsinϕλ̇_0 + ( 12 - 8 cos^2 ϕ) λ_0 + A_2 cos^2 ϕ + A_1 cosϕsinϕ + A_0 = 0 , where A_0 = - 4 Λ - 6 λ_αλ^α , A_1 = 3 ( ∇_αλ^α + ∇^αλ_α) , A_2 = 8 Ρ + 5 ı( ∇_αλ^α - ∇^αλ_α) - 6 λ_αλ^α . The explicit solution is given by (<ref>) with coefficients (<ref>). We note that the function μ can also be written as μ := 1/16( 2 ı∇^αλ_α - 4 λ_αλ^α + c - ı b ) , for some arbitrary functions b and c on M. For step (<ref>), our next condition ^0_0 = Λ is equivalent to λ_0 being a solution to cos^2 ϕλ̈_0 + 3 cosϕsinϕλ̇_0 + ( 3 + 4 cos^2 ϕ) λ_0 + B_4 cos^4 ϕ + A_1 cos^3 ϕsinϕ - 1/2 A_2 cos^2 ϕ + 1/4 A_0 = 0 . where A_1, A_2 and A_3 are given by (<ref>), and B_4 = ( 3 ı( ∇^αλ_α - ∇_αλ^α) - 12 λ_αλ^α) . Plugging the solution (<ref>) with coefficients (<ref>) into (<ref>) tells us that the constant c given in (<ref>) is fully determined by c = ı( ∇_αλ^α - ∇^αλ_α) + 4 λ_αλ^α . Thus μ satisfies (μ) = 0, and the coefficients (<ref>) reduce to (<ref>). Finally, step (<ref>) is again, a brute force computation, involving our previous assumptions and manipulations, which eventually leads to (<ref>). For the metric g to satisfy the full Einstein equations, ()_∘ = 0, we need only one more real constraint on the CR data as will be made clear from the next lemma. Let (M,c_ξ,k) → (M,H,J) be a four-dimensional perturbed Fefferman space that admits an almost pure radiation scale σ, i.e. σ satisfies (<ref>) and (<ref>) for some Φ_a b of the form (<ref>). Then Φ_a b is given by Φ = 4 cos^2 ϕ·Φ·θ⊗θ , for some density Φ of weight (-2,-2) on (M,H,J). In particular, Φ_a b=0 on the zero set of σ. We trivialise (<ref>) where the pure radiation field is given by (<ref>) with the Lorentzian scale σ_θ, and since Υ = tanϕ ϕ̣, we find that Φ̇ + 2 sinϕ·cosϕ·Φ = 0 , which clearly has solution Φ = cos^2 ϕ·Φ, for some real function Φ on (M,H,J). By CR invariance, we must deduce that Φ arises from a density Φ of weight (-2,-2). We have omitted the rather involved expression for the CR density Φ of weight (-2,-2) which determines the pure radiation field of the metric. After some work we conclude that _0 0 = _0 0^(2)^2 ıϕ + _0 0^(-2)^-2 ıϕ , for some _0 0^(2) and _0 0^(-2), for which we obtain complex expressions. Clearly, _0 0^(-2) = _0 0^(2). But since Lemma <ref> tells us that _0 0 = cos^2 ϕ·Φ for some real density of weight (-2,-2), we must conclude that _0 0^(2) = _0 0^(-2) too. § RELATION TO THE DEBNEY–KERR–SCHILD METRIC In this section, we provide the appropriate coframe and coordinate transformations to relate a perturbed Fefferman space (M,c_ξ,k) → (M,H,J) that admits an almost half-Einstein scale, to the `standard' metric of Debney1969,Stephani2003. Note that the relation between the latter and the form of the metric obtained in <cit.> is already given in <cit.>. In that reference, it is rightly pointed out that the equations on the CR base space are simplest when given in the Debney–Kerr–Schild coordinates. But these lack obvious invariance. There is therefore a trade-off when expression the Einstein equations in an invariant manner. The reader should refer to Theorem <ref> for the notation used in the next paragraphs. Since ıσ^-1ξ∇_ασ is a solution to (<ref>), there exists, by Theorem <ref>, a density σ of weight (1,0) such that ıσ^-1ξ∇_ασ = ı( σ^-1σ^2) ∇_α( σσ^-2) , Using the definition of ξ∇_α and (<ref>), this allows us to express ξ_α^(0) and ξ_α^(-2) as ξ_α^(0) = ı( σ^-1σ^2σ) ∇_α( σσ^-2σ^-1) , ξ_α^(-2) = ı/2( σ^-1σ^2σσ) ∇_α( σσ^-2σ^-1σ^-1) . Note that σσ^-2σ^-1∈E(0,-2) and σσ^-2σ^-1σ^-1∈E(0,-3). Substituting these into (<ref>), we can derive similar expressions for ξ_0^(0), ξ_0^(2) and ξ_0^(4). Let us write σ = w σ , w = ϱ^ıϕ , for some smooth real functions ϱ > 0 and ϕ∈ [-π,π). This induces a change of contact forms θ = ϱ^-2θ, and with reference to Appendix <ref>, there are unitary adapted coframes (θ,θ^1,θ^1̅) and (ω,ω^1,ω^1̅) of the first and second kinds respectively, related by θ = ω , θ^1 = ω^1 - ıΓ^1ω , where Γ_1̅ is the connection one-form of the (partial) Webster connection preserving θ. In addition, as guaranteed by Theorem <ref>, ω^1 = ζ̣ , for some CR function ζ. We can re-express ξ_α^(0) = 2 ıΓ_α + ı w^-1∇_α w , and similar formulae can be derived for the remaining CR data. We now trivialise the Fefferman bundle with σ. This induces a change of perturbed Fefferman metrics g_θ,ξ = ϱ^-2g_θ,ξ, a change of fibre coordinates ϕ = ϕ + ϕ, and a change of λ=ω_θ + ξ as λ = λ - 1/2ıΥ_1θ^1 + 1/2ıΥ_1̅θ^1̅ - 1/2Υ_1Υ^1θ , where Γ_1 = ∇_1logϱ. Defining λ_ω = λ + 1/2ıΓ_1 ω^1 - 1/2ıΓ_1̅ω^1̅ + 1/2Γ_1 Γ^1 ω , we can the write out our metric in one of the forms given in <cit.> as g = ^2 (ϕ - ϕ) ·ϱ^2 ·( 4 θ⊙λ_ω + 2 ω^1 ⊙ω^1̅) , with some obvious changes in the notation. Our next step is to introduce a radial coordinate by the formula r = ϱtan (ϕ - ϕ) , ϱ + ı r/√(r^2 + ϱ^2) = ^ı (ϕ - ϕ) , so that r^2 + ϱ^2 = ϱ^2 ^2 ( ϕ - ϕ) , ϕ - ϕ = 1/r^2 + ϱ^2( ϱṛ - r ϱ) . It is then a straightforward matter to re-express the metric in terms of the radial coordinate r. We may also check that the asymptotic properties of the `unphysical' metric g_θ, ξ as r tends to ±∞ are consistent with the findings of Section <ref>. To make contact with the Debney–Kerr–Schild form of the metric Debney1969,Stephani2003, we rescale the one-forms λ and ξ as λ'_ω = ϱ·^2 ( ϕ - ϕ) ·λ_ω , ξ' = ϱ^2 ( ϕ - ϕ) ξ . so that λ'_ω = ṛ - r ḷọg̣ϱ + r^2 + ϱ^2/ϱ( ω_θ - 1/3Ρθ) + ξ' , Then the metric g takes the form g = 4 ϱ·ω⊙λ'_ω + 2 (r^2 + ϱ^2) ω^1⊙ω ^1̅ . We may also choose a transverse coordinate u and complex-valued function Z on M so that ω = 1/2 ϱ(ụ + Z ζ̣+ Zζ) . Dropping the hats, we can now recognise metric (<ref>) given in Section <ref>.
http://arxiv.org/abs/2303.07035v1
20230313115416
FireRisk: A Remote Sensing Dataset for Fire Risk Assessment with Benchmarks Using Supervised and Self-supervised Learning
[ "Shuchang Shen", "Sachith Seneviratne", "Xinye Wanyan", "Michael Kirley" ]
cs.CV
[ "cs.CV" ]
conditions[1][where: ] #1(-#1)/2[t] >l<@= X@ sectionSec.Secs.sectionSectionSectionstableTableTablestableTab.Tabs. 31 EarthVision2023 FireRisk: A Remote Sensing Dataset for Fire Risk Assessment with Benchmarks Using Supervised and Self-supervised Learning Shuchang Shen chuchangs@student.unimelb.edu.au Sachith Seneviratne sachith.seneviratne@unimelb.edu.au Xinye Wanyan xwanyan@student.unimelb.edu.au Michael Kirley mkirley@unimelb.edu.au March 30, 2023 ===================================================================================================================================================================================================== In recent decades, wildfires, as widespread and extremely destructive natural disasters, have caused tremendous property losses and fatalities, as well as extensive damage to forest ecosystems. Many fire risk assessment projects have been proposed to prevent wildfires, but GIS-based methods are inherently challenging to scale to different geographic areas due to variations in data collection and local conditions. Inspired by the abundance of publicly available remote sensing projects and the burgeoning development of deep learning in computer vision, our research focuses on assessing fire risk using remote sensing imagery. In this work, we propose a novel remote sensing dataset, FireRisk, consisting of 7 fire risk classes with a total of 91872 labelled images for fire risk assessment. This remote sensing dataset is labelled with the fire risk classes supplied by the Wildfire Hazard Potential (WHP) raster dataset <cit.>, and remote sensing images are collected using the National Agriculture Imagery Program (NAIP) <cit.>, a high-resolution remote sensing imagery program. On FireRisk, we present benchmark performance for supervised and self-supervised representations, with Masked Autoencoders (MAE) <cit.> pre-trained on ImageNet1k achieving the highest classification accuracy, 65.29%. This remote sensing dataset, FireRisk, provides a new direction for fire risk assessment, and we make it publicly available on <https://github.com/CharmonyShen/FireRisk>. § INTRODUCTION Forests have always been a crucial part of ecosystems because of their capacity to filter air, preserve the quality of the soil, and hold onto precipitation <cit.>. In the same breath, woodlands serve as sources of raw materials for human industry, possible areas for human employment, and homes for a broad diversity of animal species. Therefore, if a wildfire extensively burns the forest, it will cause irreparable economic losses as well as harm to the biological ecology. For instance, Australia has been ravaged by bushfires for more than six months, starting in September 2019. Property loss from these fires is estimated to be worth over $100 billion. More serious is the deterioration of soil and air quality, and the loss of numerous animals as a result of this bushfire <cit.>. Many studies have been conducted to address the harmful effects of this natural hazard using a multitude of techniques. Most existing fire risk modelling is founded on geoscientific knowledge. A research conducted by <cit.> found a strong connection between fire risk models based on geospatial data and actual fire incidences. Based on this theoretical investigation, many traditional fire risk models are developed from fire-related parameters utilizing various data analysis techniques. For example, <cit.> generated forest fire risk maps using the multiple-criteria decision analysis approach. Combining geographic information system (GIS) and an analytical hierarchy process (AHP), <cit.> evaluated seven fire risk elements, including climate, topography, and human effect. Due to the proliferation of satellite and aerial remote sensing projects that are available to the public, enormous remote sensing images are now more accessible. Moreover, as a result of the development of optical sensors, the resolution of remote sensing photographs has grown substantially, allowing surface features to be differentiated more clearly. In past few years, remote sensing images have been widely used in many practical tasks<cit.>. Therefore, several research have examined incorporating remote sensing images into fire risk assessments. As in an earlier study by <cit.>, seasonal remote sensing data from MODIS satellite imagery, climate data and fuel type were combined to discuss the seasonal fire potential in different regions using the fire potential index (FPI). Some recent studies utilize machine learning methods for remote sensing imagery and related geographic variables. Using geographical information given by Landsat 8 satellite images such as land surface temperature (LST), normalized differential moisture index (NDMI), and land use and land cover (LULC), <cit.> predicted the vulnerability to forest fires with three basic machine learning models. In addition, <cit.> suggested a topography-, weather-, and fuel-based fire assessment approach in which the fuel variables were derived from the MODIS remote sensing project and random forests were used to investigate the association between variables and wildfire in order to build a dataset of wildfire potential. However, these solutions still rely to some extent on other geoscientific features, which need specialised knowledge. Although the use of geospatial data can improve the accuracy of assessing fire risk as much as possible, these models lack adequate generality due to inconsistencies in fire risk features between models. Thus, we question whether a simpler method exists for linking solely remote sensing images to fire risk while still achieving satisfactory results. Because of these motivations, it is assumed that remote sensing images contain geographic information that can reflect the degree of fire risk, e.g., the species of trees in the forest and the proximity to human activity areas identified from remote sensing images can indirectly mirror the difficulty of fire occurrence. The objective of this work is to develop a simple scheme to describe a mapping between remote sensing imagery and fire risk on the Earth's surface. Using data provided by Wildfire Hazard Potential (WHP) <cit.> and National Agriculture Imagery Program (NAIP) <cit.>, we construct a remote sensing dataset, FireRisk, for fire risk assessment. This remote sensing dataset for fire risk assessment consists of 91872 labelled images, where each remote sensing image corresponds to a fire risk class, with a total of seven fire risk classes. Figure <ref> depicts an example image for each of these classes, from which it is intuitively evident that forest cover and fire danger are correlated. In addition, we collect the unlabelled dataset from NAIP used to pre-train for the following self-supervised benchmark models. The labelled fire risk dataset, FireRisk, and the unlabelled dataset for pre-training, UnlabelledNAIP, are publicly available on <https://github.com/CharmonyShen/FireRisk>. Further, we provide benchmark evaluations of supervised and self-supervised learning on FireRisk. Using transfer learning, we fine-tune ResNet-50 <cit.>, ViT-B/16 <cit.>, as well as DINO <cit.> and MAE <cit.> with ViT-B/16 as the backbone, all of which were pre-trained on ImageNet <cit.>, using our FireRisk to evaluate the classification accuracy and F1-score of different benchmarks. For the self-supervised learning models, DINO <cit.> and MAE <cit.>, we additionally measure the end-to-end performance of benchmark models pre-trained on our UnlabelledNAIP. Our main contributions in this work are: * We propose FireRisk, a remote sensing dataset for fire risk assessment, and offer a novel method for constructing a mapping between 7 fire risk classes and remote sensing images. * To investigate the performance of supervised and self-supervised learning on our FireRisk, we employ ResNet <cit.>, ViT <cit.>, DINO <cit.>, and MAE <cit.> as benchmark models. With the use of transfer learning, we obtain the results of these models pre-trained on ImageNet <cit.> and then fine-tuned on our FireRisk. * Using the performance of our benchmarks on 20% and 50% of the training data from the original FireRisk, we illustrate the efficiency of data labelling in FireRisk as well as the sensitivity of various benchmark models to the amount of labelled data. * We gather an unlabelled dataset, UnlabelledNAIP, from the NAIP remote sensing project and utilize it to pre-train novel latent representations of DINO <cit.> and MAE <cit.>. The results of fine-tuning on FireRisk using these two representations demonstrate the potential of different self-supervised benchmarks for enhancement in fire risk assessment. § RELATED WORK Our work focuses on proposing a remote sensing image classification dataset for fire risk assessment. In this context, we first review the related remote sensing datasets. In addition, 4 advanced supervised and self-supervised learning benchmarks are implemented to evaluate our FireRisk, hence some similar computer vision approaches are also presented in this section. §.§ Remote Sensing Classification Datasets Using satellites or aeroplanes, remote sensing is the technique of detecting and monitoring the physical features of a region by measuring its optical radiation from a distance. These remote sensing images, collected using special cameras, can help researchers 'sense' what is occurring on the earth <cit.>. Since remote sensing images contain some implicit geographical features, they are frequently utilized to address practical classification tasks, such as land-use classification <cit.>, climatic zone classification <cit.>, and tree species classification <cit.>. Thus, several labelled remote sensing datasets, including BigEarthNet <cit.>, EuroSAT <cit.>, AID <cit.>, So2Sat <cit.>, and UC Merced Land Use <cit.>, have emerged to train deep learning models in computer vision to solve various classification tasks of remote sensing images. The majority of the existing remote sensing image datasets for wildfires focus on identifying fires that have occurred from remote sensing images, for example, <cit.> created a remote sensing dataset for fires based on Landsat-8 images and used the Convolutional Neural Network (CNN) based U-Net to detect active fires on the surface. Regarding fire risk assessment tasks, most of the explored approaches <cit.> emphasise the combination of remote sensing images and geographic information; there are no publicly available datasets for fire risk classification using only remote sensing images. §.§ Computer Vision Models Based on whether labelled training data is required, deep learning models in computer vision can be broadly classified into, supervised and unsupervised models, where self-supervised learning is also a sort of unsupervised learning. Supervised Learning. The key to supervised learning is the extraction of features from image information, which can be divided into two main schools of thought as follows: a) CNNs Architecture. Convolutional structures have been introduced into computer vision for image classification since they use dimensionality reduction to lower the number of parameters while preserving the relative locations of pixels. <cit.> first introduced, AlexNet, a deep CNN architecture, which is more effective compared to traditional manual extraction features on ImageNet. Theoretically, boosting the CNN’s depth can improve its performance. This is because deep networks incorporate features and classifiers of multiple dimensions in a multi-layered end-to-end manner, and the deeper the network structure, the richer the level of features. Nevertheless, increasing the network's depth may lead to problems such as vanishing gradients, exploding gradients and network degradation. To address these problems, ResNet was proposed by <cit.> to enable the training of deeper networks by introducing residual blocks. b) Transformers Architecture. In recent years, as self-attention-based mechanisms have become more prevalent in natural language processing <cit.>, numerous Transformer-based systems have created waves in computer vision because to the efficiency and scalability of Transformers. Some studies, such as Detection Transformer (DETR) <cit.>, attempt to merge CNN with Transformer, while others have completely replaced the CNN framework with Transformer, such as Vision Transformer (ViT) citedosovitskiy2020image, which utilize the encoder structure comprised of multi-headed self-attention blocks in the Transformer to extract features and then employ MLP for image classification. Self-supervised Learning. As the complexity of deep learning models increases, data hunger has been a hurdle for supervised models to overcome, while self-supervised learning methods can automatically learn latent representations from unlabelled data. In computer vision, it can be categorized into predictive, generative and contrastive methods, and the latter two of which are explained in detail below: a) Generative Methods. Generative methods learn latent representations for self-supervised learning by reconstructing or generating input data <cit.>. <cit.> initially presented the notion of autoencoder, which employs an encoder to map the input to a latent vector and then a decoder to reconstruct the input from the vector. To improve the robustness to noise in the data, <cit.> suggested a denoising autoencoder. Inspired by the outstanding performance of ViT <cit.> for feature extraction, MAE <cit.> reconstructed randomly masked patches using the structure of denoising autoencoder. b) Contrastive Methods. Contrastive methods train the model by comparing inputs that are semantically equivalent, such as two augmented views of the same image. Yet, over emphasis on the similarity between input pairs may result in model collapse. The most intuitive approach is to introduce negative samples <cit.>, while other approaches use teacher-student networks to transfer knowledge in both network structures without negative samples. <cit.> proposed BYOL, the first method for self-supervised learning based on knowledge distillation. DINO <cit.> further explored the introduction of ViT backbone into knowledge distillation, they built a teacher network with a dynamic encoder and avoided model collapse by centering the output of the teacher network. Although many advanced supervised and self-supervised deep learning models have advanced performance, they are difficult to train on a relatively small amount of training data due to their large parameter size. A common solution is to use transfer learning, which pre-trains a model on a generic or well-studied dataset and then transferring its acquired knowledge to a new downstream task. In the field of remote sensing images, transfer learning has strong applicability for both supervised and self-supervised models, with its ability to fine-tune the models, pre-trained on generic well-studied datasets, on specific remote sensing datasets. § DATASETS Our work focuses on constructing a remote sensing dataset, FireRisk, for fire risk assessment based on the fire risk levels provided by the WHP project <cit.>. In addition, we also supply an unlabelled dataset, UnlabelledNAIP, that contains remote sensing images for pre-training self-supervised benchmarks. §.§ Construction of Our FireRisk Extracting Labels From the WHP. The construction of our FireRisk is inspired by the WHP <cit.>, a raster dataset developed by the U.S. Department of Agriculture that provides a relatively authoritative geographic assessment of fire risk and the intensity of wildfires in the United States. Their model was developed using a series of geostatistical data, including spatial estimates of wildfire susceptibility and intensity generated by FSim <cit.>, spatial fuels and vegetation data from LAND-FIRE <cit.>, and fire occurrence point locations from the FPA <cit.>. Based on their investigation, we utilize their classified 2020 version of the WHP raster dataset <cit.>, containing 7 fire risk levels, from which we extract fire risk labels for the area represented by each raster. We download the data from the Missoula Fire Sciences Laboratory's official website [<https://www.firelab.org/project/wildfire-hazard-potential>] in .gdb format, a geodatabase format that divides the United States, including Hawaii, Alaska, and the continental United States, into grids with 270-meter sides and provides information on the fire risk level of the area represented by each grid. Since the coordinate information of the raster dataset exists implicitly, we use the geoprocessing tools in ArcGIS, a geospatial information processing program, to transform the raster dataset into point features that are exported as tabular data containing only the coordinates of each geographic grid and its corresponding labels. Because the WHP <cit.> contains a large number of point features and geographically adjacent areas may have similar fire risk features, only a subset of the WHP with 110 data intervals of equally spaced sampling for all data points is employed in this study. Construction Our Dataset Using the NAIP. After obtaining the fire risk labels for each grid, sufficient remote sensing imagery is required in order to construct our FireRisk remote sensing dataset. With the large number of satellite image projects publicly available on the Google Earth Engine platform[<https://developers.google.com/earth-engine/datasets/catalog/USDA_NAIP_DOQQ>] <cit.>, we can easily access remote sensing projects from different time periods. However, since each grid in the WHP raster dataset covers only a 270-meter-square area, the lower resolution remote sensing images in commonly used satellite remote sensing projects, such as Landsat <cit.>, MODIS <cit.>, and Sentinel <cit.>, do not provide sufficient geographic information within each grid area. By the utilization of an aerial platform to capture orthorectified remote sensing images of the Earth's surface, the NAIP project, presented by <cit.>, with its use of an aerial platform to acquire orthorectified remote sensing images of the Earth's surface can achieve high spatial resolution, compared with these projects. Although the images are collected independently by each state and their spatial attributes may vary, all images in the current NAIP project are available at a minimum resolution of 1 meter. To optimize image quality and restrict shadow length, the sun must be 30 degrees above the horizon during image capture, and the cloud cover cannot exceed 10% per quarter of the remote sensing image patches. In addition, because primary purpose of NAIP <cit.> is agricultural mapping, the images are collected during the plant growing season, with no snow or flood coverage allowed. Since there is a high overlap in coverage and resolution with the point features in the WHP dataset <cit.>, our work utilizes NAIP <cit.> to collect remote sensing images. First, the coordinates of the four vertices of the grid with a fire risk label are derived from the center coordinates of each grid in the WHP dataset <cit.> using a simple geographic coordinate transformation in <ref>. Grid_NW=(C_Lng-135×γ_1,C_Lat+135×γ_2) Grid_NE=(C_Lng+135×γ_1,C_Lat+135×γ_2) Grid_SW=(C_Lng-135×γ_1,C_Lat-135×γ_2) Grid_SE=(C_Lng+135×γ_1,C_Lat-135×γ_2) Grid the geographic coordinates of the four vertices of the square grid, whose corner markers represent the position of the vertices C_Lng longitude of the geographic coordinates of the grid centroids C_Lat latitude of the geographic coordinates of the grid centroids γ_1 the conversion factor for meters and longitude γ_2 the conversion factor for meters and latitude Subsequently, we access the remote sensing images in the NAIP <cit.> dataset based on the grid coordinates using Google Earth Engine <cit.>. In the spectral configuration, only the R, G and B channels of each remote sensing image are extracted, with each channel represented by an 8-bit unsigned integer. In the temporal configuration, since we use the 2020 version of WHP data <cit.> and the NAIP project <cit.> inherently has a relatively long revisit period, we adjust the time span from January 1, 2019 to December 1, 2020 in order to obtain valid remote sensing images. In theory, the remote sensing images obtained from the NAIP project <cit.> should be square. However, in practice, the majority of remote sensing images are near-square rectangles due to slight angles between the aircraft sensors and the ground, and inconsistent longitude and latitude resolutions in some states. So finally, we crop the center of each remote sensing image to a square image of 320×320 pixels. Our work, as seen in Figure <ref>, follows this workflow to construct a remote sensing dataset for a fire risk assessment. Thus, the fire risk label of a grid derived from the WHP raster dataset <cit.> can be linked by geographic coordinates to the remote sensing image in the NAIP remote sensing project <cit.>, resulting in a mapping connection between the remote sensing image and its corresponding fire risk label. As illustrated in Figure <ref>, our FireRisk contains 7 classes according to the fire risk levels. In the next experiments, our FireRisk is divided into a training set and a validation set in the ratio of approximately 10:3. §.§ Our UnlabelledNAIP for Pre-training In addition, in order to improve the applicability of our self-supervised learning benchmark to our FireRisk, we gather 199976 NAIP <cit.> remote sensing images from Google Earth Engine <cit.> for pre-training to generate latent representations. This unlabelled dataset, UnlabelledNAIP, has the same image size and time period filtering as our FireRisk to allow the self-supervised models to learn as many features as possible from the same style of remote sensing imagery. § BENCHMARKS To evaluate the benchmark performance of our FireRisk for the fire risk assessment task, we validate it in two dimensions: supervised and self-supervised learning. Figure <ref> describes the overall workflow for assessing fire risk in our work, where for the supervised learning benchmark we use the methods of ResNet <cit.> and ViT <cit.>, while for the self-supervised learning, we select two representative self-supervised models for their performance, namely DINO <cit.> and MAE <cit.>. §.§ Supervised Learning Our dataset provides a remote sensing image classification task labelled with fire risk levels, which, like other classification tasks in the field of computer vision, can usually be predicted with labelled data using supervised learning. Digital images often consist of a vast number of pixels, and each pixel comprises several channels, making it difficult to generalize the original features when dealing with a multitude of parameters in an image task. One option for extracting image features is to employ a convolutional structure. Considering that ResNet <cit.> is widely ussed in deep learning due to its effectiveness in mitigating network degradation, we choose it as one of our supervised benchmarks. In addition, other studies introduce Transformer structures to overcomes the CNN’s lack of holistic grasp of the input data itself due to inductive bias, making it easier to extract long-distance spatial dependencies between global data, the most famous of which, ViT <cit.>, represents another direction of development in computer vision. Thus, we use it as our second supervised benchmarks. Due to the limited size of our FireRisk training set, it is difficult to support the training of a large number of model parameters. Influenced by the concept of transfer learning, we transfer the parameters trained on large real-world image datasets to our remote sensing dataset. As shown in the supervised learning workflow in Figure <ref>, we fine-tune the ResNet <cit.> and ViT <cit.>, pre-trained on ImageNet <cit.>, on our FireRisk, respectively, to produce a supervised benchmark performance for fire risk assessment. §.§ Self-supervised Learning In contrast, self-supervised learning, as a form of representation learning, can learn visual features from a large number of unlabelled images without the involvement of labelled data. To determine the benchmark performance of the self-supervised learning on our dataset, we investigate the performance of two representative self-supervised models based on the ViT architecture as the backbone, the contrastive learning DINO <cit.> based on knowledge distillation and the generative model MAE <cit.> based on autoencoder, on our FireRisk. For the self-supervised learning process in Figure <ref>, we adopt two processing schemes to produce the self-supervised benchmark performance, which are: Pre-trained on ImageNet <cit.>. using the latent representation obtained by pre-training on ImageNet <cit.>, and then fine-tuning it on the labelled FireRisk, by which the generalized knowledge in the latent representations can be transferred to the remote sensing imagery domain; Pre-trained on Our UnlabelledNAIP. first pre-training on our UnlabelledNAIP, the unlabelled remote sensing dataset we collect, to obtain the latent representation based on remote sensing imagery, and then fine-tuning it on our labelled FireRisk. Compared to the former, the latter processing scheme has an additional step of constructing our unique latent representations, that will reflect features of remote sensing imagery more similar to FireRisk. In generating the latent representations, we use ViT-B/16 as as the backbone architecture for MAE <cit.>, pre-trained for 80 epoches on our UnlabelledNAIP, while we train DINO <cit.> for 100 epochs because of the slow convergence of DINO on our pre-trained dataset. § EXPERIMENTS AND EVALUATION We apply the pre-training weights of different supervised and self-supervised models on our constructed FireRisk and its subsets, and we examine the performance differences between these various benchmark models in two main ways: one is to validate the efficiency of labelling in FireRisk by evaluating their robustness to datasets of varying sizes by comparing their performance on different subsets; the other is to compare the impact of the latent representations generated on different pre-trained datasets on the self-supervised models for fire risk assessment. Table <ref> shows the results of this series of experiments. Evaluation Metrics. As in most multiclass classification tasks, we mainly use accuracy and macro F1-score as evaluation metrics. While macro F1-score is influenced by a smaller number of classes, it is employed as a complement to accuracy so that the contributions of High and Very High, which are smaller in number but more significant in reality, are not ignored. Experimental Configurations. In our implementation, for the supervised models, we use ViT-B/16 <cit.> and ResNet-50 <cit.> pre-trained on ImageNet1k <cit.> respectively to fine-tune the models on FireRisk. For the self-supervised architectures, MAE <cit.> and DINO <cit.>, we use ViT-B/16 <cit.> as the backbone and fine-tune on FireRisk using latent representations pre-trained on ImageNet1k <cit.> and our UnlabelledNAIP, respectively. We use 2 GPUs and batch size per GPU of 16 for training, and take the results of the highest accuracy out of 100 epoches. §.§ Overall Analysis The Table <ref> shows that the performance of the self-supervised benchmark on FireRisk outperforms the supervised benchmark in general, while the performance of MAE <cit.> is significantly higher than the other models. This is because the performance of supervised models is overly dependent on labelled information, while in the image domain, images contain much richer internal information than that labels provide. For fire risk assessment tasks, the self-supervised learning approach is better at extracting implicit features in remote sensing images. Our optimal baseline model is the MAE <cit.> pre-trained on ImageNet <cit.>, whose confusion matrix is shown in Figure <ref>. The confusion matrices of the remaining benchmarks have similar features. Taking the confusion matrix of MAE as an example, we can see that, for the classification accuracy of each class, the highest is Water which can reach 87.50%, while Non-burable and Very Low also have high accuracy, but Low, Moderate and High have lower accuracy. For the label Low, where most of the misclassifications are found on the two fire risk classes Low and Very Low, which can demonstrate that our FireRisk is prone to misleading on these two labels. The same problem of similar feature ambiguity exists for Moderate and High. In practical fire risk assessment tasks, one usually pays more attention to the recall of high fire risk because one needs to screen out the high-risk areas in remote sensing images as accurately as possible in order to prevent wildfires. For example, in Figure <ref>, for all remote sensing images labelled Very High in the validation set, the MAE <cit.> predicts only 713 images correctly, which accounts for 49.58%. However, considering that the images labelled High and Very High usually have some similar features, people also focus on the area with the fire risk level of High in practice. If the misclassification of Very High as High is included, the 'recall' of Very High can reach 62.24%. Through this analysis, our FireRisk can reflect the actual role of FireRisk to some extent. §.§ Label Efficiency Evaluation In this experiment, in order to investigate label efficiency, we focus on the robustness of these benchmark models on FireRisk obtained with this processing method of ours when the amount of data is reduced. We sample the training set at 50% and 20% from the full FireRisk's training set to obtain two subsets, 50% FireRisk and 20% FireRisk, respectively. For the supervised and self-supervised benchmarks we investigate, we apply the same model configurations to fine-tune on this series of datasets and then evaluate on the same validation set. Integrating all the models pre-trained on ImageNet1k <cit.> in Table <ref> according to the results of the same model on different size datasets, we can obtain Figure <ref>. It can be seen that all 4 benchmarks increase as the size of the dataset increases. The two self-supervised models, DINO <cit.> and MAE <cit.>, have a higher increasing trend and are more sensitive to the size of the training data than the supervised benchmarks. This indicates that more training is required to fit the latent representations generated by self-supervised learning to the features of fire risk of remote sensing images. §.§ Fine-tuning of Self-supervised Representations For the self-supervised benchmark, we compare the differences in latent representations of these two benchmark models, DINO <cit.> and MAE <cit.>, for feature extraction of remote sensing images in FireRisk. Compared to ImageNet <cit.>, UnlabelledNAIP is smaller in size but has more similar features of remote sensing image to those on FireRisk. As shown in Figure <ref>, for DINO <cit.>, the model pre-trained on UnlabelledNAIP is better than that pre-trained on ImageNet, while for MAE <cit.>, the result is the opposite. Thus, DINO <cit.> has higher pre-training efficiency to achieve better performance on our FireRisk, while MAE <cit.> usually requires more data pre-training to achieve its optimal results. § CONCLUSION In this paper, to demonstrate the feasibility of using only remote sensing images as fire risk features, we develop a novel dataset, FireRisk, to assess fire risk. To construct this remote sensing dataset, we obtain the label of fire risk level and their corresponding geographic coordinates for a 270m square area from the WHP <cit.> raster dataset, and then gather the remote sensing image at this geographic location using the NAIP remote sensing project. The proposed dataset contains 19782 labelled remote sensing images, with 70331 serving as the training set and 21541 as the validation set. To investigate the benchmark performance of our FireRisk for supervised and self-supervised learning, we employ the advanced CNN-based ResNet <cit.> and attention-mechanism-based ViT <cit.> as our supervised benchmarks, and DINO <cit.> and MAE <cit.> as our self-supervised benchmarks, respectively. We also explore the potential of the self-supervised benchmark model by generating new latent representations on UnlabelledNAIP, an unlabelled image dataset we gather. Furthermore, we validate the efficiency of the labels by analyzing the differences in the robustness of our benchmarks to variations in the amount of training data using sub-datasets generated by randomly sampling 20% and 50% from the training set. On our FireRisk, the maximum accuracy for the supervised benchmarks can reach 63.31%, while for the self-supervised benchmarks, the MAE <cit.> pre-trained on ImageNet1k <cit.> can achieve the optimal accuracy of all models at 65.29%. It is demonstrated that our self-supervised learning benchmarks outperform supervised learning on FireRisk, although their improvement on less training data is limited. Our new pre-trained latent representations are also complementary to the self-supervised representations, and our representation of DINO <cit.> has a considerable increase, which can reach 63.44% compared to 63.36% for the DINO pre-trained on ImageNet <cit.>. The FireRisk proposed in this work confirms the validity of using only remote sensing data for fire assessment, and has a simpler implementation process and better generalization than traditional fire assessment approaches. Acknowledgements. This research was undertaken using the LIEF HPC-GPGPU Facility hosted at the University of Melbourne. This Facility was established with the assistance of LIEF Grant LE170100200. ieee_fullname
http://arxiv.org/abs/2303.06773v1
20230312231818
Protecting Classical-Quantum Signals in Free Space Optical Channels
[ "E. Villaseñor", "M. S. Winnel", "T. C. Ralph", "R. Aguinaldo", "J. Green", "R. Malaney" ]
quant-ph
[ "quant-ph" ]
[ Max Wenqiang Xu =================== Due to turbulence and tracking errors, free-space optical channels involving mobile transceivers are characterized by a signal's partial loss or complete erasure. This work presents an error correction protocol capable of protecting a signal passing through such channels by encoding it with an ancillary entangled bipartite state. Beyond its ability to offer protection under realistic channel conditions, novel to our protocol is its ability to encompass both classical and quantum information on the encoded signal. We show how, relative to non-encoded direct transmission, the protocol can improve the fidelity of transmitted coherent states over a wide range of losses and erasure probabilities. In addition, the use of ancillary non-Gaussian entangled bipartite states in the signal encoding is considered, showing how this can increase performance. Finally, we briefly discuss the application of our protocol to the transmission of more complex input states, such as multi-mode entangled states. § INTRODUCTION Building a global quantum network is a major technological challenge <cit.>. Any quantum technology that relies on mature hardware may provide a practical path forward. Continuous Variable (CV) quantum communications, which can be implemented using off-the-shelf components, is one such technology <cit.>. In this technology, quantum information is extracted using homodyne or heterodyne measurements - detection techniques previously developed to extract classical information encoded via coherent communications <cit.>. Interestingly, CV quantum and coherent communications can coexist using the same signal <cit.>, and it is this interesting co-existence of classical and quantum information we study here. Our main contribution will be the introduction of a combined classical-quantum encoding protocol that accommodates a wide range of partial loss and erasure conditions in the channel. As we discuss later, such conditions are those anticipated for practical free-space optical channels, where at least one of the transceivers is mobile. Optical free-space communications provide the basis for long-range communications, both classical <cit.> and quantum <cit.>, through horizontal channels on the ground <cit.> or more general channels to (or sometimes between) flying objects such as drones <cit.>, aircraft <cit.>, or satellites <cit.>. However, beam deformation and wandering induced by the turbulent atmosphere can have detrimental consequences <cit.>. If at least one of the transceivers is mobile and untethered, then further misalignment of the optical beam introduced by transceiver motion (e.g., jitter) must also be considered <cit.>. Any error correction protocol that can alleviate such combined effects would be useful for a pragmatic communication deployment. In the context of quantum information alone, previous works have analyzed and experimentally demonstrated how error correction of the pure erasure channel (total loss in a channel) can be achieved via the introduction of ancillary modes transmitted through independent channels <cit.>. Unlike these previous works, however, here we present a new protocol capable of error correction under more realistic conditions, as well as accommodating combined classical-quantum information encoding. The realistic channel conditions we consider encompass a range of loss conditions across the independent channels - not just simple erasures. As we shall see, careful monitoring of the channel losses via separate bright classical reference signals provides the feedback mechanism we need to protect a three-mode-encoded classical-quantum signal under our realistic channel conditions. Our specific contributions in this work can be summarized as follows: (i) We develop a three-channel error correction protocol capable of correcting any amount of loss on one mode of a three-mode quantum state while allowing some loss on the other modes, demonstrating how to optimize signal recovery. (ii) We show that transmitted coherent states exhibit a substantial improvement in fidelity over direct state transmission using one channel under our new protocol. (iii) We demonstrate how transmission of classical information can be embedded into the protocol by adding a displacement operation, quantifying the displacement characteristics needed to achieve communications with a specific bit-error rate. (iv) We show how non-Gaussian states used as entangled ancillary states within the protocol can further increase the fidelity of transmitted states. (v) We investigate whether the trends found for coherent states also apply to the distribution of entanglement by the protocol, discussing how care must be taken in interpreting the transmission of different input states. This work is organized as follows. In Section <ref>, the protocol is introduced. In Section <ref>, simulation results of the state transmission via the protocol are presented. The usefulness of non-Gaussian operations is presented in Section <ref>. Potential modifications to the protocol are discussed in Section <ref>, as are discussions on the use of alternate input states to the protocol. Our conclusions are drawn in Section <ref>. § THE PROTOCOL In Fig. <ref>.a, our protocol is presented. The protocol consists of the concurrent transmission of classical and quantum information embedded into an error correction protocol. The error correction code is first described in the following, followed by the transmission of classical information via the protocol. The following steps are followed to perform error correction in the protocol. (i) Alice initially possesses the single-mode quantum state, |ϕ_s⟩ the “quantum signal" state to be error corrected in mode 1^o, alongside an entangled bipartite state, |ψ_AB⟩ in modes 2^o and 3^o. (ii) The state |ϕ_s⟩ is combined with mode 2^o of the state |ψ_AB⟩ using a balanced Beam Splitter (BS), shown as BS1, to create a three-mode encoded state. (iii) The three modes of the encoded state are transmitted via the three fluctuating channels (acting independently on the three modes). The loss applied to each mode is characterized by the transmissivity coefficient T_j with j=1,2,3. A Local Oscillator (LO) is transmitted from Alice to Bob through each channel (a bright classical beam of known amplitude multiplexed with each mode). (iv) Bob receives the three modes, 1, 2, and 3. (v) Bob obtains T_j information on the channels by monitoring the three LOs. (vi) Bob uses a second BS (BS2), on modes 1 and 2 to decode the state. (vii) Applying a third BS (BS3), dual homodyne measurements are then performed on modes 2' and 3' (referred to as the syndrome measurements x̃ and p̃). (viii) Bob uses his channel information, combined with the syndrome measurements, to determine the optimal corrective displacement, D̂_corr, that is applied to mode 1' to obtain the output state |ϕ_out⟩ of the protocol. If error correction was successful then, |ϕ_out⟩ will deviate only marginally from |ϕ_s⟩. A critical component of the protocol is the classical computing required to apply the correction D̂_corr. This classical computation can be thought of as an algorithm that takes as inputs the measured T_j in each channel; the syndrome measurements, x̃ and p̃; and the (pre-measured) excess noise in each channel; and determines the optimal value of the gain, g, in D̂_corr that will be applied to mode 1' so to optimize the fidelity between |ϕ_out⟩ and |ϕ_s⟩. The details of this optimization procedure are non-trivial and are explained in detail below. However, suffice it to say this procedure can be implemented in software a priori. In the following, we will utilize one particular quantum information formalism to illustrate how the needed calculations within the software can be implemented. The simulation results that appear later will be based on two steps: (i) the derivation of the analytical expressions for the transformations of quantum states in each step of Fig 1.a; and (ii) the numerical simulations to determine the probability distributions for the transmissivity of each channel (based on models of the phase screens indicated in Fig. 1.b) required as input to the analytical expressions. §.§ State transformation A previous result <cit.> demonstrates that the outcome state of CV quantum teleportation can be elegantly computed using the Characteristic Function (CF) formalism. In this work, we present a similar result. For any n-mode quantum state, ρ̂, its CF is defined as (λ_1, λ_2, ..., λ_n) = {ρ̂D̂(λ_1)D̂(λ_2)...D̂(λ_n)}, where λ_i ∈ℂ, and D̂ is the displacement operator, D̂(λ_j) = e^λ_j â^†_j - λ_j^* â_j, where â_j and â^†_j are respectively the annihilation and creation operators of mode j, and ^* represents the complex conjugate. Using the CF formalism, linear optics operations can be expressed by simply transforming the CF arguments while leaving the functions unchanged. The effect of a loss-noise channel, with transmissivity T_j and excess noise ϵ on a single-mode quantum state, corresponds to the transformation of its CF as, (λ) (√(T_j)λ) _|0⟩(√(1 - T_j + ϵ)λ), where _|0⟩ is the CF of the vacuum state. The full derivation of the CF of |ψ_mathrmout⟩ is presented in Appendix <ref>. Given the CF of the quantum signal, _s(λ_1), and the CF of the entangled state, _AB(λ_2,λ_3), the CF of the output state corresponds to, _out(λ) = _s( (T_ + g̃T_) λ) × _AB( (T_ + g̃ T_)λ, √(T_3)g̃λ^*) _|0⟩(√((1 + ϵ) (2g̃^2 + 1) + 2g^2(1 - η^2) - T')λ), with T_ = √(T_1) + √(T_2)/2;      T_ = √(T_1) - √(T_2)/2; T'= T_1/2 (1+g̃)^2 + T_2/2 (1-g̃)^2 + T_3 g̃^2. Here, g̃=gη, with η^2 the efficiency of the homodyne measurements. The gain parameter when applying D̂_corr, g, corresponds to a free parameter Bob can select at will (see Appendix <ref> for more detail). Error correction in the protocol works when Bob selects the appropriate value of g based on the knowledge he obtains by monitoring the channels. By selecting the appropriate value of g, the output state can be made independent of the loss affecting one of the three modes in the encoded state. The ideal scenario occurs when two of the three modes are unaffected by the loss. In this scenario, g can always be selected to nullify the loss effects in the remaining mode. For more insight, some idealized scenarios with specific g values are discussed in Appendix <ref>. Transmission of classical information: The only additional requirements for transmitting classical information are an agreed digital modulation scheme between Alice and Bob and an extra displacement operation D̂(Δ). During the first step in the error correction, the operation D̂(Δ) is used by Alice to encode a symbol on mode 2^o of |ψ⟩_AB immediately after it has been prepared. The symbol corresponds to one or multiple classical bits following a predetermined digital modulation scheme. The symbol is then recovered by Bob automatically from the values of the syndrome measurement results, x̃ and p̃. Note, we adopt ħ=2; and Δ , x̃ and p̃ are dimensionless (the variance of the vacuum noise is one). §.§ Transmissivity calculations The technique used here to model turbulence via phase screen simulations has been detailed extensively in our previous works, with experimental validation over a horizontal free-space channel of 1.5 km <cit.>. The simulation methodology in the present work follows our previous works; details can be seen in <cit.>. Our phase screen simulations allow us to find the Probability Density Function (PDF) of the transmissivity in the channel for any given communications setup. Henceforth, we refer to this PDF as 𝒫. The dominant parameters of a communication setup are the propagation distance, L, the wavelength of the light used, λ, the beam waist at the transmitter, r_t, and the size of the receiving aperture, r_d. These parameters will be fixed to be values shown in Table I (with the exception of L and r_d). For focus, we assume a horizontal channel in the results we show here; however, other configurations can be easily accommodated via small changes in the simulations <cit.>. A total of 10 uniformly distributed phase screens are used, and the grid size of complex numbers is 1500 × 1500. A typical PDF from our calculations can be seen in Fig. <ref>. Beyond turbulence, other real-world system issues can affect the channel transmissivity. Most notable are the pointing and tracking errors between the transmitter and receiver that create a jitter and/or deterministic offsets of the beam direction <cit.>. In our channel model, we will account for these effects by the addition of erasures into the PDF of the transmissivity. That is, for each optical beam sent from the transmitter to the receiver, we consider that there is a probability p_e of it entirely missing the receiver (corresponding to T_j=0). In other words, for a given communications setup (e.g., the transceiver apertures, propagation distance, and wavelength) with corresponding PDF 𝒫, and an erasure probability, p_e, the values of T_j are now given by the following modified PDF, T_j = T_j ∼𝒫 with probability (1-p_e) 0 with probability p_e, where X∼ Y indicates that a random variable X is drawn from distribution Y. This channel model represents a good approximation to the real-world channel of interest to us - a channel where erasure probability is high[In channels where 𝒫 indicates a small probability for T∼ 0, and where p_e∼0, we find that no improvement from the protocol is likely - the transmission may as well be just direct. If a priori known that p_e=0, we have a Gaussian channel, and the introduction of non-Gaussian states or measurements into the protocol is needed if any advantage is to be forthcoming.]. Also, the extension of the channel model via a new probability, p_e, to parameterize the additional loss caused by transceiver movement/offsets allows us to compare better with previous related work. § SIMULATIONS Here, we first outline the CFs of the main quantum resources we use and make clear how we determine the fidelity - the key metric we use. We then discuss the performance of the quantum and classical communication under the protocol, detailing how the optimization of g is determined for each simulation run. §.§ Quantum resources The quantum signal is a coherent state |α⟩, whose CF is, _|α⟩(λ) = exp[-|λ|^2/2 + (λα^* - λ^* α) ]. The two-mode squeezed vacuum (TMSV) state |ψ_AB⟩ used in the encoding has a CF, _TMSV(λ_A, λ_B) = exp[ -1/2(|λ_A'|^2 + |λ_B'|^2 ) ]. In deriving this, the following transformation has been used<cit.>, Ŝ_AB(ϱ) D̂(λ_A) D̂(λ_B) Ŝ^†_AB(ϱ) = D̂(λ_A') D̂(λ_B'), λ_j' = cosh(r)λ_j + e^iϕsinh(r) λ_k^*      j,k = {A,B};    j≠ k, with Ŝ_AB the two-mode squeezing operator, and with ϱ=re^i ϕ. Without loss of generality, the value ϕ=π is set. Finally, the CF of the vacuum state |0⟩, that appears in Eq. <ref> is, _|0⟩(λ) = exp[ -|λ|^2/2]. Fidelity is used as the metric of the effectiveness of the protocol. The fidelity represents the closeness between the quantum signal |ψ_s⟩ and the output state |ψ_out⟩. In the CF formalism, the fidelity is computed as, ℱ_α = 1/π∫ d^2 λ_s(λ) _out(-λ). The fidelity as defined in Eq. <ref> will depend on each input state's value α. Therefore, the mean fidelity over an ensemble of coherent states must be considered. The following Gaussian distribution specifies the ensemble, P_α(α) = 1/σ_απexp[-|α|^2/σ_α], with σ_α the variance. Therefore, the fidelity over the ensemble of coherent states will be used, defined as ℱ = ∫ dα^2 P_α(α) ℱ_α. Ideally, we would like to compute the fidelity considering a uniform distribution of coherent states (corresponding to σ_α→∞); however, this would be analytically intractable. An approximation to a uninform distribution can be obtained by setting a large enough variance, σ_α = 10 (a value we adopt through this work). For reference, the so-called classical limit, ℱ_class=0.52 sets the baseline where fidelities of transmission below this value could be obtained using purely classical communications<cit.>. Using Eq. <ref> with Eq. <ref> it becomes possible to find an analytical expression of the fidelity for the ensemble of coherent states. This expression is provided in Appendix <ref>, Eq. <ref>. Additionally, the fidelity for direct transmission for the ensemble of coherent states, ℱ^dir, is also presented in Appendix <ref>, Eq. <ref>. §.§ Transmission of quantum information In the following calculations, a homodyne measurement efficiency of η^2=0.9 is set unless specified otherwise. Fluctuations of the free-space channel produce several effects contributing to the excess noise <cit.>. We have modeled the excess noise in our simulation as ϵ= ϵ_ph + ϵ_det. Here, ϵ_ph is related to noise introduced by the displacement used in the encoding (see <cit.>) and will be modified by the transmissivity of the channel. The other term, ϵ_det is detector excess noise, which we set to ϵ_det=0.013 <cit.>. As an example, for T=0.5, we have ϵ=0.018. When computing the fidelity, every protocol realization involves a different sample of the values T_j. Thus, the parameter g must be optimized for each protocol realization, as shown in Fig. <ref>. The following procedure was followed to compute the mean fidelities. First, using the numerical simulations described in Section <ref>, 30000 samples of T_j were obtained for a given propagation distance. Next, fidelity was obtained for a specific realization of the channels using three sampled values of T_j in Eq. <ref>. All possible transmissivity occurrences must be accounted for to compare the protocol's effectiveness to direct transmission. For direct transmission, the total fidelity is calculated as ℱ^dir_total = (1- p_e) ℱ^dir + p_eℱ_|0⟩. The results comparing the mean total fidelity between the protocol and direct transmission are shown in Fig. <ref>. The results indicate that the protocol improves the transmission fidelity for values of p_e up to 0.35. The advantage provided by the protocol decreases as the distance increases. For values, p_e>0.35, it is observed that the protocol does not provide any advantage for the r_d values shown. §.§ Transfer of classical information Now the error rates in transmitting classical information via the protocol are analyzed. An error during the transmission of classical information corresponds to Bob misidentifying the symbol sent initially by Alice. The excess noise added to the system increases the variance of the syndrome measurements. Thus, if the noise is too high, there is a probability that the syndrome measurements appear on a different partition from the one Alice meant to encode. The error probability can be directly quantified by the ratio between the variance of the syndrome measurements, σ_s, and the magnitude of the displacement used during the classical encoding, |Δ|. For a given value of |Δ|, a larger σ_s means a higher Bit Error Rate (BER). Alternatively, a more significant displacement can also be used to increase the distance between partitions and offset the effects of σ_s, increasing the Signal-to-Noise Ratio (SNR). If all the states used during the protocol are Gaussian, then the measurement results will follow a Gaussian distribution <cit.>. Solving the integration in Eq. <ref> in Appendix <ref>, we see that the syndrome measurements have the mean values given by μ_x̃ = 1/√(2)η T_Δ μ_p̃ = 1/√(2)η T_Δ. The variance σ_s depends on the specific values T_j, the amount of squeezing r, and the size of the ensemble of states being transmitted using the protocol σ_α. The expression of σ_s is presented in Appendix <ref>. Once we have determined the moments of the syndrome measurements, we can compute the BER. For simplicity, we assume the classical information consists of single bits encoded in Binary Phase-Shift Keying <cit.>. In this case, the BER of the protocol will be, BER=1/2erfc(η T_ |Δ|/√(2σ_s^2)). A value of interest is the size of the displacement required to maintain the BER to a tolerable level. For a BER of 10^-9, we see in Fig. <ref> the mean values of |Δ| required for the special case when T_1=0 in mode 1 (or similarly mode 2). If instead mode 3 possesses T_3=0, the displacement requirements are approximately half of the values shown. § ENHANCEMENT VIA NON-GAUSSIAN OPERATIONS Non-Gaussian states represent a key element in CV quantum information, and there has been great interest in their use to enhance quantum communications protocols <cit.>. Particularly, in CV quantum teleportation, certain non-Gaussian operations have shown to enhance the fidelities of transmitted states <cit.>. Thus, it is natural to ask if the same holds for this protocol. One viable experimental way to construct non-Gaussian states shown in Fig. <ref>, where a mode of a TMSV is combined with a BS with transmissivity T_κ with a M photon Fock state, and a photon discriminating detector is used to detect N photons. In the following, we consider a Photon Subtraction (PS), setting M=0, N=1; Photon Addition (PA) with M=1, N=0; and Photon Catalysis (PC) setting M=1, N=1. We also consider the successive application of the PS and PA operations, PS-PA (order reversed in PA-PS). All the operations are applied in mode 3^o of the initial TMSV state as the first step in our protocol. Besides applying non-Gaussian operations on a TMSV, an additional non-Gaussian entangled state is considered. This state is prepared at the start of the protocol by the application of the two-mode squeezing operation to a Bell state, the state known as the Squeezed Bell (SB) state, given by |ψ_SB⟩ =(cos^2(ϑ) + sin^2(ϑ))^-1/2 ×Ŝ_AB(ϱ) [cos(ϑ) |00⟩ + sin(ϑ)|11⟩]. The implementation of the non-Gaussian states is achieved by replacing |ψ_AB⟩ in Fig. <ref> with the corresponding non-Gaussian state. The CF of each non-Gaussian state must be computed first and used in Eq. <ref>, where the non-Gaussian CF replaces _AB. The CF of the states used in this work have been calculated in previous works <cit.>, and are listed in Appendix <ref> for completeness. In the CF of each non-Gaussian state, a free parameter exists corresponding to the transmissivity of the beam-splitter involved in each operation. This free parameter is optimized to maximize the fidelity of transmission. In the case of the SB state, the ϑ free parameter is optimized. For the PS-PA and PA-PS, the exact value of T_κ is used in both successive non-Gaussian operations. Finally, it is assumed that a quantum memory is available at the transmitter, such that the non-Gaussian states can be prepared and stored to be used on demand during the protocol[Non-Gaussian operations have a non-unity success probability. Without a quantum memory, this success probability would need to be accounted for in the resulting fidelities.]. The results are presented in Fig. <ref>. To simplify the analysis, we evaluate the fidelities for a simplified channel, where 𝒫= δ(T_j-T') in Eq. <ref>, the excess noise is set as ϵ = 0, and η=1. Of all the non-Gaussian resources used, only two states represent an enhancement over the TMSV squeezed state: the PA-PS and the SB states. Moreover, the gain in fidelity is only observed when the squeezing in the entangled states is low, around r=4.7 dB. As the squeezing increases, the fidelities obtained by the non-Gaussian states get closer to the ones obtained by the TMSV state, for a value of r=10 dB, the difference in fidelity is of the order of 10^-2. We point out that there is an agreement between the two non-Gaussian resources that represent an enhancement between the protocol presented here and CV quantum teleportation <cit.>. Moreover, when mode 3 is erased, the fidelities obtained using the non-Gaussian states are equal to the ones obtained when the TMSV state is used. Now, we address how the use of non-Gaussian states affects classical encoding. When non-Gaussian states are used, the syndrome measurement results follow a non-Gaussian PDF. Numerical integration over this non-Gaussian PDF indicates that the values of |Δ| required to keep low BER are considerably higher when the non-Gaussian states are used. Approximately 80% larger |Δ| is required in the SB and PA-PS states when mode 1 is erased[A case where the application of the PA-PS operation is applied to mode 2^o instead of mode 3^o during the preparation of the non-Gaussian state was also tested. The results showed no difference in the displacement requirements between the two cases.]. § DISCUSSION Here, we discuss our new results in relation to previous similar work, some alternative encoding schemes, and some additional input states. §.§ Relation to other work Other works <cit.> have previously looked at similar encoding schemes. In <cit.>, a three-mode encoding scheme was studied in the context of a quantum state sharing scheme. Although not aimed at the communication scenario, the nature of this scheme was similar to the encoding required for an erasure channel in the communication context. In <cit.>, a four-mode encoding scheme used to transfer two coherent input states over an erasure channel was investigated. In <cit.>, a three-mode encoding scheme similar to that used in the context of state sharing was analyzed for the communication scenario, with extensions to include non-Gaussian operations. This latter work was again only in the scenario of an erasure channel. Channel errors beyond a simple erasure were considered in <cit.> - namely, a displacement error. The results presented here represent outcomes different from all these previous works in several aspects. First, we consider a channel model more appropriate to that anticipated for free-space atmospheric communications in which one transceiver is untethered. Simulations of this channel are then used to analyze a modified protocol deployed over a three-mode channel. The key modification in the protocol is an optimization phase in which the transmissivity measured for each channel is used as an input. This allows for encoding and decoding in the more general case where transmissivities in all channels are non-zero. Importantly, our protocol leads to improved results relative to the situation where any loss is simply considered a complete erasure. Second, we have included additional displacements within the encoding phase to include classical signaling. Third, we have investigated non-Gaussian operations within the modified protocol. §.§ Alternative encodings and post selection Thus far, we have considered combined classical-quantum communication embedded in the same signal. However, other possibilities exist. For example, the reference pulses could embed classical information – simple on-off keying being one scenario. In this scenario, the lack of any LO sent in a channel could indicate a zero and its presence, a one. The quantum signal, in this case, would not need an additional displacement, but the trade-off would be that the quantum information rate would be reduced. Exactly how much reduction would occur would depend on the coherence time of the channel and the pulse rate of the source, but for anticipated timescales of order 1ms and available pulse rates of 100MHz, this reduction would be minimal (since the channel is stable for thousands of sent LOs - these can be re-used). This trade-off of a reduced quantum information rate would have the benefit of a reduction in the excess noise of ≈ 0.02 and would yield an increase of fidelity (≈0.05). An added benefit would be a reduction of the complexity of deployment (one less displacement operation) and potential power savings (fewer LOs sent). On-off keying could also be applied to the quantum signals (with a vacuum detection being mapped to a zero). However, such schemes would need a modified digital modulation scheme (to avoid `on' signals which have small displacements). Our results presented here have utilized an averaging over all channel conditions. In practice, post-selection could be utilized to select the channels such that, at most only one presents an erasure. Again, a trade-off in performance vs. throughput would be in play here. Post-selection would be most beneficial under high erasure error rates. For example, post-selecting to allow at most a single erasure at an error rate p_e=0.3 would have the benefit of the fidelity being increased by ≈0.15, at a reduction in throughput of 0.8. §.§ Entanglement distribution We are also interested in evaluating the protocol's effectiveness in distributing entangled states. Considering an input TMSV state, |ψ^in_MN⟩ with squeezing r_MN, we can evaluate the fidelity with the state obtained after mode M has been transmitted via the protocol. Although not shown, our results show that there are scenarios where an advantage over direct transmission can be found similar to before. For equal squeezing values in the states |ψ_AB⟩ and |ψ^in_MN⟩, we observe the use of the protocol does present an advantage over direct transmission. Ideally, for entangled input states, we would like to test the protocol's effectiveness using an application of quantum communications, such as entanglement distribution. However, using only fidelity can be an incomplete metric of the transmission of quantum information, especially for entangled states <cit.>. Entanglement distribution is perhaps better measured by computing the Reverse Coherent Information (RCI) of the channel, as it represents a lower bound on the distillable entanglement <cit.>. The RCI is defined as, ℛ= S(ρ_N) - S(ρ_MN), with S(·) the Von Neumann entropy, and ρ_MN a maximally entangled TMSV state (r_MN→∞), where mode M has been transmitted via the channel using the protocol. For our protocol, an upper bound on the RCI can be found using the fact that the entropy is concave, S(ρ_MN) ≥∑_k p_k S(ρ_k), where the index k iterates over all possible erasure combinations on three modes (no erasure, erasure on mode 1, erasure on mode 2, and so forth), ρ_k is the corresponding state after error correction for combination k, and p_k the probability of each combination. In the combinations when error correction is not possible, e.g. erasures on modes 1 and 2, ρ_k=_M[ρ^in_MN]. Using the upper bounds of the RCI as a new metric, we are interested in comparing the protocol with direct transmission. Direct transmission, in this case, corresponds to transmitting mode M (of the state |ψ_MN⟩) via the channel. We compute the upper bounds of the RCI for the simplified channel used for Fig. <ref>. The resulting upper bounds of RCI are presented in Fig. <ref>. The results show that the upper bound on the RCI obtained from the protocol and direct transmission is virtually equal for values T' close to 1; as T' decreases in value, the protocol stops presenting an advantage, and the RCI becomes lower than the one obtained by direct transmission. The lack of an advantage by the protocol in this simulation can be understood by the fact that loss in the ancilla modes (modes 2' and 3') in the protocol propagates to the final state. Thus, while the transmission of coherent states can be effectively enhanced by using the protocol presented here, we warn that this may not be the case for applications that are dependent on the distribution of entangled states. § CONCLUSIONS In this work, a new error correction protocol was introduced. Aimed at deployment over realistic free-space optical channels where at least one transceiver is untethered, the protocol was designed to encompass both classical and quantum information on the encoded signal. We showed, relative to non-encoded direct transmission, that the protocol improves the fidelity of transmitted coherent states over a wide range of losses and erasure probabilities. In addition, using ancillary non-Gaussian entangled bipartite states in the signal encoding further increased the fidelity of transmission. Variants on a theme for the protocol were discussed, including its application to the transmission of components of a multi-mode entangled state. Our results demonstrate that signal loss in atmospheric channels can be compensated for significantly at the price of additional implementation complexity. § ACKNOWLEDGEMENTS We thank Ziqing Wang for the valuable discussions. The Australian Government supported this research through the Australian Research Council's Linkage Projects funding scheme (project LP200100601). The views expressed herein are those of the authors and are not necessarily those of the Australian Government or the Australian Research Council. Approved for Public Release; Distribution is Unlimited; #23-0238. unsrt § OUTPUT STATE CF DERIVATION We will derive the CF of the output quantum state obtained by the protocol. To do so, we follow the diagram presented in Fig. <ref>. As the first step, consider the application of a displacement operation on mode 2 of a bipartite state ρ̂_AB, ρ' = D̂(Δ) ρ̂_ABD̂^†(Δ). Then the CF of the state ρ' is, _ρ'(λ_1, λ_2) = [D̂(Δ) ρ̂_ABD̂^†(Δ) D̂(λ_1) D̂(λ_2) ] Using the following properties of the displacement operator, D̂(α)D̂(β) = e^(αβ^* - α^* β)/2D̂(α + β); D̂^†(α)D̂(β)D̂(α) = e^(α^* β - αβ^*)D̂(β), the CF of ρ̂' is then, _ρ̂'(λ_1, λ_2) =[ e^(Δ^* λ_2 - Δλ_2^*)D̂(λ_1) D̂(λ_2) ρ̂_AB] = _AB(λ_1, λ_2) D_Δ(λ_2) where we defined the function D_Δ(λ) = e^(Δ^* λ_ - Δλ^*) and _AB is the CF of ρ̂_AB. Now the CF of the initial state at the start of the protocol, considering the displacement applied to the entangled state, is _s(λ_1)_AB(λ_2, λ_3)D_Δ(λ_2). The effect of BS1 acting on modes 1 and 3 can be described as a change in variables, such as _s(λ_1 + λ_2/√(2)) _AB(λ_1-λ_2/√(2), λ_3) D_Δ(λ_1 -λ_2/√(2)). After that, the effect of the loss acting independently on every channel transforms the CF to _s(√(T_1)λ_1 + √(T_2)λ_2/√(2)) _AB(√(T_1)λ_1-√(T_2)λ_2/√(2), √(T_3)λ_3) ×D_Δ(√(T_1)λ_1 -√(T_2)λ_2/√(2)) _|0⟩( T_1^* λ_1 ) _|0⟩( T_2^* λ_2 ) ×_|0⟩( T_3^* λ_3 ), with T_j^*=√(1 + ϵ - T_j). Thereafter, BS2 is applied by Bob on modes 1' and 2', _s(√(T_1)(λ_1 + λ_2) + √(T_2)(λ_1 - λ_2)/2) ×_AB(√(T_1)(λ_1 + λ_2) - √(T_2)(λ_1 - λ_2)/2, √(T_3)λ_3) ×D_Δ(√(T_1)(λ_1 + λ_2) - √(T_2)(λ_1 - λ_2)/2) ×_|0⟩( T_1^* (λ_1+λ_2)/√(2)) _|0⟩( T_2^* (λ_1-λ_2)/√(2)) _|0⟩( T_3^* λ_3 ). Finally, to perform a dual homodyne measurement, BS3 is applied, transforming the state. The efficiency of the homodyne measurements can be modeled by considering a BS with transmissivity η^2, with an extra vacuum mode placed before the detectors. Then the CF of the state before homodyne measurements is, _BS3 (λ_1, λ_2, λ_3) = _BS3' (λ_1, λ_2, λ_3) D_Δ(λ_1 T_ + (λ_2 + λ_3)/√(2)η T_), where _BS3' (λ_1, λ_2, λ_3)=  _s(λ_1 T_ + λ_2 + λ_3/√(2)η T_) ×  _AB(λ_1 T_ + (λ_2 + λ_3)/√(2)η T_ , √(T_3)η (λ_2-λ_3)/√(2)) ×  _|0⟩( T_1^* (λ_1/√(2) +ηλ_2 + λ_3/2) )×  _|0⟩( T_2^* (λ_1/√(2) -ηλ_2 + λ_3/2)) ×  _|0⟩( T_3^* ηλ_2 -λ_3/√(2)) _|0⟩(√(1-η^2)λ_1 ) ×  _|0⟩(√(1-η^2)λ_2 ). It is convenient to express the measurement results in the phase space representation by transforming the complex arguments into two real numbers, x_j = λ_j + λ_j^* and p_j=i(λ_j^* - λ_j). Then the homodyne measurements are represented by integrating the measured modes. _m(x, p) = 𝒫(x̃, p̃)^-1/(2π)^2∫ d x_2 d p_3 _BS3(x, p, x_2, 0, 0, p_3 )                    × e^-ix̃p_3 + ip̃x_2, with 𝒫̃(x̃, p̃) the PDF of any pair of measurement results, given by 𝒫̃(x̃, p̃ )= 1/(2π)^2∫ d x_2 d p_3 _BS3(0, 0, x_2, 0, 0, p_3 ) × e^-ix̃p_3 + ip̃x_2. Expanding the terms in D_Δ, we have, D_Δ (x_1 T_ + x_2/√(2)η T_, p_1 T_ + p_3/√(2)η T_) = exp[-ix_1 T_Δ +i p_1 T_Δ] × exp[-ix_2 η T_Δ/√(2) +i p_3 ηT_Δ/√(2)]. Inserting this expression into Eq. <ref> and manipulating the terms, it becomes clear that the mean of the syndrome measurement results is displaced following Eqs. <ref>. The additional exponential term in Eq. <ref> indicates that the state after the measurement requires a corrective displacement to be recovered. This corrective displacement must also account for the additional displacement induced by the displacement Δ. The corrective displacement can be implemented via, D̂_corr(x̃, p̃) = exp[ - ip (√(2)x̃' g + T_Δ) + i x(√(2)p̃' g +T_Δ)], with x̃' = x̃-μ_x̃, p̃' = p̃+μ_p̃, where μ_x̅(p̅) is defined in Eq. <ref>. Here, the correction includes a factor of √(2) to compensate for the global factor that appears in the arguments of _BS3 in Eq. <ref>. Finally, since the output CF will depend on a specific set of measurement results, the mean over all possible measurement outcomes, weighted by their corresponding probability, must be considered, that is _out(x, p) = ∫ d x̃ d p̃𝒫(x̃, p̃) _m(x, p) D̂_corr(x̃,p̃) = 1/(2 π)^2∫ d x̃ d p̃ d x_2 d p_3 _BS3 '(x, p,x_2, 0, 0, p_3 )           × e^i x̃' (p_3 - √(2) p g) - i p̃' (x_2 - √(2) x g). At this point, the definition of the Dirac delta function, 1/2π∬ e^iβ x -iβαf(α)dβ dα = ∫δ (x - α)f(α)dα, can be used twice to obtain _out(x, p) = ∫ d x_2 d p_3 δ (p_3 - √(2)p)δ (x_2 -√(2)x)         ×_BS3'(x, p, x_2, 0, 0, p_3 ). Removing the integrands using the properties of the δ function, the Eq. <ref> presented above is recovered. § SPECIFIC EXAMPLES OF ERROR CORRECTION To further understand the error correction, we outline the following three cases, corresponding to different values of g. §.§.§ g=0 _s(T_λ) _AB(T_λ , 0 ) _|0⟩(√(1 + ϵ - T_1 + T_2/2)λ). In this case, the resulting state is independent of the value of T_3. Moreover, the excess noise in channels 2' and 3' does not propagate to the output state. However, when T_1 ≠ T_2 imperfect destructive interference in BS2 will translate to additional excess noise introduced by the entangled state, which will be proportional to the squeezing of the state. When T_1=T_2, the resulting state is equivalent to the one obtained if the signal state were to be transmitted directly through the channel without using the protocol. §.§.§ g=1/η _s(√(T_1)λ) _AB(√(T_1)λ, √(T_3)λ^* ) × _|0⟩(√(3 + 3ϵ + 2(1/η^2 -1) - 2 T_1 - T_3)λ). The resulting state will be independent of the value of T_2. Unlike the previous case, the resulting state is affected by the loss and excess noise affecting modes 2' and 3'. Consider the case when T_1=T_3, then it becomes clear that the vacuum contribution appears in the output state three times. On an ideal scenario, with T_1=T_3=1, the quantum signal can be fully recovered in the limit V →∞ as in this limit _AB(λ, λ^*) → 1 (see Eq. <ref>) <cit.>. §.§.§ g=-1/η _s(√(T_2)λ ) _AB(-√(T_2)λ, -√(T_3)λ^* ) × _|0⟩(√(3 + 3ϵ + 2( 1/η^2 -1) - 2 T_2 - T_3)λ). In this case, the resulting state is independent of T_1. Similarly to the previous case, the loss and excess noise from the ancillary entangled state propagates to the output state. § FIDELITY OF TRANSMISSION To compute the fidelity between the states |ϕ_in⟩ and |ϕ_out⟩ first the CF of _out is obtained using Eq. <ref>. Next, an analytical expression for a single input coherent state can be obtained by solving the integration in Eq.<ref>. Finally, this fidelity is averaged over the ensemble of coherent states by solving the integral in Eq. <ref>. The expression obtained is, ℱ= 2/2σ_α( T_ + g̃ T_ -1)^2 + c_1 + 1, with c_1 = V((T_ + g̃ T_)^2 + T_3g̃^2)- 2√(V^2-1)(T_ + g̃ T_)√(T_3)g̃ + (T_ + g̃ T_)^2 + (1 + ϵ) (2g̃^2 + 1) + g^2(1 - η^2) - T'. Additionally, the analytical expression for the fidelity of direct transmission can be obtained by following the same procedure as above, where the CF of the state transmitted directly through the channel replaces _out. The expression obtained is, ℱ̅^DT= 2/2σ_α(√(T)-1)^2 + 2. where T is the transmissivity of the channel. § DERIVATION OF THE SNR OF THE MEASUREMENT RESULTS The SNR ratio of the syndrome measurement is used to calculate the bit error rate of the encoded classical communications. To find the SNR, we need to find the variance of the syndrome measurement results, σ_s. If all the states involved in the protocol are Gaussian, then solving the integrating in Eq. <ref>, we observe that 𝒫̃ corresponds to a Gaussian distribution, 𝒫̃(x̃, p̃) = 1/2σ_sπexp[-x̃'^2 + p̃'^2/2σ_s^2], where σ_s^2 = η^2 ( T_^2 σ_α + c_2 ) + 1. with c_2 = V(T_^2/2 + T_3/2) - √(V^2-1)(T_√(T3)) + T_^2/2 + (ϵ- T'/2). § CF OF NON-GAUSSIAN STATES §.§.§ Photon addition, photon subtraction, and photon catalysis In the following, we apply the procedures of <cit.> for determining CFs. The unnormalized CF of the state resulting from the application of the non-Gaussian operation to a mode of the TMSV state after it has been transmitted through the channel is, '_PS( ξ_A, ξ_B) =T_κ-1/T_κexp[-|ξ_B|^2/2[ ×∂^2/∂ξ_B∂ξ_B^*[ exp[|ξ_B|^2/2] f(ξ_A, ξ_B, √(T_κ)) ], where f(ξ_A, ξ_B, √(T_κ))=∫d ξ^2/π (1-T_κ)_TMSV(ξ_A, ξ) ×exp[ 1+T_κ/2(T_κ-1)(|ξ|^2+|ξ_B|^2) + √(T_κ)/T_κ-1 (ξ_Bξ^*+ξ_B^*ξ) ]. Similarly, the unnormalized CF after the PA operator is applied is, '_PA(ξ_A, ξ_B) =(T_κ-1) exp[|ξ_B|^2/2[ ×∂^2/∂ξ_B∂ξ_B^*[ exp[-|ξ_B|^2/2[ f(ξ_A, ξ_B, √(T_κ)) ]. When the PC operator is applied, the unnormalized CF is, '_PC(ξ_A, ξ_B) =q^2 exp[|ξ_B|^2/2[∂^2/∂ξ_B∂ξ_B^*{exp[-|ξ_B|^2[ ×∂^2/∂ξ_B∂ξ_B^*[ exp[|ξ_B|^2/2[ f(ξ_A, ξ_B, √(T_κ)) ]} -q exp[|ξ_B|^2/2[∂/∂ξ_B{exp[-|ξ_B|^2[ ×∂/∂ξ_B^*[ exp[|ξ_B|^2/2[ f(ξ_A, ξ_B, √(T_κ)) ]} -q exp[|ξ_B|^2/2[∂/∂ξ_B^*{exp[-|ξ_B|^2[ ×∂/∂ξ_B[ exp[|ξ_B|^2/2[ f(ξ_A, ξ_B, √(T_κ)) ]} +f(ξ_A, ξ_B, √(T_κ)), where q=T_κ-1/T_κ. For the sequential use of the PS and PA operators, the operations PS-PA and PA-PS, we consider the two non-Gaussian operations to use the same beam-splitter transmissivity, T_κ. For PS-PA, the unnormalized CF is, '_PS-PA(ξ_A, ξ_B) =q^2 exp[|ξ_B|^2/2[∂^2/∂ξ_B∂ξ_B^*{exp[-|ξ_B|^2[ ×∂^2/∂ξ_B∂ξ_B^*[ exp[|ξ_B|^2/2[ f(ξ_A, ξ_B, T_κ) ]}. The unnormalized CF for PA-PS is, '_PA-PS(ξ_A, ξ_B) =(T_κ-1)^2 exp[-|ξ_B|^2/2[∂^2/∂ξ_B∂ξ_B^*{exp[|ξ_B|^2[ ×∂^2/∂ξ_B∂ξ_B^*[ exp[-|ξ_B|^2/2[ f(ξ_A, ξ_B, T_κ) ]}. §.§.§ Squeezed Bell-like states The normalized CF of an SB state is <cit.>, _SB(ξ_A, ξ_B) = (cos^2(ϑ) + sin^2(ϑ))^-1/2 exp[-1/2(|ξ_A'|^2 + |ξ_B'|^2 ) ] [ cos^2(ϑ) + 2 cos(ϑ)sin(ϑ) ×{ξ_A' ξ_B' } + sin^2(ϑ) (1 - |ξ_A'|^2) (1 - |ξ_B'|^2) ], where { z} is the real part of z and the transformation given by Eq. <ref>, is used.
http://arxiv.org/abs/2303.06811v2
20230313015914
The NPU-Elevoc Personalized Speech Enhancement System for ICASSP2023 DNS Challenge
[ "Xiaopeng Yan", "Yindi Yang", "Zhihao Guo", "Liangliang Peng", "Lei Xie" ]
eess.AS
[ "eess.AS" ]
Weighted Euclidean balancing for a matrix exposure in estimating causal effect [ ============================================================================== *Corresponding Author This paper describes our NPU-Elevoc personalized speech enhancement system (NAPSE) for the 5th Deep Noise Suppression Challenge<cit.> at ICASSP 2023. Based on the superior two-stage model TEA-PSE 2.0 <cit.>, our system particularly explores better strategy for speaker embedding fusion, optimizes the model training pipeline, and leverages adversarial training and multi-scale loss. According to the results[https://aka.ms/5th-dns-challenge][https://github.com/microsoft/DNS-Challenge], our system is tied for the 1st place in the headset track (track 1) and ranked 2nd in the speakerphone track (track 2). personalized speech enhancement, real-time, generative adversarial network, deep learning. § INTRODUCTION Taking a speaker's short enrollment as prior, personalized speech enhancement (PSE) aims to extract the target speaker's speech from a mixture signal that may contain noise, reverberation, and interfering speaker. The 5th edition of the deep noise suppression (DNS) challenge, held in ICASSP 2023, particularly focuses on PSE for full-band signal collected from headset microphone (track 1) and speaker-phone (track 2). In this challenge, our model is based on TEA-PSE 2.0 <cit.> – an upgraded two-stage model from the previous DNS challenge championship <cit.>. Still keeping the two-stage strategy of decomposing a difficult learning task into easier sub-processes, TEA-PSE 2.0 adopts subband operations and a time-frequency convolution module to reduce computational complexity and further improve performance. Compared to the oracle TEA-PSE 2.0, we have made substantial improvements in several aspects. First, we leverage a stronger ResNet34-based speaker embedding model which has recently achieved state-of-the-art performance on VoxCeleb <cit.>. Moreover, inspired by the recent observation <cit.> that a simple filterbank feature can preserve the integrity of speaker information with good generalization, we explore the complementarity between such acoustic representation and commonly-used neural speaker embedding through fusion experiments. Second, we study the training strategy for the two-stage model with the conclusion that the best performance is achieved when we first train the stage-one model, then freeze the stage-one model to train the stage-two model, and finally, jointly train both stage models. Ultimately, we improve model optimization with multi-scale loss <cit.> and GAN loss <cit.>. Particularly, we adopt MetricGAN <cit.> to predict PESQ and DNSMOS because it can learn these non-differentiable metrics to optimize the model. § PROPOSED METHOD §.§ Overview Our system is mainly composed of three parts: speaker encoder, speech enhancement model, and MetricGAN discriminator. A RestNet34-based speaker encoder <cit.> extracts speaker embedding from the enrollment speech. The speaker embedding, together with utterance-level mean and standard deviation of the Fbank feature extracted from the enrollment speech, goes through a learnable fusion module. The fused embedding is thus fed into the speech enhancement model as the prior information for speaker extraction. The speech enhancement model follows that in TEA-PSE 2.0 <cit.>, consisting of a two-stage model and subband operations. The two-stage model includes MAG-Net (stage one) and COM-Net (stage two) to process magnitude and complex features respectively. The encoder of MAG-Net is composed of three frequency down-sampling (FD) layers, the decoder of MAG-Net is composed of three frequency up-sampling (FU) layers, and the middle layer is composed of four stacked gated temporal convolutional modules (S-GTCM). Likewise, COM-Net has a similar network topology as MAGNet, while its dual-decoder architecture is designed to estimate the real and imaginary spectrum separately. The MetricGAN discriminator is introduced to help the speech enhancement model to better optimize perceptual metrics including PESQ and DNSMOS. §.§ GAN Adversarial learning has shown superior performance recently. Perceptual metrics that are closer to human auditory impression on speech quality, have been recently considered as optimization targets <cit.>. Thus, we adopt GAN to learn these non-differentiable metrics. Specifically, we use MetricGAN+ <cit.> to predict PESQ and MetricGAN-U <cit.> to predict DNSMOS OVRL respectively. m_PESQ(ŝ,s) = (PESQ(ŝ,s)+0.5)/5 m_DNSMOS(ŝ,s) = (DNSMOS(ŝ)-1.0)/4 ℒ_D = | D(ŝ) - m(ŝ,s) |^2 ℒ_G = | D(ŝ) - 1.0 |^2 where s and ŝ refer to the original clean and estimated sources. m(ŝ,s) is the function to get metric, and values are normalized to [0,1]. ℒ_D is used to train the MetricGAN discriminator network and ℒ_G is used to train the speech enhancement network. §.§ Loss function For the stage-one network, we use the scale-invariant signal-to-noise ratio (SI-SNR) loss ℒ_si-snr, the asymmetric loss ℒ_asym and the magnitude spectral mean square loss ℒ_mag. For the stage-two network, we add the complex spectral mean square loss ℒ_RI. In addition to the above losses in TEA-PSE 2.0, we add multi-scale loss <cit.> and GAN loss as well, which are formulated as ℒ_1 =ℒ_si-snr + 1/M∑_m=1^M(ℒ_asym + ℒ_mag) + ℒ_G ℒ_2 =ℒ_si-snr + 1/M∑_m=1^M(ℒ_asym + ℒ_mag + ℒ_RI) + ℒ_G where ℒ_1 and ℒ_2 are the total loss of stage one and two models respectively, and m indicates the scale corresponding to different STFT configurations. In this paper, we set M=3 with number of FFT bins ∈ {512, 1024, 2048}, hop sizes ∈ {240, 480, 960}, and window lengths ∈ {480, 960, 1920} respectively. § EXPERIMENTS §.§ Dataset Speech and noise data are all taken from DNS4 track2 personalized dataset and DNS5 dataset. We simulate 150,000 RIR clips by image method[https://github.com/phecda-xu/RIR-Generator] and the RT60 of RIRs ranges from 0.1s to 1.2s. Totally we simulate about 2,000 hours of data for the model training of the two tracks while 170 hours are used as a subset for quick ablation study on dev_test set. The model structures for the two tracks are the same but trained using different sets on the official Github. §.§ Training Setup During the model training, the parameters of Resnet34 speaker encoder are always frozen. The learnable fusion module is a 256-dimensional Dense layer to combine 256-dimensional Resnet34 embedding and 160-dimensional Fbank (80 means and 80 standard deviations). The configuration of the speech enhancement model is exactly the same as that of TEA-PSE 2.0 <cit.>. The subband split and merge is based on PQMF and the number of subbands is set to 4. Window length and hop size are 20ms and 10ms respectively. The final submitted model has 12.49M parameters in total, where the parameters of the Resnet34 part is 6.63M. The parameters of the MetricGAN discriminator are not included here as it is discarded during inference. The multiply-accumulate operations (MACs) per second are 8.5G. The average real-time factor (RTF) per frame is 0.48, tested on Intel(R) Xeon(R) Gold 5218 CPU @ 2.30GHz using a single thread for ONNX inference testing. §.§ Results and analysis We first perform a quick ablation study based on the models trained using the 170-hour subset. Stage training test results on the oracle TEA-PSE2.0 model is shown in Table <ref>. We can see that the best performance is achieved when we first train the stage-one model, then freeze the stage-one model to train the stage-two model, and finally, jointly train the both stage models. We then discard the stage-one model and use the stage-two model only for a quick investigation, as shown in Table <ref>. We can see that the use of Fbank for speaker embedding fusion, multi-loss, and perceptual metric-based adversarial learning are also beneficial to the performance. Specifically, for the use of perceptual metrics, using MetricGAN-U to estimate DNSMOS SIG and BAK is better than estimating DNSMOS OVRL and PESQ. Here DNSMOS SIG and BAK are estimated each using a separate MetricGAN-U. Table <ref> shows the final subjective listening results of the challenge. Our system is tied for 1st place in Track 1 and ranked 2nd in Track 2 according to the final score. IEEEbib
http://arxiv.org/abs/2303.06677v1
20230312143706
Realization of all-optical underdamped stochastic Stirling engine
[ "Chuang Li", "Shaochong Zhu", "Peitong He", "Yingying Wang", "Yi Zheng", "Kexin Zhang", "Xiaowen Gao", "Ying Dong", "Huizhu Hu" ]
physics.optics
[ "physics.optics" ]
These authors contributed equally to this work. Research Center for Quantum Sensing, Intelligent Perception Research Institute, Zhejiang Lab, Hangzhou, 311121, China These authors contributed equally to this work. Research Center for Quantum Sensing, Intelligent Perception Research Institute, Zhejiang Lab, Hangzhou, 311121, China Research Center for Quantum Sensing, Intelligent Perception Research Institute, Zhejiang Lab, Hangzhou, 311121, China Research Center for Quantum Sensing, Intelligent Perception Research Institute, Zhejiang Lab, Hangzhou, 311121, China Research Center for Quantum Sensing, Intelligent Perception Research Institute, Zhejiang Lab, Hangzhou, 311121, China Research Center for Quantum Sensing, Intelligent Perception Research Institute, Zhejiang Lab, Hangzhou, 311121, China []gaoxw@zhejianglab.com Research Center for Quantum Sensing, Intelligent Perception Research Institute, Zhejiang Lab, Hangzhou, 311121, China []yingdong@zhejianglab.com Research Center for Quantum Sensing, Intelligent Perception Research Institute, Zhejiang Lab, Hangzhou, 311121, China Research Center for Quantum Sensing, Intelligent Perception Research Institute, Zhejiang Lab, Hangzhou, 311121, China State Key Laboratory of Modern Optical Instrumentation & College of Optical Science and Engineering, Zhejiang University, Hangzhou, 310027, China We experimentally demonstrate a nano-scale stochastic Stirling heat engine operating in the underdamped regime. The setup involves an optically levitated silica particle that is subjected to a power-varying optical trap and periodically coupled to a cold/hot reservoir via switching on/off active feedback cooling. We conduct a systematic investigation of the engine's performance and find that both the output work and efficiency approach their theoretical limits under quasi-static conditions. Furthermore, we examine the dependence of the output work fluctuation on the cycle time and temperature difference between the hot and cold reservoirs. We observe that the distribution has a Gaussian profile in the quasi-static regime, whereas it becomes asymmetric and non-Gaussian as the cycle duration time decreases. This non-Gaussianity is qualitatively attributed to the strong correlation of the particle’s position within a cycle in the non-equilibrium regime. Our experiments provide valuable insights into stochastic thermodynamics in the underdamped regime and open up new possibilities for the design of future nano-machines. Realization of all-optical underdamped stochastic Stirling engine Huizhu Hu March 30, 2023 ================================================================= Thermodynamics deals with the relations between heat, work, temperature, entropy, and energy <cit.>. At its heart, is the heat engine, operating periodically between two reservoirs with different temperatures. Unlike its macroscopic counterpart that the deterministic classical thermodynamic laws can very well describe, a heat engine of micro- or nano-size will undergo visible fluctuations <cit.>, which makes it behave in a stochastic manner. In this regime, central concepts of thermodynamics such as the exchanged heat, the applied work, and the entropy can be meaningfully defined on the level of individual trajectories <cit.>. These fluctuating quantities extend the laws of macroscopic thermodynamics and give birth to the so-called stochastic energetics <cit.>. With the advancement in the fabrication of microscopic mechanical devices, significant progress in the study of stochastic heat engines, both theoretical <cit.> and experimental <cit.>, have been witnessed during the past decade. A promising candidate for the experimental investigation of the stochastic thermodynamics <cit.> is the levitated optomechanical system (LOS) <cit.>, where optical tweezers allow us to apply a fast and accurate control to the particle captured and record its spatial trajectory in real-time <cit.>. After a full description of a colloidal stochastic heat engine <cit.> given by Schmiedl and Siefert, Blickle and Bechinger realized a stochastic Stirling engine experimentally <cit.> for the first time. The efficiency of the Stirling engine is fundamentally limited by the isochoric steps, which make the cycle inherently irreversible. To overcome the limitations of the Stirling cycle, Martinez et al. implemented a Brownian Carnot cycle <cit.> with an optically trapped colloidal particle by creating an effective hot temperature bath with fluctuating electromagnetic fields, which allowed precise control over the bath temperature that is synchronized with the change of the trap stiffness and therefore a realization of an adiabatic ramp. So far, the implementations of stochastic heat engines (SHEs) with a levitated microscopic particle are all in colloidal systems where the particle is overdamped <cit.>. The SHEs in the underdamped regime have been less investigated experimentally yet. We know that an analytic treatment of optimal protocols is possible in the overdamped case because the dynamics can be described by a simplified equation in terms of the slow position variable <cit.>. In contrast, this is not possible in the underdamped case, where the position and velocity variables cannot be separated. As a result, the optimization of an underdamped SHE for maximizing its performance is much more complicated than an overdamped one. Theoretical analysis showed that rapid changes in the trapping frequency were desired to improve the power output and the efficiency <cit.>. More importantly, the investigations of much more isolated systems provide a path toward the future realization of quantum heat engines <cit.> or quantum refrigerators <cit.> in LOS and it has been shown that super Carnot efficiencies can be attained by clever reservoir engineering <cit.>. Inspired by a scheme <cit.> proposed by Dechant et al., we present an experimental realization of an all-optical Stirling engine in the underdamped regime. The experimental setup is illustrated in Fig. <ref>(a). A charged silica particle of diameter 153.6 nm is levitated in a single-beam optical trap at the pressure of p = 1.0 mbar. The damping rate due to the collision with residual gas molecules is experimentally measured as Γ_th/2π = 1.45 kHz. The optical potential is approximately harmonic with a power-dependent stiffness. We thus use an acousto-optic modulator (AOM) to linearly change the optical trap power resulting in a linear variation of the optical trap stiffness. The resulting mechanical oscillation frequency of the particle Ω/2π ranges from 145.3 to 160.4 kHz. The surrounding gas environment coupling to the center of mass (COM) motion of the particle acts as the high-temperature reservoir (hot bath). The active feedback cooling, using electric fields to exert a force on the particle’s motion and providing an additional feedback damping rate Γ_fb, creates a controllable low-temperature reservoir (cold bath). A quadrant photodetector (QPD) monitors the motion of the particle so that its position trajectory can be accurately recorded. To realize a stochastic Stirling cycle consisting of two isothermal and two isochoric strokes, we employ a signal generator (SG) to periodically output two synchronized signals, which are inputted into the AOM to change the optical trap power and into the switch to turn on/off the feedback cooling, respectively. The detail of the experimental setup and protocol can be found in the caption of Fig. <ref> and the Supplemental Material (SM). The model.—As described above, the particle's oscillation frequency is much larger than the damping rate. Therefore, its COM motion is governed by the one-dimensional underdamped Langevin equation <cit.> (we solely focus on the particle's motion along the x axis throughout this work), v̇ + Γ v + k(t) x = √(2 k_B T Γ /m )ξ(t), where x and v = ẋ respectively denote the position and velocity of the particle. k(t) = m Ω^2 denotes the optical trap stiffness with the particle's mass m and frequency Ω. Γ = Γ_th +Γ_fb is the total damping rate, T is the effective COM temperature, and k_B is the Boltzmann constant. The quantity ξ(t) is a centered Gaussian white noise with ⟨ξ(t)ξ(t^')⟩ = δ(t - t^'). A Stirling cycle consisting of two isochoric and two isothermal strokes will be realized in the following steps: * Expansion. Starting from the system in thermal equilibrium with the hot bath at the temperature T_h, it undergoes an isothermal expansion with stiffness k(t) decreasing from k_max to k_min during a time period τ_h. The particle keeps the connection to the hot reservoir via the coupling Γ_th during this stroke. To make sure that the stroke is isothermal, we require that the duration τ_h≫ 1/Γ_th and the oscillator therefore always equilibrates with the reservoir. * Heat emission. The temperature of the reservoir is reduced to T_c = Γ_thT_h/(Γ_th + Γ_fd) by switching on the feedback cooling. In this stroke, the particle is instantaneously connected to the cold bath while the stiffness retains constant k(t) = k_min lasting a time duration of τ_hc until its effective temperature of COM equilibrates to T_c. * Compression. The system undergoes an isothermal compression with the stiffness k(t) increasing back to k_max during a time duration τ_c. In this stage, the oscillator always keeps the connection to the cold bath at the constant temperature T_c. * Heat absorption. The feedback cooling is switched off so that the particle is connected to the hot reservoir again and reaches back to the equilibrium state at the beginning of the cycle in a period of τ_ch. The stiffness keeps constant k(t) = k_max during this stroke. The total duration period of a cycle is then given by τ_cyc = τ_h + τ_hc + τ_c + τ_ch. Here, we set the four strokes with the equal duration τ_s, i.e., the cycle time τ_cyc = 4τ_s. The schematic representation for a cyclic process of the Stirling engine and the change of the trap stiffness and the effective COM temperature versus time is shown in Fig. <ref> (b) and (c), respectively. One can draw an analogy between the particle in an optical trap and an ideal gas inside a piston, where the trap stiffness, or equivalently the trapping frequency, is analogous to the inverse of an effective volume while the variance of the particle position is seen as an effective pressure. Under this analogy, thermodynamic quantities can be extracted from the particle's positional fluctuations in the framework of stochastic thermodynamics. The total energy of the particle at time t reads U(t) = 1/2 m v(t)^2 + 1/2 k(t) x(t)^2. The increment of the energy dU can thus be divided into two parts where the output work is defined as dW = 1/2dk/dt x^2 dt and the heat exchanged with the environment is defined as dQ = m v dv/dtdt + kxdx/dtdt. Integrating Eq. (<ref>) along a stochastic trajectory yields the time-dependent work during a time duration τ = t_f - t_i as W(τ) = 1/2∫_t_i^t_fd k(t)/d t x(t)^2 dt, where t_i (t_f) is the initial (final) time. Meanwhile, the work W, heat Q, and inner energy U satisfy the stochastic first-law-like energy balance Δ U = W + Q for any single stochastic trajectory. The experiments.—We experimentally studied the performance of the Stirling engine in the underdamped regime. The optical stiffness linearly change in the range from k_min = 3.29 aN/μm (∼Ω_min/2π = 145.3 kHz) to k_max = 3.63 aN/μm (∼Ω_max/2π = 160.4 kHz). The effective COM temperature of the levitated particle is experimentally determined as T_h = 320 K and T_c = 65 K, respectively. Here, the temperature equilibrated to the hot bath is a little bit larger than the room temperature T_0 = 300 K due to the heating effect of the trapping laser <cit.>. Figure <ref>(a-b) show the mean output work W and the mean efficiency η = -W/Q varying with the cycle time τ_cyc, respectively. The work and heat are both in units of k_BT_0 throughout this paper. One can see, both the mean output work W and the mean efficiency η monotonically increase with the cycle time and finally converge to the theoretical limit W_qs = -1/2T_h - T_c/T_0lnk_max/k_min <cit.> and the Carnot efficiency η_qs = 1 - T_c/T_h = 0.79 respectively in the quasi-static regime with an infinite long cycle time. By numerical simulation, we also figured out that the maximum power P = -W/τ_cyc will reach its maximum value <cit.> at τ_cyc≈ 0.04 ms. It is not observed since 0.04 ms is much less than the shortest cycle time τ_cyc = 4 ms that is allowed in our experiments. The theoretical and simulation results and the detailed discussion of the power are presented in the SM. Figure <ref> (c-d) show the probability distributions of the output work W and the absorbed heat Q in the quasi-static regime for τ_cyc = 400 ms. As expected, strong fluctuations can be seen in the output work and the absorbed heat. We compare the measured output work distribution with a Gaussian distribution with the same mean and variance in Fig. <ref>(c). We also calculated the Jensen-Shannon divergence (JSD) <cit.> between them as D_JS = 0.0043 (see the SM), which confirms that the output work distribution in the quasi-static regime is Gaussian. We further explore the output work distribution for different cycle times, as shown in Figure <ref>(a-c). Interestingly, we found that the profile of the work distribution becomes asymmetric as we decrease the cycle time. To quantify the symmetry breaking of work distribution, we define a symmetric index s simply as s = |N_la - N_le|/N_la + N_le, where N_la (N_le) is the count of cycles in which the value of the output work is larger (less) than the mean. The index s ranges from 0 (corresponding to a symmetric distribution) to 1 (corresponding to a fully asymmetric distribution). Fig. <ref>(d) shows the symmetric index s and the JSD between the measured work distribution and the Gaussian distribution with the same mean and variance versus the cycle time. Both of them increase as the cycle time decreases, indicating that the output work will deviate from the Gaussian distribution <cit.> when the engine operates under non-quasi-static conditions. Moreover, we found that the work distribution profile also depends on the temperature difference Δ T = T_h - T_c between the hot and cold baths. Figure <ref>(e-g) shows how the work distribution changes with varying the temperature difference Δ T for the short cycle time τ_cyc = 4 ms, and the index s and JSD versus the temperature difference is plotted in (h). The results show that the work distribution with a short cycle time can change from asymmetric to symmetric with decreasing temperature differences. However, the symmetric distribution is still non-Gaussian with a visible JSD. Discussions and conclusions. The position of an oscillator driven by a random Brownian force is a random variable. In the quasi-static regime, the equipartition theorem states that the stochastic position at different instants should be a Gaussian distributed random variable with the variance ⟨ x^2(t)⟩ = k_BT/k(t). Figure <ref>(a) shows the position variance ⟨ x^2(t) ⟩ (ensemble average) versus time during a full cycle in the quasi-static regime, and the inset shows the measured position distribution at different instants. They agree well with the prediction from the equipartition theorem. As a result, the output work W calculated via Eq. (<ref>) would be the integration (or sum) of squares of a series of Gaussian distributed random variable x(t). It is well known that, for a large number of independent random variables with an arbitrary but identical distribution, the sum of them will tend toward a Gaussian distribution. However, the distributions of x^2(t) at different times are obviously not the same for the varying stiffness k(t). To understand the work distribution observed in the experiments, we numerically investigated the distribution of the sum of the squares of a sequence of independent Gaussian random variables {X_1, X_2, ... X_2N} with zero mean ⟨ X_i ⟩ = 0 and varying variance ⟨ X_i^2⟩ = T_i/k_i, where T_i and k_i are two independent parameters respectively. An analogy to the isothermal strokes in the Stirling cycle, we set T_i to be constant while k_i scale linearly with i, i.e., T_i = 1, k_i = (β - 1)i + N - β/N - 1 for i ≤ N and T_i = α, k_i = 1- β/Ni + 2β - 1 for N < i ≤ 2N, where α = T_c/T_h and β = k_min/k_max denotes the temperature ratio and stiffness ratio, respectively. Figure <ref> (b) show the distribution of the square sum Y = ∑_i^2N X_i^2 for the same stiffness and temperature in Fig. <ref> (c), which indicates that the sum of the squares of a sequence of independent Gaussian-distributed random variables with varying variances is still a Gaussian random variable, and explains the experimental results we observed under the quasi-static condition. As the cycle time decreases, the equipartition theorem is no longer held due to the fast-varying of stiffness. In this situation, not only is the consistency of the distribution but also the independence of variables is disrupted. We calculated the autocorrelation function C(t,t+Δ t) = ⟨ x(t)x(t + Δ t)⟩ of the particle displacement during the expansion stroke. For a given Δ t, the correlation function oscillates in the time domain with an amplitude C_amp(Δ t) (See SM for details), which is shown in Fig. <ref> (c) for different cycle times. One can see that the correlation time is about 1 ms in all three cases, which is comparable to the duration of the expansion (compression) stroke in the case of rapid stiffness variation. We can thus expect that the correlation between the particle's positions at different instants will play an important role and the non-Gaussian distributed output works are therefore observed when the cycle time is set short. In summary, we experimentally realized a nano-sized stochastic Stirling engine based on a levitated optomechanical system, where a silica particle serving as the working medium was subjected to power-varying optical tweezers and coupled periodically to the cold (hot) reservoir created by switching on (off) feedback cooling. The experimental performance of the Stirling cycles including the work, heat, and efficiency is presented. Our experimental results show that the output work distribution of the underdamped stochastic Stirling engine is Gaussian in the quasi-static regime, and it becomes more and more non-Gaussian as the cycle time decreases. This non-Gaussianity is qualitatively attributed to the strong correlation of the particle's position within a cycle in the non-equilibrium regime. Unfortunately, the exact probability distribution function of the output work for a fast stiffness variation in the underdamped regime is yet unknown <cit.>. The experimental study on the SHE in the underdamped regime has just begun. There are still a lot of open questions waiting to be answered. In this sense, the present work can be regarded as a preliminary exploration in this field. In the following, with an upgraded electronic controlling system, more complex investigations of the underdamped SHE such as the optimal efficiency at the max power, or dynamical behaviors of Otto cycles and Carnot cycles will be further explored. Integrating together with the ground state cooling <cit.> techniques demonstrated recently, our system could be directly turned into the platform for investigating real quantum mechanical nano-machines. Acknowledgments. This work is supported by the Major Scientific Research Project of Zhejiang Lab (2019 MB0AD01), the Center initiated Research Project of Zhejiang Lab (Grant No. 2021MB0AL01) and Zhejiang Provincial Natural Science Foundation of China (Grant No. LQ22A040010). X.G acknowledges support from the Research Project for Young Scientists of Zhejiang Lab (No. 2020MB0AA04), Zhejiang Laboratory research Found (No. 2021MB0AL02), and the Major Project of Natural Science Foundation of Zhejiang Province (No. LD22F050002). § SUPPLEMENTAL MATERIAL § THE EXPERIMENTAL SETUP AND PROTOCOL. The experimental setup.—The experimental setup is displayed in Fig. 1 in the main text. A single-beam optical trap is created inside a vacuum chamber by a laser beam of wavelength 1064 nm. The beam passes through an acousto-optic modulator (AOM, Gooch & Housego, 3080-199) that can adjust the optical trap power, and then is focused by a microscope objective (OBJ) of numerical aperture NA = 0.8. A silica particle of diameter 153.6 nm is levitated in the center of the optical trap at a pressure of 1 mbar and the damping rate due to collision with residual gas molecules is experimentally determined to be Γ_th/2π = 1.45 kHz. The optical potential is approximately harmonic, and the trap (mechanical) stiffness is proportional to the trap power, which can be altered by changing the radio frequency (RF) driving voltage of the AOM. Throughout our work, we restrict our focus to the motion of the particle along the x axis. By adjusting the driving voltage of the AOM, we vary the resulting mechanical oscillation frequency of the particle along the x axis, Ω/2π, from 145.3 to 160.4 kHz. Since the gas damping rate Γ_th is much smaller than the mechanical frequency, the oscillator operates in the underdamped regime. We measure the motion of the particle along the x direction by detecting the scattered light using a quadrant photodetector (QPD) with a delay of approximately 200 ns. The motion of the particle's center of mass (COM) is influenced by the surrounding gas environment, which acts as a high-temperature reservoir (hot bath). To create a low-temperature reservoir (cold bath), we utilize an active feedback cooling scheme to cool the COM motion of the particle. In this scheme, we exert a Coulomb force on the charged particle by applying a voltage to a pair of electrodes enclosing the trap. The x-axis motion signal is sent through a bandpass filter (BPF, SRS, SIM965, 1 MHz bandwidth) and a derivative circuit d/dt (Zurich Instrument MFLI, delay ∼ 800 ns, noise ∼ 43 nV/Hz^1/2) to provide a feedback signal proportional to velocity. This velocity-dependent feedback signal is then sent to an amplifier (AMP, noise ∼ 14 μV/Hz^1/2) that modulates the voltage of the electrodes to cool the x-motion electrically. The noise resulting from the feedback cooling is approximately S_fd≈ 3× 10^-14 m/Hz^1/2, which is much lower than the thermal noise S_th≈ 9× 10^-12 m/Hz^1/2. Using this feedback cooling, we can create a cold bath with the particle's COM temperature ranging from 30 to 300 K. The experimental protocol of Stirling cycle.—In order to implement the Stirling cycle, it is necessary to synchronize the changes in both the optical trap stiffness and the feedback cooling (see Fig. 1(b-c) in the main text). To accomplish this, we employ a two-channel programmable signal generator (SG, Keysight, 33500B) that periodically outputs two synchronized signals. One signal (AOM signal) is sent to the AOM to linearly change the optical trap power, while another signal (switch signal) is sent to a switch (delay ∼ 140 - 180 ns) in the feedback loop to periodically turn on/off the feedback cooling. Figure <ref> shows the AOM and switch signals as a function of time. The driving voltage of the AOM is inversely proportional to the optical trap power, resulting in a linear decrease (increase) in the optical trap stiffness during the first (third) stroke. The switch signal is a Transistor-Transistor Logic (TTL) signal, with the feedback cooling turned on (off) when the signal is set to 2 (0). § THE THERMODYNAMIC QUANTITIES IN THE QUASI-STATIC REGIME. This section presents an analytical calculation of the average thermodynamic quantities, such as work, heat, and efficiency, in the quasi-static limit. In this limit, the cycle or stroke duration time is much longer than all other relevant time scales, including the thermal relaxation time. As a result, when the protocol is changed, the system immediately adjusts to the equilibrium state corresponding to the new protocol value. During the first isothermal stroke, the mean work done on the particle is equal to the free energy change Δℱ before and after the expansion, which can be expressed as W_h = Δℱ_h = k_BT_h/2lnk_min/k_max = - k_BT_h/2lnk_max/k_min. Similarly, the mean work done on the particle during the second isothermal stroke is given by W_c = Δℱ_c = k_BT_c/2lnk_max/k_min. Since the two isochoric strokes in the Stirling cycle, with constant stiffness k, do not contribute to the work W, the total output is W = W_h + W_c = - k_B(T_h - T_c)/2lnk_max/k_min. We can express the output work in terms of the unit of k_BT_0 as W = - T_h - T_c/2 T_0lnk_max/k_min in the main text. To obtain the average absorbed heat in the isothermal expansion stroke, we first calculate the average internal energy change and then apply the first law. Since the particle always remains in thermal equilibrium at a temperature T_h during this process, the average internal energy change is Δ U_h = 0. Therefore, the average absorbed heat is given by Q = -W_h = k_BT_h/2lnk_max/k_min. Using the total output work and the absorbed heat, we can calculate the mean efficiency of the Stirling cycle as: η = - W/Q = 1 - T_c/T_h = η_Carnot, where η_Carnot is the efficiency of a Carnot cycle operating between the same two temperatures T_h and T_c. § NUMERICAL SIMULATION. The dimensionless Langevin equation.—We introduced dimensionless quantities Ω≡Ω/ω, t≡ω t, Γ_th/fd≡Γ_th/fd/ω, k≡Ω^2 = k/ω^2, and x = x/√(k_bT/mω^2), and obtain the following dimensionless Langevin equation, ẍ + (Γ_th + Γ_fd) ẋ + kx = √(2 Γ_th)ξ(t). Here, we set the initial maximum mechanical frequency to be the normalized unit, i.e., ω = Ω_max. According to the experimental parameters in the main text, the related dimensionless parameters for the simulation are given by Ω_min = 145.3/160.4≃ 0.906, Γ_h = Γ_th = 1.45/160.4≃ 0.009, and τ̃_cyc = Ω_maxτ_cyc. The damping rate of the cold bath is obtained via Γ_c = Γ_h/α with the temperature ratio α = T_c/T_h and T_h = 320 K, for instant, Γ_c≃ 0.044 for the cold bath temperature T_c = 65 K. The maximum power.—We numerically simulated the Stirling cycle via the dimensionless Langevin equation (<ref>), where the cold bath temperature is set to T_c = 65 K. Figure <ref> shows the mean output work and the mean power as a function of the cycle time. When the cycle time is very small, the mean output work is positive indicating the work done on the environment. As the cycle time increases, the mean output work also increases and gradually approaches the theoretical value of the quasi-static regime. The mean power initially increases to a maximum value, then begins to decrease, and eventually approaches 0. The maximum power is achieved when the cycle time τ_cyc = 0.04 ms. The experimental results are in good agreement with the numerical simulation. § JENSEN–SHANNON DIVERGENCE. Jensen–Shannon divergence (JSD) <cit.>, a symmetrized and smoothed version of the Kullback–Leibler divergence (KLD), is a quantity of measuring the similarity between two probability distributions. For two probability distribution P = (p_1, p_2, ..., p_n) and Q = (q_1, q_2, ..., q_n) with ∑_i^np_i = ∑_i^nq_i = 1, the JSD is defined as D_JS(P, Q) = D_KL(P, M) + D_KL(Q, M)/2, where M = (P + Q)/2 and D_KL(P, Q) = ∑_i^np_ilog(p_i/q_i) is the Kullback–Leibler divergence. The Jensen–Shannon divergence is bounded in 0 ≤ D_JS(P, Q) ≤ 1 and only vanishes when P = Q. § THE AUTOCORRELATION FUNCTIONS. The autocorrelation function (ACF) is a statistical tool that quantifies the degree of correlation between a variable and its past values. In our experiments, we use the ACF of the particle displacement x(t), which is calculated as C(t, t + Δ t) = ⟨ x(t)x(t + Δ t) ⟩, where Δ t represents the time lag and ⟨…⟩ denotes the average over all realizations. Figure <ref> displays the ACFs of the experiment data as a function of time t for different time lags and cycle time during the isothermal expansion stroke. It shows that the ACFs exhibit an oscillation behavior with time t. For all the cycle time (i.e., τ_cyc = 4, 40, 400 ms), the amplitudes of the ACFs decrease as the time lag τ increases, and they approach zeros for a time lag of τ = 0.9 ms. To more clearly decrease the dependence between the ACF and the time lag, we introduce the amplitude of the ACFs defined as follows: C_amp(Δ t) = max{|C(t, t + Δ t)|}. This new definition of the ACF focuses solely on the time lag, enabling us to analyze better how correlations change with the cycle time and time lag.
http://arxiv.org/abs/2303.07372v1
20230313180005
Dark matter from hot big bang black holes
[ "Avi Friedlander", "Ningqiang Song", "Aaron C. Vincent" ]
hep-ph
[ "hep-ph", "astro-ph.CO", "gr-qc" ]
avi.friedlander@queensu.ca Department of Physics, Engineering Physics and Astronomy, Queen's University, Kingston ON K7L 3N6, Canada Arthur B. McDonald Canadian Astroparticle Physics Research Institute, Kingston ON K7L 3N6, Canada songnq@itp.ac.cn Institute of Theoretical Physics, Chinese Academy of Sciences, Beijing, 100190, China Department of Mathematical Sciences, University of Liverpool, Liverpool, L69 7ZL, United Kingdom aaron.vincent@queensu.ca Department of Physics, Engineering Physics and Astronomy, Queen's University, Kingston ON K7L 3N6, Canada Arthur B. McDonald Canadian Astroparticle Physics Research Institute, Kingston ON K7L 3N6, Canada Perimeter Institute for Theoretical Physics, Waterloo ON N2L 2Y5, Canada If the temperature of the hot thermal plasma in the Early Universe was within a few orders of magnitude of the Planck scale , then the hoop conjecture predicts the formation of microscopic black holes from particle collisions in the plasma. Although these evaporated instantly, they would have left behind a relic abundance of all stable degrees of freedom which couple to gravity. Here we show that, upon minimal assumptions of a high reheat temperature and semiclassical black hole dynamics, this process could have produced the relic abundance of dark matter observed today for a particle mass anywhere in the range of 100 keV≲ m_dm < M_ Pl. The production mechanism does not rely on any additional assumptions about non-gravitational dark matter-Standard Model interaction. Dark matter from hot big bang black holes Aaron C. Vincent March 30, 2023 ========================================= Introduction — Big Bang cosmology describes an expanding universe originating from an initially hot, dense state. Its modern incarnation, the ΛCDM (dark energy-cold dark matter) concordance model, accurately predicts nucleosynthesis and recombination, and with only six free parameters, is able to reproduce the observed power spectrum of the Cosmic Microwave Background (CMB) and Large Scale Structure <cit.>. However, ΛCDM remains agnostic about the origins of these free parameters, and about the initial temperature of the Universe, —usually called the reheating temperature—so long as it is a factor of a few higher than what is necessary for nucleosynthesis. Most attempts to explain the relic abundance of dark matter, Ω_dmh^2, postulate some non-gravitational portal between the Standard Model and the dark sector, that could lead to signatures in the laboratory from scattering, annihilation or production at colliders (see Refs. <cit.> for reviews). However, as the evidence for dark matter comes via its gravitational effects alone, such a portal is not required. For instance, superheavy dark matter could have been produced from the vacuum fluctuations during or at the end of inflation <cit.>. Here, we show that if the Universe started at a very high temperature, within a few orders of magnitude of the Planck mass , the high-energy tail of the plasma's phase space distribution would lead to super-Planckian collisions which produce microscopic black holes. Because Hawking radiation produces all kinematically-accessible particles that couple to gravity, the subsequent rapid black hole evaporation can yield the measured value of Ω_dmh^2 with minimal assumptions, and without requiring the dark sector to communicate non-gravitationally with the Standard Model. The production of dark matter from black hole evaporation has been examined in Refs. <cit.>. Those scenarios rely on a well-established but “beyond-ΛCDM” black hole production mechanism, such as non-Gaussian field excursions during inflation. Alternatively, the production and evolution of primordial black holes from particle collisions has been studied in scenarios with exotic assumptions about the Planck scale <cit.>. In contrast to previous approaches, the scenario that we examine here only makes minimal assumptions about standard Big Bang cosmology, namely: 1) a high and 2) semiclassical arguments about the formation and evaporation of black holes remain valid near the Planck scale. These values are larger than allowed by the simplest slow roll single field inflation models. However, no model independent constraints exist on such values. The first upper bounds on ∼ should come from next-generation CMB observatories <cit.>. While little is conclusively known about the breakdown of semiclassical black hole physics, we will present results for different assumptions on the impact of quantum gravity on Planck-scale black holes including a demonstration that the qualitative results in this work hold even if the formed black holes are restricted to a regime where semiclassical arguments are expected to be trustworthy. We will show that dark matter can be produced gravitationally in the early Universe without requiring any non-gravitational interactions or exotic cosmology beyond the ΛCDM framework. While the absence of non-gravitational interactions would make direct detection challenging, there are observational signatures that arise from the requirement of a hot big bang. Furthermore, black hole evaporation yields a non-thermal dark matter velocity distribution. We will briefly return to these ideas in the final sections. Hereafter, we work in “particle physicist units” where c=ħ=k_B =1, but carries units of energy. Formation and evaporation of black holes in the primordial plasma — A black hole of mass is characterized by its horizon radius (). The hoop conjecture posits that when two particles with centre-of-mass energy √(s) come within an impact parameter 2r_h(√(s)) of each other, they will form a black hole of mass = √(s) <cit.>. If the collision is head-on and has no net charge, then = 2 /^2 and a neutral, non-rotating Schwartszchild black hole is formed. In reality, particle collisions will not be exactly head-on and many would have non-zero net charge. However, the majority of formed black holes would be non-extremal. While charged and rotating black holes would have altered evaporation rates leading to 𝒪(1) changes in the relic abundance, these are unlikely to affect our overall conclusions. Even if the plasma temperature is well below the Planck scale, the high-energy tail of the phase space distribution can extend to energies above . During radiation domination, the black hole collisional production rate per unit mass per unit volume is <cit.> dΓd=g_⋆(T)^2 ^5 T^22π^3 ^4[TK_1(/T)+2K_2(/T)], as long as is greater than , the minimum mass-energy required to form a black hole. Here, g_*(T) is the effective number of relativistic degrees of freedom in the plasma, which has a temperature T, and K_i(x) is the modified Bessel function of the second kind. A derivation of Eq.(<ref>) can be found in the Spp. Mat. <ref>. Because K_i(x) ≈√(π/(2x))e^-x for large x, in the limit of temperature T≪ the black hole production rate is approximately dΓd=g_⋆(T)^2 ^11/2 T^3/22√(2)π^5/2^4e^-/T , for >. A simple assumption is that ≃. However, in the absence of a theory of quantum gravity, arguments can be made about the minimum black hole mass being larger or smaller than . We will thus explore a range of values, and will find that it does not qualitatively affect our conclusions as long as it is within an order of magnitude of the Planck mass. The black holes thus formed will evaporate nearly instantaneously. Hawking's semiclassical arguments predict a distorted thermal spectrum comprising all degrees of freedom that couple to gravity. The evaporation rate is characterized by a Hawking Temperature T_H = ^2/8π <cit.>. The rate of mass loss from evaporation to species i can be compactly expressed as -d M_∙→ i/dt = g_i/2π^2∫E σ_i(r_hE)exp(E/T_H)∓ 1p^2dp , where the (+) sign applies to fermions and the (-) sign to bosons. g_i is the number of degrees of freedom in species i, and E and p are respectively the energy and momentum of the evaporation product. The greybody distortion factors σ_i encode the probability of a particle escaping to “infinity”, and are computed via partial-wave scattering. Here, we use values provided by <cit.> and compiled in  <cit.>. Going forward, we take the limit where the masses of the evaporation products m_i are much lower than T_H, which will hold for m_i ≪.  (<ref>) then integrates to a constant times T_H^2, and the total evaporation rate is a sum over all evaporation species: d M_∙/dt = ∑_i d M_∙→ idt=-∑_ig_i α_i ^2 = -α_ tot T_H^2, where the α_i are constants that depend only on the spin of species i. These are provided in Tab. <ref> for spin 0, 1/2 and 1 particles, along with α_tot, which is simply a sum of the α_i weighted by the number of degrees of freedom in each sector in the Standard Model. Graviton (spin-2) production is suppressed, and does not affect the value of α_tot to the precision that we quote. The number of particles produced is found in a near-identical way to Eqs. (<ref>-<ref>), but dropping the factor of E in the integrand of Eq. (<ref>). At high T_H, this yields a production rate of particles of species i per black hole: dN_i/dt = g_i β_i , where the β_i are factors that again depend only on the spin; these are given in Tab. <ref>. The total number of particles of each species produced by a black hole of initial mass is thus N_i = ∫_^0 ddN_i/dt(d /dt)^-1 = 4π g_iβ_i ^2/α_ tot^2 . Relic abundance of dark matter — We now specialize to the case of interest, the production of a stable dark matter species with g_dm degrees of freedom and mass m_dm≪ that is thermally decoupled from the primordial plasma. Dark matter production shuts off exponentially as the Universe cools, so the number density of dark matter particles at T = T_RH is found, to good accuracy, by convolving the black hole production rate with N_dm over all temperatures: n_dm() ≈∫_^0 dT(dT/dt)^-1∫_^∞ d N_dmdΓd . During radiation domination, dT/dt=-HT and the Hubble parameter is given by the Friedmann equation, H^2=8πρ_r/(3^2), where the radiation density is ρ_r=π^2g_* T^4 / 30. The integral in  (<ref>) can be performed analytically, yielding n_dm()≈3√(5/2) g_*()^3/2 g_dmβ_dm/π^3α_ tot^8/^5 f_dm(T_RH/), where the dependence on is encoded by the function f_dm(x). To lowest order in /, this is f_dm(T_RH/) ≃(/)^3/2 e^-/ . Going forward, we will nonetheless use the full (but less intuitive) analytic result of the integral in (<ref>). The full expression as well as a comparison with Eq. (<ref>) can be found in Supp. Mat. <ref>. Finally, if the dark sector is fully decoupled, it only redshifts due to adiabatic expansion, and the conservation of entropy yields a present-day dark matter density: Ω_dm = g_*s(T_0) T_0^3 n_dm() m_dm/g_*s() ^3 ρ_c , where g_*s is the effective number of degrees of freedom contributing to entropy, T_0 is the CMB radiation temperature today, and ρ_c is the present-day critical density. The abundance of DM thus scales as: Ω_dm h^2 ∼ 0.1 g_dmm_dm/10 keV(/)^5 (/10 )^3/2 e^-/10 , as long as g_dm is significantly smaller than the total number of Standard Model degrees of freedom.  <ref> shows the relic abundance of dark matter with different masses as a function of the reheating temperature. Because the Hawking temperature is much higher than the dark matter masses we are considering, production is relativistic and the process leads to a fixed number density for a given and . It is thus insensitive to the dark matter mass except for the linear scaling in  (<ref>). A larger / predictably yields more black hole production, and more transfer of energy into the dark sector. In the absence of a theory of quantum gravity, there is significant uncertainty about Planck scale black hole production and evaporation.  <ref> and <ref> therefore present results for a range of values of from 0.1 to 4 times the Planck mass, covering optimistic to conservative scenarios. At the higher end of this range, we have demanded that the evaporation timescale be much longer than the horizon formation rate, which amounts to a condition on the black hole entropy, and ensures that semiclassical assumptions remain valid <cit.>. However, sub-Planckian black holes have been discussed in the context of certain quantum gravity frameworks <cit.>, and it is furthermore not clear that horizon-formation is even necessary for this mechanism to have produced our dark matter, as pre-Hawking radiation which prevents total collapse could have very similar consequences as seen by an observer at “infinity” <cit.>.  <ref> shows the locations in the –m_dm plane that yield the observed abundance of dark matter today. Different line styles correspond to different assumptions for the minimum allowed black hole mass, while colours correspond to dark matter spin. Because of the exponential scaling with , dark matter with masses from a few keV to ≳ 10^18 GeV can be produced in the observed amount within only a comparatively small window of reheating temperatures 10^-3≲/≲ 0.1. A higher minimum mass for black hole formation predictably raises the required . For completeness we also consider the possibility that the evaporating black hole ends up as a stable remnant with ∼, the so called Planckeon[Also called “Planck Relics” or “Black Hole Remnants”, see Ref. <cit.> for a review.] <cit.>, which would act as cold dark matter, an alternative channel to evaporative production. Planckeon production by particle collisions during a hot big bang has been previously proposed <cit.>; we improve on their estimates by making use of the full differential black hole production rate, discussed above. We show in  <ref> and <ref> the Planckeon relic abundance and the corresponding reheating temperatures. In  <ref>, the Planckeon lines are horizontal because their mass is held fixed at m_dm=. These figures demonstrate that if Planckeons are stable, their abundance will always dominate over dark matter species produced from evaporation. Additional details on our calculation of the Planckeon abundance are presented in the Supp. Mat. <ref>. We note that if a significant fraction of Planckeons retains some electric charge their presence as the dominant dark matter component may be discovered or severely constrained in the near future <cit.>. Warm Dark Matter Constraints — The matter power spectrum is measured via the Lyman-α forest and places strong constraints on warm dark matter (WDM). This can be translated to a lower limit on the mass of dark matter from black hole evaporation. Because evaporation produces a distorted thermal spectrum, we follow the method of Ref. <cit.>, and demand that the average dark matter velocity is at most the average velocity of WDM <cit.> with the minimum mass allowed by Lyman-α observations, m_ min^wdm. We obtained the average dark matter momentum at production by reproducing the procedure from previous sections, finding the total energy density of dark matter produced, ρ_dm, and noting that for relativistic particles the average momentum is simply ρ_dm/n_dm. If the dark matter momentum redshifts only due to Universe expansion, this yields a limit on m_dm: m_dm≳ 10^-5 GeVα_dm/β_dm( 0.1 /) ( m_ min^wdm/4 keV)^4/3 , where we take the WDM mass limit of m_ min^wdm = 4.65 keV <cit.>. These limits are shown as a shaded region in  <ref>, and constrain dark matter produced in black hole evaporation to be heavier than ∼ 100 keV. Large Reheating Temperature — In single-field slow-roll inflationary models, CMB meaasurements of the scalar power spectrum amplitude A_s and limits on the tensor-to-scalar ratio r set an upper limit on the energy density at the end of inflation of ρ_RH≲ (1.6×10^16  GeV)^4 <cit.>. However, these do not directly apply to some multi-field inflation models <cit.> or to non-inflationary theories of the early Universe such as a cyclic Universe <cit.> or String Gas Cosmology <cit.>. Because the mechanism discussed here can in principle produce a relic abundance of completely sterile dark matter, the high required is one of the few model-independent observational targets. A large reheating temperature would enhance the normally ^-2-suppressed background of gravitational waves with frequencies 𝒪(100  GHz) <cit.>. These would contribute to the effective number of relativistic degrees of freedom at recombination, N_ eff. While current N_ eff measurements do not constrain sub-Planckian values, the next generation of CMB experiments could probe ≲ <cit.>. Ultimately, if CMB experiments are able to constrain N_ eff down to the theoretical uncertainty limit δ N_ eff∼ 10^-3, then < 2×10^17 GeV could be within reach <cit.>, conclusively testing the microscopic black hole production of dark matter with ≥ and m_dm≲ 10^16 GeV as seen by the gray dot-dashed line in  <ref>. The high-frequency gravitational waves from and from black hole evaporation could be converted to microwaves in a strong magnetic field via the inverse Gertsenshtein effect <cit.>. However, even optimistic predictions lead to similar sensitivities <cit.> as N_ eff, and the technology remains largely undeveloped. Conclusions — We have presented a novel mechanism which allows for the gravitational production of dark matter that does not rely on any non-gravitational interactions with the Standard Model or specific inflationary physics. The only non-standard assumption required to achieve the observed relic abundance is a large ≳ 10^17 GeV. While the curves presented in  <ref> and <ref> rely on only the existence of Standard Model particles and one dark matter species, additional stable or unstable particle species between the Weak and Planck scales do not affect our conclusions, and are only a matter of bookkeeping in the values of g_dm, α_ tot, g_⋆, and g_⋆ S at . A more detailed treatment including the effects of black hole rotation and charge will yield a more accurate prediction of the values of and required to produce the dark matter observed today. As such greybody factors differ only by ∼ O(1-10), we do not expect a qualitative change in the overall conclusions. Observational handles on such a secluded sector produced at such early times remain few and far between. However, discovery of a large near-Planck scale will set a model-independent upper bound on the mass of any new stable particle which does not reach chemical equilibrium with the Standard Model. Subtle gravitational-wave observables may hint at such high reheating temperatures, and quantifying the impact of this non-thermal dark matter distribution on large scale structure may provide additional clues. Ultimately, the question of dark matter's true nature may be tied to the very early Universe and quantum gravity, and if we can pull on a single thread, it may reveal far more than expected. § ACKNOWLEDGEMENTS We thank Joe Bramante and Sarah Shandera for helpful discussions. AF is supported by an Ontario Graduate Scholarship. NS is supported by the National Natural Science Foundation of China (NSFC) Project No. 12047503. NS also acknowledges the UK Science and Technology Facilities Council for support through the Quantum Sensors for the Hidden Sector collaboration under the grant ST/T006145/1. ACV is supported by the Arthur B. McDonald Canadian Astroparticle Physics Research Institute, NSERC, and the province of Ontario via an Early Researcher Award. Equipment is funded by the Canada Foundation for Innovation and the Province of Ontario, and housed at the Queen's Centre for Advanced Computing. Research at Perimeter Institute is supported by the Government of Canada through the Department of Innovation, Science, and Economic Development, and by the Province of Ontario. Dark matter from hot big bang black holes Aaron C. Vincent March 30, 2023 ========================================= Dark matter from hot big bang black holes Supplementary Material Avi Friedlander, Ningqiang Song and Aaron C. Vincent § BLACK HOLE PRODUCTION RATE In a high-temperature relativistic plasma, the collisional black hole formation rate per unit volume per unit mass can be written as <cit.> dΓd=g_⋆(T)^2∫d^3k_1(2π)^3d^3k_2(2π)^3e^-k_1/Te^-k_2/Tσ()v_relδ(√((k^μ_1+k^μ_2)^2)-)Θ(-) , where we have assumed that the thermal distribution of parent particles is approximately Maxwellian because particles with k ≪ T are irrelevant for black hole formation. The step function Θ ensures E_CM≥. The integral can be evaluated if v_rel=|v⃗_1-v⃗_2|≃ 1 by defining θ as the angle between the incoming particles and integrating over all other angles. This results in: dΓd= g_⋆(T)^2 σ()/8π^4∫ dk_1 dk_2 dcos(θ) e^-k_1/Te^-k_2/T k_1^2k_2^2 δ(√(2k_1 k_2 (1-cosθ))-)Θ(-) . These integrals can be performed analytically resulting in a formation rate of dΓd=g_⋆(T)^2σ() 32π^4^3 T^2[TK_1(/T)+2K_2(/T)]Θ(-) , where K_i(x) is the modified Bessel function of the second kind. Finally  (<ref>) is produced by assuming that the production cross-section is equal to the geometric limit: σ() = 4 π^2 , § ANALYTIC EXPRESSIONS AND THEIR ACCURACY In deriving the relic abundance of dark matter we used three approximations: * Using the T ≪ limit for the production rate of black holes to transform  (<ref>) to  (<ref>). * Assuming black hole evaporation is independent of dark matter mass. This was used to determine the black hole evaporation rate (<ref>) and particle production rate (<ref>). * Presenting the analytic expressions only to lowest order in /. The results shown in the main text use the first two approximations, whereas the third is only used to present the analytic equation in a more intuitive form. In this section we demonstrate the range of validity of these approximations and present the full analytic form for dark matter number density. For the first approximation, we simplified the production rate of black holes, dΓ/d by assuming that the plasma temperature, T, is much smaller than the mass of the formed black hole, . In this limit, the Bessel function is K_i(x) ≈√(π/(2x))e^-x for large x. The left panel of  <ref> shows the black hole production rate at different temperatures. The full expression which accounts for the integral over the full Maxwell-Boltzmann distribution is shown as solid curves, whereas the dashed curves show the low-T approximation. By directly comparing the approximation (<ref>) to the full equation (<ref>), the fractional error, δ_Γ, from using this approximation is δ_Γ = 1 - √(2 /π T) e^-/T(TK_1(/T)+2K_2(/T))^-1 . The right panel of  <ref> shows how the fractional error depends on the ratio of plasma temperature to black hole mass. As long as ≳ 20 T, the error on the black hole production rate is less than 10%. For black hole production the black hole mass will always be larger than which is typically close to and the plasma temperature is always below the Planck scale. This makes the low-T limit a viable approximation. The second approximation we use is that the black hole evaporation is independent of any particle's mass, which is true as long as all species are produced relativistically, i.e. m_i≪. This results in the evaporation rate being proportional to ^2 as expressed in  (<ref>) and the particle number production rate being proportional to ( <ref>). Without this assumption, the constants α_i and β_i would be replaced by functions that depend on m_i/. The validity of our results only start to break down when the dark matter mass comes within an order one factor of the Planck scale. Finally, Eq. (<ref>) only shows f(x) to first order, whereas the full expression is: f_dm(T_RH/) = 1/8[(/)^8 Γ(17/2, /) - √(π)( 1 - erf(√(/)) )] . which we have used to produce the results of Figs. <ref> and <ref>. Here, Γ(s,x) is the upper incomplete Gamma function and erf(x) is the error function.  <ref> compares three methods for determining relic abundance of dark matter from evaporating black holes: the analytic expression using  (<ref>) used to produce the main text's results is depicted as solid red curves, the lowest order analytic expression using  (<ref>) is depicted as dashed red curves, and the most accurate result found by numerically solving all integrals without the small / or small m_dm/ approximations. In all cases the lowest order analytic approximation underestimates the relic abundance while maintaining the same qualitative dependence on dark matter mass and reheating temperature. These three methods are compared for largest and m_dm values shown in  <ref>. The upper left panel of  <ref> shows the relic abundance of fermionic dark matter with m_dm = 10^-5 GeV. The reheating temperature required to produce the observed relic abundance is ∼ 0.1. As shown in  <ref>, the small T/ approximation under-predicts the number of black holes that form in the early Universe. This in turn leads to under-predicting the relic abundance of dark matter produced by those black holes evaporating. For this set of parameters where ∼ 0.1, the relic abundance is underestimated by about 20%. However, the upper right panel shows that this error is significantly reduced to below 10% for lower reheating temperatures, ∼ 0.05, as is needed to produce the correct relic abundance for fermionic dark matter with m_dm = 1 GeV. The lower two panels of  <ref> demonstrate the success of the analytic approximation even for very heavy dark matter. As discussed above, when m_dm≳, the analytic approximation ignores the Boltzmann suppression and predicts more dark matter production than the more correct numeric calculation. The lower left panel shows that for m_dm = 10^17 GeV, the analytic approximation does not over-predict the dark matter abundance at all. For even heavier dark matter with a mass of m_dm = 10^18 GeV, the analytic approximation does start to over-predict the relic abundance of dark matter producing an error of about 7%. This is the upper limit shown in  <ref> for dark matter mass produced from black hole evaporation. § PLANCKEON ABUNDANCE If stable Planckeons are indeed the end result of black hole evaporation then one Planckeon would be produced for each black hole. The number density of Planckeons can be found using the same approach as for black hole evaporation, but using N_dm = 1 in the integrand of (<ref>). Following the same procedure as for dark matter from evaporation, this gives a number density of Plankeons: n_pl() ≈3√(5/2) g_*()^3/2/4π^4^6/^3f_pl(/), where the dependence is encoded in the function f_pl(x). For the full analytic dependence on we obtained: f_pl(T_RH/) = 1/6[(/)^6 Γ(13/2, /) - √(π)( 1 - erf(√(/)) )] . While this differs from the black hole evaporation case provided in  (<ref>), to lowest order the dependence is the same for Planckeons and dark matter from evaporation. Using f_pl≈ f_dm, we obtain: n_pl() ≈3√(5/2) g_*()^3/2/4π^4^6/^3(/)^3/2 e^-/ . The results of this expression are shown in purple in Figs. <ref> and <ref>.
http://arxiv.org/abs/2303.06990v1
20230313104416
Randomness-free Test of Non-classicality and An Experimental Quantum Advantage in Correlated Coin Tossing
[ "Zhonghua Ma", "Markus Rambach", "Kaumudibikash Goswami", "Some Sankar Bhattacharya", "Manik Banik", "Jacquiline Romero" ]
quant-ph
[ "quant-ph", "physics.optics" ]
Australian Research Council Centre of Excellence for Engineered Quantum Systems & School of Mathematics and Physics, University of Queensland, QLD 4072, Australia. Australian Research Council Centre of Excellence for Engineered Quantum Systems & School of Mathematics and Physics, University of Queensland, QLD 4072, Australia. goswami.kaumudibikash@gmail.com QICI Quantum Information and Computation Initiative, Department of Computer Science, University of Hong Kong somesankar@gmail.com International Centre for Theory of Quantum Technologies, University of Gdansk, Wita Stwosza 63, 80-308 Gdansk, Poland Department of Physics of Complex Systems, S.N. Bose National Center for Basic Sciences, Block JD, Sector III, Salt Lake, Kolkata 700106, India. Australian Research Council Centre of Excellence for Engineered Quantum Systems & School of Mathematics and Physics, University of Queensland, QLD 4072, Australia. Quantum entanglement leads to non-classical correlations certifiable through Bell tests. These tests require seed randomness—which is often costly and vulnerable to loopholes—for choosing the local measurements performed on different parts of a multipartite quantum system. We implement a technique of detecting the non-classicality of correlations that does not require seed randomness. Our test is semi-device-independent and requires only prior knowledge of the dimension of the parts. By producing specific correlated coins from pairs of photons entangled in their transverse spatial modes we also experimentally show a novel quantum advantage in correlated coin tossing. We establish the advantage by showing that the correlated coin state we obtain cannot be derived from any two 2-level classical correlated coins. The quantum advantage requires performing qubit trine positive operator value measures (POVMs) on each part of the entangled pair, thus also certifying such POVMs in a semi-device-independent manner. We firmly establish a quantum advantage in generating shared randomness which will be important for future multi-party quantum communications. Randomness-free Test of Non-classicality and An Experimental Quantum Advantage in Correlated Coin Tossing Jacquiline Romero March 30, 2023 ========================================================================================================== § INTRODUCTION Correlations play an integral role in information processing be it classical or quantum. Nature presents us with composite systems consisting of correlations among multiple subsystems, that cannot be explained if the subsystems are separable <cit.>. Characterizing such non-classical correlations have been central to quantum theory. Aside from testing Bell inequalities, recent developments in quantum technology provide us with the tools to detect non-classicality of correlations either as a pseudo-telepathy game <cit.> or in a communication task assisted by those correlations <cit.>. Both cases involve randomizing over the choice of inputs (measurement settings in the first case and preparation and measurement in the second case). In this work, we implement a new technique of detecting non-classical correlations, which does not require costly seed randomness for inputs. As a trade-off the experimenter is required to know only an upper bound to the dimension of the subsystems in use, hence the technique is semi-device-independent. Besides foundational interest, this new tool paves way for a cost-effective characterization of non-classical resources in quantum information and computation. We follow an operational approach by considering the task of generating shared randomness between two distant parties. Shared randomness (SR), also known as public/correlated randomness (as opposed to private randomness <cit.>) can be thought of as a joint probability distribution over random variables shared between two distant parties, that cannot be factorized. A well-known quantifier for such correlations is the mutual information, which serves as a bonafide measure for the distant parties agreeing on a string of measurement outcomes, given a common source <cit.>. Based on this quantity, shared randomness has been established as a useful resource in a number of tasks—privacy amplification, simultaneous message passing, simulation of noisy classical and quantum channels, secret sharing, simulation of quantum correlations, and Bayesian game theory, to name a few <cit.>. Generation of this resource from some physical system is, therefore, a question of utmost practical relevance. In an operational theory, SR, between two distant parties, can be obtained from a bipartite system prepared in some correlated state. In practice, the two parties could each be given a part of a correlated pair of classical or quantum coins which they could use for “coin-tossing". Each party performs a local operation on their respective parts of the composite system which results in correlated outcomes and hence SR. Here we demonstrate an experimental quantum advantage in generating SR between two parties. Particularly, we show that a two-qubit system prepared in a maximally entangled state can yield some desired SR, that otherwise is not possible to obtain from the corresponding classical system – two 2-level correlated classical coins which we call two-2-coin. This in turn establishes a non-classical feature of the two-qubit system which distinguishes it from its classical counterpart. Importantly, in our case, a single measurement – positive operator value measure (POVM) – is performed on each part of the entangled pair. Therefore, unlike Bell tests (see <cit.>), no randomization over the choice of local measurements is required for establishing this non-classicality. In the experiment, we use transverse-mode entangled photon pairs produced via degenerate spontaneous parametric down-conversion method as the two-qubit system. As it turns out the advantage is established through the payoff of a game played between two distant parties, which is different from mutual information between the random variables possessed by spatially separated parties <cit.>. The payoff is upper bounded by a threshold value when the parties share a two-2-coin state, whereas a better payoff can be obtained from a two-qubit singlet state even when the state is noisy. The resulting quantum advantage demands generalized measurements, viz. POVMs <cit.> on the local parts of the shared entangled state as it is not possible through local projective measurements, a.k.a. von Neumann measurements <cit.>, and then local post-processing of the outcome statistics. Payoff superseding the classical threshold value ensures that the measurements are not projective, and thus establishes a semi-device-independent test of generalized measurement. § PRELIMINARIES The operational utility of SR can be understood within the framework of resource theory. This resource theoretic framework, in fact, finds successful application in quantifying a variety of quantum resources (see <cit.> and references therein). The methodology of this highly versatile framework starts with partitioning the states into two disjoint groups: resource-free states and resourceful states. Based on natural restrictions placed on physical systems, a collection of operations is identified as free, which keeps the set of free states invariant. The framework then introduces the concept of resource monotones that put a quantitative order among the resourceful states. Sources of two random variables X and Y held by two distant parties, Alice and Bob, will not yield any SR whenever the joint probability distribution is in the product form, i.e., P(X,Y)=P(X)P(Y); here P(Z)≡{p(z) | p(z)≥0 & ∑_z∈ Z p(z)=1} denotes a probability distribution on Z. On the other hand, the joint source produces a nonzero amount of shared randomness when the distribution cannot be written as a product. The amount of SR can be faithfully quantified by the entropic function called mutual information, I(X:Y):=H(X)+H(Y)-H(X,Y); where H(Z):=-∑ p(z)log_2p(z) denotes the Shannon entropy associated with the source P(Z) <cit.>. A source P(Z) can be converted into a different one P^'(Z^') by a stochastic map S^Z→ Z^', which can be represented as a |Z^'|×|Z| matrix having non-negative real elements with the entries in each column adding up to unity <cit.>. While constructing the resource theory of SR, the free operations on a bipartite source P(X,Y) are given by the product of stochastic maps applied on the individual parts, i.e., instead of a general stochastic matrix of the form S^XY→ X^' Y^' only product of local stochastic matrices S^X→ X^' and S^Y→ Y^' are allowed as free. For convenience, the free operations can be represented as a tensor product, S^X→ X^'⊗ S^Y→ Y^' <cit.>. Physically SR can be obtained from a composite system prepared in some correlated state which is shared between distant parties. Alice and Bob perform local operations on their respective parts of the composite state resulting in random but correlated outcomes. Within the framework of generalized probability theory, the state space of such a bipartite system is described by Ω_A⊗Ω_B, where Ω_K denotes the marginal state space <cit.>. For instance, the state space of d-level classical system is the d-simplex, a convex set embedded in ℝ^d-1 having d number of extremal points. A coin-tossing experiment corresponds to the case d=2, and leads to the state space ℭ^2≡{(p(h),p(t))^T | p(h),p(t)≥0 & p(h)+p(t)=1}; p(h) and p(t) respectively denote the probability of obtaining outcome `head' and `tail'. The state space ℭ(2)≡ℭ^2_A⊗ℭ^2_B of two-2-coin shared between Alice and Bob is given by ℭ(2)≡{(p(hh),p(ht),p(th),p(tt))^T | p(ij)≥0, ∀ i,j∈{h,t}, & ∑_i,jp(ij)=1}. The quantum analogue of two-2-coin is a two-qubit system associated with the Hilbert space ℂ^2_A⊗ℂ^2_B, and the corresponding state space is given by 𝒟(ℂ^2_A⊗ℂ^2_B); where 𝒟(ℍ) denotes the set of density operators acting on the Hilbert space ℍ. From a quantum state, ρ_AB∈𝒟(ℂ^2_A⊗ℂ^2_B), Alice and Bob can generate shared randomness by performing local measurements on their respective parts (see Fig. <ref>). Generalizing the notion of ℭ(2), the state space of a two-d-coin is defined as, ℭ(d)≡{(p(11),p(12),⋯,p(dd))^T | p(ij)≥0, ∀ i,j∈{1,⋯,d}, & ∑_i,jp(ij)=1}. By ΘC(2→ d) we denote the set of two-d-coin states that can be obtained from the set of two-2-coin states ℭ(2) by applying free local stochastic maps S_A/B^2→ d on Alice's and Bob's part of the states. Similarly, ΘQ(2→ d) denotes the set of two-d-coin states obtained by performing d-outcome local measurements on Alice's and Bob's parts of the bipartite quantum states 𝒟(ℂ^2_A⊗ℂ^2_B). We are now in a position to present our first result as stated in the following proposition (proof deferred to the Appendix). For every d≥3, ΘC(2→ d)⊆ΘQ(2→ d)⊊ℭ(d), whereas ΘQ(2→ 2)=ℭ(2)=ΘC(2→ 2). As evident from this Proposition, a quantum advantage in SR generation is possible if we consider the generation of a higher dimensional correlated coin state starting from a lower dimensional correlated coin state. More particularly, a proper set inclusion relation ΘC(2→ d)⊊ΘQ(2→ d) for some d≥ 3 establishes a quantum advantage in correlated coin state generation, which we aim to experimentally establish through a game introduced in <cit.>. § NON-MONOPOLIZING SOCIAL SUBSIDY GAME The game 𝔾(n) involves two employees, Alice and Bob, working in an organization. There are n different restaurants {r_1,⋯, r_n} where the employees can choose to buy their daily drink. The organization follows a reimbursement policy to pay back the bill. For this, each day’s bills of Alice and Bob are collected for a log to calculate the joint probability P(ij) that Alice visits restaurant r_i while Bob visits restaurant r_j restaurant. Alice and Bob are reimbursed only if they end up going to different restaurants, i.e., r_i≠ r_j. At the same time, the game requires minimising the chance of one restaurant being boycotted, which would happen if Alice and Bob frequent two different but fixed restaurants. Hence we define the payoff as, $ℛ(n) =$min_i≠ j P(ij) to ensure that trade is distributed among all the restaurants. The employees are non-communicating. However, they possess a bipartite state with subsystems described by two-level systems and choose strategies with the help of free operations and accordingly try to maximize their payoff. If no restriction is put on the amount of SR, then both Alice and Bob can obtain the maximum payoff ℛ_max(n)=1/(n^2-n) <cit.>. The situation becomes interesting if restrictions are imposed on the amount of SR. Let, ℛ^ℭ(m)_max(n) denotes the maximum payoff achieved in 𝔾(n) when the parties are allowed to share a two-m-coin. For a pair (m,n) with m<n, the cases ℛ^ℭ(m)_max(n)<ℛ_max(n) open up a scope for quantum advantage. § QUANTUM ADVANTAGE IN CORRELATED COIN TOSSING Perfect success of 𝔾(3) game requires Alice and Bob to share a coin 𝒞_ac(3):=1/6(0,1,1,1,0,1,1,1,0)^T∈ℭ(3). As it turns out this particular coin cannot be generated from any of the coin states in ℭ(2) by applying free operations, and the optimal payoff Alice and Bob can ensure with a ℭ(2) coin is ℛ^ℭ(2)_max(3)=1/8<1/6=ℛ_max(3) (see Appendix). When allowed to share a two-qubit state Alice and Bob can start their protocol by sharing a noisy singlet state 𝒲_p:=p|ψ^-⟩⟨ψ^-|+(1-p)𝐈_2/2⊗𝐈_2/2,  p∈[0,1]; where |ψ^-⟩:=1/√(2)(|0⟩⊗|1⟩-|1⟩⊗|0⟩) with {|0⟩,|1⟩} denoting the eigenstates of Pauli σ_z operator. Both of them perform the trine POVM ℳ≡{e_i :=1/3(𝐈_2+n̂_i.σ)}:  n̂_i:=(sinθ_i,0,cosθ_i)^T,    θ_1=0, θ_2=2π/3, θ_3=4π/3, on their respective qubits. This results in a shared coin state 𝒞_p(3):=(f_p,s_p,s_p,s_p,f_p,s_p,s_p,s_p,f_p)^T∈ℭ(3), with f_p:=(1-p)/9, s_p:=(2+p)/18. Manifestly, this amounts to a payoff ℛ_p(3):=min_i≠ jP(ij)=(2+p)/18, if Alice and Bob visit the i^th restaurant when the i^th outcome clicks in their respective measurements. A quantum advantage is ensured whenever ℛ_p(3)>1/8. As it turns out quantum states 𝒲_p∈𝒟(ℂ^2⊗ℂ^2) becomes advantageous over the classical two-2-coin states ℭ(2) in playing the 𝔾(3) game whenever p>1/4, with perfect entangled state yielding the perfect success <cit.>. In view of an adversarial scenario, one may consider a third party Eve, and ask: is it possible for Eve to obtain information about P(X,Y), the joint probability distribution of the random variables X and Y, which are outcomes of Alice's and Bob's measurements? The answer to such a question definitely depends on the computational power of Eve and the constraints on the system shared between Alice and Bob. For the case where Alice and Bob achieve perfect success in the 𝔾(3) it is not possible for Eve to obtain information about P(X,Y), provided that Eve's power is restricted to process quantum systems only and Alice's and Bob's local subsystems' dimension are bounded from above (in our case dim=2). This follows from the observation that perfect success necessitates a maximally entangled two-qubit state to be shared between Alice and Bob, which cannot be correlated even classically with a third party. However, a general answer to the question of security in this setting for arbitrary success probability ℛ_p(3)>1/8, we leave as a question for future research. § EXPERIMENT The quantum coin used in the experiment is a pair of photons entangled in their transverse spatial modes produced via degenerate spontaneous parametric downconversion (SPDC) <cit.>. We show our experimental schematic in Fig. <ref>. A 405-nm continuous wave ultraviolet laser is incident on a 5-mm thick beta-barium borate (BBO) crystal (after passing through a pair of lenses of focal length 50 mm to control collimation, L1 and L2). While passing through the crystal, a UV photon is probabilistically downconverted to a pair of infrared photons of the wavelength of 810 nm. We block the remaining UV photons by a long-pass filter (LP) and separately image the infrared photons to two spatial light modulators (SLM1 and SLM2) by the combination of lenses L3 (f=150 mm), L4 (f=300 mm) and the beam splitter (BS). The SPDC process conserves optical orbital angular momentum (OAM), denoted by ℓ which can take on any integer value, and hence is theoretically infinite-dimensional (in practice, the apertures in the experiment limit the dimensionality). We use the SLMs to project the entangled state onto the qubit space with ℓ = ±3, i.e. the Bell state |ψ^+⟩ with |0⟩≡|ℓ=-3⟩ and |1⟩≡|ℓ=3⟩. Choosing a value for |ℓ| is a trade-off between the high extinction of the two qubit states and high coincidence count rates. As the number of measurements is limited to nine settings in our experiment, we prioritised higher extinction, while compensating for lower rates with longer integration times. The amplitude of the individual contributions of the two-qubit state is balanced via angle tuning of the BBO crystal <cit.>. We implement each element Π_i of the trine POVM of Eq.(<ref>) by programming an appropriate hologram onto the SLMs. The photons reflected from the SLM are coupled to single-mode fibres via lenses L5 and L6. The single-mode fibres are then connected to high-efficiency superconducting nanowire single-photon detectors (SNSPDs). The probability of a party going to a particular restaurant is proportional to the probability of the outcomes of the POVM which can then be obtained from photon counts. To get the joint probability, we record the coincidence count (C_ij) between Alice's ith and Bob's jth measurement outcome. This is done via a time-tagging module (TT20, Swabian Instruments) by integrating for 3600 seconds per data point. We normalise the coincidence counts to evaluate the joint probability P(ij) for Alice and Bob going to the i^th and j^th restaurant, i.e., P(ij)=C_ij/∑_i,jC_ij and evaluate the payoff of Eq. (<ref>). The entangled photons produced by SPDC are in the state |ψ^+⟩, which turns out to be the |ψ^-⟩ state when applied σ_z-rotation to one of the photons. Alternatively, we program the hologram for measuring σ_z Π_i σ_z for one of the photons, where Π_i's are the POVM-elements as defined in Eq.(<ref>). In the same manner, for the noisy case where the quantum coin is in the noisy state of Eq. (<ref>), instead of generating 𝒲_p, we add the noise to the measurements. The state 𝒲_p signifies that one of the subsystems of the singlet state |ψ^-⟩ undergoes a depolarising channel of strength p, i.e., the state remains unchanged with a probability (1+3p)/4 or undergoes any of the three Pauli rotations, each with a probability (1-p)/4. In our experiment, we introduce this depolarising channel in the measurement settings by implementing the POVM-elements Π_i's affected by the noise. This can be done by measuring {Π_i} with a probability of (1+3p)/4 and measuring {σ_j Π_i σ_j} with a probability of (1-p)/4, where {σ_j} represent the Pauli operations. Experimentally we implement this noisy POVM by performing a weighted time average on the relevant measurements. For a total acquisition time of T, we measure {Π_i} for a time duration of T(1+3p)/4 and measure {σ_j Π_i σ_j} for a time duration of T(1-p)/4 each. Thus the temporal degree of freedom is used as pointers for the Kraus-operators of the depolarising channel, and time-averaging erases this pointer information leading to a statistical mixture of the Kraus-operators <cit.>. Results obtained in the experiment are depicted in Fig. <ref>. The payoffs from the probabilities obtained from our experiment are all above the classical limit of 0.125 (dashed green line) for p>0.6, with the highest value being 0.150±0.003 obtained for the noiseless case. The experimental payoffs as a function of the noise (denoted by the depolarisation strength p are given by the blue dots. The ideal payoffs are given by the dash-dotted orange line (i.e. if we have a perfect maximally entangled state for the correlated coins, and perfect POVMs). The discrepancies between the experiment and the ideal case can be accounted for by our imperfect entangled state, the purple solid line is the expected payoff given the entangled state that we obtained from SPDC (with 97.0% fidelity to |ψ^+⟩ and purity of 95.2%). Nevertheless, our experiment firmly establishes a quantum advantage in correlated coin-tossing even with a significant amount of noise. Apart from establishing the advantage in genrating shared randomness our experiment also has another interesting implication as it constitutes a semi-device independent certification of non-projective measurement. § SEMI-DEVICE INDEPENDENT CERTIFICATION OF NON-PROJECTIVE MEASUREMENTS A quantum measurement is most generally described by a POVM, which is a collection of positive semidefinite operators {e_i}_i=1^k, with ∑_ie_i=𝐈_d, where 𝐈_d is the identity operator acting on the Hilbert space ℂ^d associated with the system <cit.>. Projective measurements are special cases, where the e_i's correspond to mutually orthogonal projectors π_i's. For a qubit, such a measurement can have only two outcomes: {π_i:=|ψ_i⟩⟨ψ_i| | ⟨ψ_i|ψ_j⟩=δ_ij   i,j=0,1}. A k-outcome POVM {e_i}_i=1^k will be called projective simulable if the outcome probabilities of the POVM elements can be obtained by coarse-graining the outcome probabilities of some d-outcome projective measurement for any d<k, i.e., ∀ i∈[1,k], e_i=∑_j P_ijπ_j, with {π_j}_j∈[1,d] being a d-outcome projective measurement and {P_ij}_i denoting probability distributions. For instance, the unsharp qubit measurement σ_n̂(λ)≡{1/2(𝐈_2±λn̂.σ) | λ∈(0,1)} can be simulated through the projective measurement σ_n̂≡{1/2(𝐈_2±n̂.σ)}, since 1/2(𝐈_2±λn̂.σ)=1+λ/4(𝐈_2±n̂.σ)+1-λ/4(𝐈_2∓n̂.σ) <cit.>. Not all POVMs are projective simulable and such measurements are known to be useful for a number of information-theoretic tasks <cit.>. Our non-monopolizing social subsidy game provides a way to semi-device independent certification of such qubit measurements. Denoting the set of all qubit projective simulable measurements as 𝔓𝔖(2), the result is formally stated as the following proposition. The maximum payoff ℛ_max^𝔓𝔖(2)(3) of the game G(3), achievable when the players are restricted to perform measurement from the set 𝔓𝔖(2), is upper bounded by ℛ_max^ℭ(2)(3). The claim of Proposition <ref> follows from the fact that given dimension d of the local sub-systems, the joint outcome probabilities obtained from any arbitrary quantum state and projective measurement are the diagonal elements of the density matrix (the state) when written in the same basis as the projective measurement. Thus the same statistics can also be obtained from a classically correlated (diagonal) state and measurement on the computational basis. A payoff higher than the maximum classical payoff, therefore, certifies that the qubit measurements performed by the players are not projective simulable <cit.>. We highlight that this certification technique is semi-device- independent, with the experimenter requiring only the knowledge of the local dimension (in this case d=2) of the state shared between them. As shown in <cit.> certification of POVM is possible even in a device-independent manner. However, Such a device-independent certification demands a violation of suitably designed Bell-type inequality, and hence requires each of the parties involved in the Bell test to randomly perform incompatible measurements on their part of the shared system. Note that the technique of <cit.> is a detection of non-projective measurement only if subsystem dimension d=2, which is further guaranteed by a CHSH violation. In contrast, our semi-device-independent scheme requires a single measurement device for each of the parties, getting rid of the seed randomness in inputs to the measurement devices. § DISCUSSIONS Tests of the quantum nature of physical systems are complicated by the requirement of randomness in the inputs to such tests. For example, the true randomness that quantum systems are known to exhibit can only be certified in a device-independent manner using Bell's theorem <cit.>, which in turn needs true randomness (however small) in the inputs <cit.>– at least qualitatively the argument is circular. The quantum advantage for shared randomness processing that we experimentally demonstrate in this paper is important as it provides a way to test non-classical correlations without the need for true randomness—the only test of this kind. Our method certifying both non-classical correlations and generalised measurements is semi-device-independent, requiring only knowledge of the dimensionality of the subsystem. We show that a two-qubit system prepared in a maximally entangled state can yield some desired correlated coin state that is impossible to obtain from any two 2-level correlated classical coins, leading to a higher payoff in our two-party game. In contrast to the advantage in randomness processing demonstrated in <cit.> which involves the probability distribution of one random variable, our work focuses on a new kind of quantum advantage in generating shared randomness between two distant parties, involving two random variables and their joint probability distributions. This latter quantum advantage will find use in distributed computational tasks, as in the example of the game we show here. Our work sets the stage for further studies of quantum advantage in multiparty shared randomness processing for qubits or even higher-dimensional systems. Given that randomness processing is an important computational primitive, we envision our work will be useful for information processing in future quantum networks. Acknowledgements– We thank Valerio Scarani for helpful discussions. SSB acknowledges support from the Foundation for Polish Science (IRAP project, ICTQT, contract no. MAB/2018/5, co-financed by EU within Smart Growth Operational Programme). This research was supported by the Australian Research Council Centre of Excellence for Engineered Quantum Systems (EQUS, CE170100009) and Discovery Project (DP200102273). MB acknowledges funding from the National Mission in Interdisciplinary Cyber-Physical systems from the Department of Science and Technology through the I-HUB Quantum Technology Foundation (Grant no: I-HUB/PDF/2021-22/008), support through the research grant of INSPIRE Faculty fellowship from the Department of Science and Technology, Government of India, and the start-up research grant from SERB, Department of Science and Technology (Grant no: SRG/2021/000267). JR is supported by a Westpac Bicentennial Foundation Research Fellowship. § APPENDIX § (A) PROOF OF PROPOSITION <REF> First, note that both ΘC(2→ d) and ΘQ(2→ d) consist of valid probability vectors in ℭ(d), by definition. Second, to show that ΘC(2→ d)⊆ΘQ(2→ d), we need to show that for every choice of classically correlated coin states in ℭ^2 and stochastic map S_A^2→ d and S_B^2→ d for Alice and Bob respectively, there exist two-qubit states in 𝔔(2) and d outcome qubit POVMs such that the final joint probability of Alice's and Bob's outcomes are the same in both cases. Let us denote an arbitrary state in ℭ(2) as a column vector 𝒞(2) =(a_00,a_01,a_10,a_11)^T, a_ij≥ 0,  ∀ i,j∈{0,1}, & ∑_i,j a_ij=1, and stochastic matrices S_A^2→ d=(P_k,i)_k= 0,…,d-1 i=0,1,    S_B^2→ d=(Q_l,j)_l= 0,…,d-1 j=0,1, P_k,i,Q_l,j≥0,  ∑_kP_ki=1=∑_lQ_lj. The resulting coin state is given by, 𝒞'(d)=S_A^2→ d⊗ S_B^2→ d [𝒞(2)]. The proof is by construction: the two-d-coin state 𝒞'(d) can also be obtained from the operators ρ=∑_i,j=0,1a_ij|ij⟩⟨ ij|,                e_A^k=∑_iP_k,i|i⟩⟨ i|,    e_B^l=∑_jP_l,j|j⟩⟨ j|,   𝒞'(d)=(Tr[ρ (e_A^k⊗ e_B^l)])_k,l. Now it only remains to show that ρ is a valid two qubit state and {e_A^k}_k=0^d-1 and {e_B^l}_k=0^d-1 are valid POVMs. First, we observe that Eq. (<ref>) implies that ρ≥0 (positive semi-definite), and Tr[ρ]=∑_i,j a_ij=1 (unit trace). From Eq. (<ref>) we have, e_A^k≥0, e_B^l≥0 for all k,l={0,…,d-1} (positivity) and ∑_ke_A^k=∑_k∑_iP_k,i|i⟩⟨ i|=∑_i(∑_kP_k,i)|i⟩⟨ i|=∑_i|i⟩⟨ i|=𝕀 (normalization). Similarly, ∑_le_B^l=∑_l∑_jP_l,j|j⟩⟨ j|=∑_j(∑_lP_l,j)|j⟩⟨ j|=∑_j|j⟩⟨ j|=𝕀. Hence, this construction leads to the fact that all d-outcome joint outcome probabilities obtained by Alice and Bob, when accessing a classical source of shared randomness of local dimension 2, can also be obtained with a two-qubit state and d-outcome POVMs. § (B) PLAYING THE GAME 𝔾(3) WITH A ℭ(2) COIN We will first show that the game 𝔾(3) can not be perfectly won if Alice and Bob share any of the two-2-coin state from the set ℭ(2). As already discussed in the main manuscript, the perfect winning strategy in 𝔾(3) game demands Alice and Bob to share the coin state 𝒞_ac(3)∈ℭ(3). Our aim is to show that the coin state 𝒞_ac(3) does not belong to the set ΘC(2→ 3), a subset of ℭ(3) that can be obtained from the set of two-2-coin states ℭ(2) by applying free local stochastic maps S_A/B^2→ 3 on Alice's and Bob's part of the states. Let they start with an arbitrary state in ℭ(2): 𝒞(2) =(a_00,a_01,a_10,a_11)^T, a_ij≥ 0,  ∀ i,j∈{0,1}, & ∑_i,j a_ij=1. Alice and Bob apply the following local stochastic maps on their respective part of the coin state, S_A^2→ 3= [ [ P_00 P_01; P_10 P_11; P_20 P_21 ]],    S_B^2→ 3= [ [ Q_00 Q_01; Q_10 Q_11; Q_20 Q_21; ]]; P_ij,Q_ij≥0,  ∑_iP_ij=1=∑_iQ_ij. The resulting coin state is given by, 𝒞'(3)= S_A^2→ 3⊗ S_B^2→ 3 [𝒞(2)]. Comparing the state in Eq. (<ref>) with 𝒞_ac(3):=1/6(0,1,1,1,0,1,1,1,0)^T, we obtain the following equations a_00 P_00 Q_00 + a_10 P_01 Q_00 + a_01 P_00 Q_01 + a_11 P_01 Q_01 = 0, a_00 P_10 Q_10 + a_10 P_11 Q_10 + a_01 P_10 Q_11 + a_11 P_11 Q_11 = 0, a_00 P_20 Q_20 + a_10 P_21 Q_20 + a_01 P_20 Q_21 + a_11 P_21 Q_21 = 0, a_00 P_00 Q_10 + a_10 P_01 Q_10 + a_01 P_00 Q_11 + a_11 P_01 Q_11 = 1/6, a_00 P_00 Q_20 + a_10 P_01 Q_20 + a_01 P_00 Q_21 + a_11 P_01 Q_21 = 1/6, a_00 P_10 Q_00 + a_10 P_11 Q_00 + a_01 P_10 Q_01 + a_11 P_11 Q_01 = 1/6, a_00 P_10 Q_20 + a_10 P_11 Q_20 + a_01 P_10 Q_21 + a_11 P_11 Q_21 = 1/6, a_00 P_20 Q_00 + a_10 P_21 Q_00 + a_01 P_20 Q_01 + a_11 P_21 Q_01 = 1/6, a_00 P_20 Q_10 + a_10 P_21 Q_10 + a_01 P_20 Q_11 + a_11 P_21 Q_11 = 1/6. Now the following cases are possible: Case (A): Let us assume a_ij≠ 0 for all i,j. From Eq. (<ref>) we must have the following minimum sets of parameters with zero value: (A0): {P_00,P_01}=0,     (A1): {Q_00,Q_01}=0. Condition (A0) contradicts Eq. (<ref>) since it implies that the right-hand side of Eq. (<ref>) is zero. Similarly, conditions (A1) contradicts Eq. (<ref>). Case (B): Let us assume a_00=0 and a_ij≠ 0 for ij≠ 00. From Eq. (<ref>) we must have the following: (B0): {P_00,P_01}=0,     (B1): {P_01,Q_01}=0. Same as the previous case, Condition (B0) contradicts Eq. (<ref>). From Eq. (<ref>), Condition (B1) implies P_21=P_11=1/2. Now Eq. (<ref>) along with this condition implies (B2): {Q_10,Q_11}=0. Finally, condition (B2) contradicts Eq. (<ref>). Case (C): Let us assume a_00=a_01=0 and a_10,a_11≠ 0. From Eq. (<ref>) and (<ref>) we must have the following: (C0): {P_01,P_11}=0,     (C1): {P_01,Q_10,Q_11}=0. Both Conditions (C0) and (C1) contradicts Eq. (<ref>). Case (D): Let us assume a_00=a_01=a_10=0 and a_11≠ 0. From Eq. (<ref>) and (<ref>) we must have the following: (D0): {P_01,P_11}=0,     (D1): {Q_01,Q_11}=0, (D2): {P_01,Q_11}=0,     (D3): {P_11,Q_01}=0. Both Conditions (D0) and (D1) contradicts Eq. (<ref>). Condition (D2) contradicts (<ref>). Similarly, Condition (D3) contradicts (<ref>). Thus in every case, we find a contradiction to the set of Equations (<ref>-<ref>), leading to the fact that the game 𝔾(3) can not be perfectly won if Alice and Bob share any of the two-2-coin state from the set ℭ(2). A natural question is given a two-2-coin what will be the maximum success probability achievable in the game 𝔾(3). As shown in <cit.>, this boils down to solving the following optimization problem. Given a two-2-coin, 𝒞(2)≡ (p(11), p(12), p(21 , p(22))^T, Alice and Bob can obtain a two-3-coin states 𝒞(3)≡ q(11), q(12),q(13), q(21 , q(22),q(23),q(31),q(32),q(33))^T by applying local stochastic maps 𝒮_A^2→3 and 𝒮_B^2→3 on their respective part of the two-2-coin, and aim to maximize the payoff in 𝔾(3) game, i.e., ℛ_max^ℭ(2)(3) =  q(i≠j)       𝒞(2)∈ℭ(2)       𝒮_A^2→3⊗𝒮_B^2→3       q(i≠j)≤ q(i^'≠j^')        i≠i^'  j≠j^' As it turns out, the maximum payoff Alice and Bob can achieve is 1/8. One possible optimal classical strategy is the following: Alice and Bob start with a shared coin 𝒞_α(2):=(α,0,0,α)^T∈ℭ(2), with α=1/2; and apply local stochastic maps S^2→3_A=[ 0 α α; α 0 α ]^T and S^2→3_B=[ α 0 α; 0 α α ]^T on their respective parts. This results in the following ℭ(3) coin [[ 0 1/2; 1/2 0; 1/2 1/2 ]⊗[ 1/2 0; 0 1/2; 1/2 1/2 ]][ 1/2; 0; 0; 1/2 ]=1/8[ 0; 1; 1; 1; 0; 1; 1; 1; 2 ], which assures the payoff ℛ^ℭ(2)_max(3)=1/8. 99 Einstein1935 A. Einstein, B. Podolsky, and N. Rosen; Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? https://doi.org/10.1103/PhysRev.47.777Phys. Rev. 47, 777 (1935). Schrodinger1936 E. Schrödinger; Probability relations between separated systems, https://doi:10.1017/s0305004100019137Math. Proc. Camb. Philos. Soc. 32, 446 (1936). Bell1966 J. S. Bell; On the Problem of Hidden Variables in Quantum Mechanics, https://doi.org/10.1103/RevModPhys.38.447Rev. Mod. Phys. 38, 447 (1966). Clauser1969 J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt; Proposed Experiment to Test Local Hidden-Variable Theories, https://doi.org/10.1103/PhysRevLett.23.880Phys. Rev. Lett. 23, 880 (1969). Aspect1982 A. Aspect, J. Dalibard, and G. Roger; Experimental Test of Bell's Inequalities Using Time-Varying Analyzers, https://doi.org/10.1103/PhysRevLett.49.1804Phys. Rev. Lett. 49, 1804 (1982). Pan1998 J-W Pan, D. Bouwmeester, H. Weinfurter, and A. Zeilinger; Experimental Entanglement Swapping: Entangling Photons That Never Interacted, https://doi.org/10.1103/PhysRevLett.80.3891Phys. Rev. Lett. 80, 3891 (1998). Brassard1999 G. Brassard, R. Cleve, and A. Tapp; Cost of Exactly Simulating Quantum Entanglement with Classical Communication, https://doi.org/10.1103/PhysRevLett.83.1874Phys. Rev. Lett. 83, 1874 (1999). Brunner2014 N. Brunner, D. Cavalcanti, S. Pironio, V. Scarani, and S. Wehner; Bell nonlocality, https://doi.org/10.1103/RevModPhys.86.419Rev. Mod. Phys. 86, 419 (2014). Pawlowski2009 M. Pawłowski, T. Paterek, D. Kaszlikowski, V. Scarani, A. Winter, and M. Żukowski, Information causality as a physical principle, https://doi.org/10.1038/nature08400Nature 461, 1101 (2009). Pawlowski2010 M. Pawłowski and M. Żukowski; Entanglement-assisted random access codes, https://doi.org/10.1103/PhysRevA.81.042326Phys. Rev. A 81, 042326 (2010). Fischer2020 O. Fischer, R. Oshman, and U. Zwick; Public vs. private randomness in simultaneous multi-party communication complexity; https://doi.org/10.1016/j.tcs.2018.04.032Theor. Comput. Sci. 810, 72 (2020). Bogdanov2011 A. Bogdanov and E. Mossel; On Extracting Common Random Bits From Correlated Sources; https://doi.org/10.1109/TIT.2011.2134067IEEE Trans. Inf. Theory 57, 6351-6355 (2011). Ghazi2018 Badih Ghazi and T.S. Jayram; Resource-Efficient Common Randomness and Secret-Key Schemes; https://doi.org/10.1137/1.9781611975031.120Proceedings of the 2018 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), Pages 1834-1853 (2018). Maurer1993 U. M. Maurer; Secret key agreement by public discussion from common information; https://doi.org/10.1109/18.256484IEEE Trans. Inf. Theory 39, 733-742 (1993). Bennett1988 C. H. Bennett, G. Brassard, and J. Robert; Privacy amplification by public discussion, https://doi.org/10.1137/0217014SIAM Journal on Computing 17, 210 (1988). Bennett1995 C.H. Bennett, G. Brassard, C. Crepeau, and U.M. Maurer, Generalized privacy amplification, https://doi.org/10.1109/18.476316IEEE Trans. Inf. Theory 41, 1915 (1995). Newman1996 I. Newman and M. Szegedy; Public vs. private coin flips in one round communication games (extended abstract), STOC '96: Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing, https://doi.org/10.1145/237814.238004Pages 561–570 (1996). Babai L. Babai and P.G. Kimmel, Randomized simultaneous messages: solution of a problem of yao in communication complexity, Proceedings of Computational Complexity, https://doi.org/10.1109/CCC.1997.61231920^th Annual IEEE Conference, pp. 239-246 (1997). Ahlswede1993 R. Ahlswede and I. Csiszar, Common randomness in information theory and cryptography. I. secret sharing, https://doi.org/10.1109/18.243431IEEE Trans. Inf. Theory 39, 1121 (1993). Toner2003 B. F. Toner and D. Bacon, Communication cost of simulating bell correlations, https://doi.org/10.1103/PhysRevLett.91.187904Phys. Rev. Lett. 91, 187904 (2003). Aumann1987 R. J. Aumann, Correlated equilibrium as an expression of bayesian rationality, https://doi.org/10.2307/1911154Econometrica 55, 1 (1987). Cubitt11 T. S. Cubitt, D. Leung, W. Matthews, A. Winter; Zero-error channel capacity and simulation assisted by non-local correlations, https://doi.org/10.1109/TIT.2011.2159047 IEEE Trans. Info. Theory 57, 5509 (2011). Bennett14 C. H. Bennett, I. Devetak, A. W. Harrow, P. W. Shor, A.Winter; Quantum Reverse Shannon Theorem, https://doi.org/10.1109/TIT.2014.2309968IEEE Trans. Inf. Theory 60, 2926 (2014). Brunner2013 N. Brunner and N. Linden, Connection between bell nonlocality and bayesian game theory, https://doi.org/10.1038/ncomms3057Nat. Commun. 4, 2057 (2013). Roy2016 A. Roy, A. Mukherjee, T. Guha, S. Ghosh, S. S. Bhattacharya, and M. Banik; Nonlocal correlations: Fair and unfair strategies in bayesian games, https://doi.org/10.1103/PhysRevA.94.032120Phys. Rev. A 94, 032120 (2016). Banik2019 M. Banik, S. S. Bhattacharya, N. Ganguly, T. Guha, A. Mukherjee, A. Rai, and A. Roy, Two-qubit pure entanglement as optimal social welfare resource in bayesian game, https://doi.org/10.22331/q-2019-09-09-185Quantum 3, 185 (2019). Canonne2017 C. L. Canonne, V. Guruswami, R. Meka, and M. Sudan; Communication with imperfectly shared randomness, https://doi.org/10.1109/TIT.2017.2734103IEEE Trans. Inf. Theory 63, 6799 (2017). Patra2022 R. K. Patra, S. Gopalkrishna Naik, E. P. Lobo, S. Sen, T. Guha, S. S. Bhattacharya, M. Alimuddin, M. Banik; Classical superdense coding and communication advantage of a single quantum, https://doi.org/10.48550/arXiv.2202.06796arXiv:2202.06796 [quant-ph]. Hall2010 M. J. W. Hall; Local Deterministic Model of Singlet State Correlations Based on Relaxing Measurement Independence, https://doi.org/10.1103/PhysRevLett.105.250404Phys. Rev. Lett. 105, 250404 (2010). Barrett2011 J. Barrett and N. Gisin; How Much Measurement Independence Is Needed to Demonstrate Nonlocality? https://doi.org/10.1103/PhysRevLett.106.100406Phys. Rev. Lett. 106, 100406 (2011). Banik2013(1) M. Banik; Lack of measurement independence can simulate quantum correlations even when signaling can not, https://doi.org/10.1103/PhysRevA.88.032118Phys. Rev. A 88, 032118 (2013). Guha2021 T. Guha, M. Alimuddin, S. Rout, A. Mukherjee, S. S. Bhattacharya, and M. Banik; Quantum Advantage for Shared Randomness Generation, https://doi.org/10.22331/q-2021-10-27-569Quantum 5, 569 (2021). Kraus1983 K. Kraus; https://doi.org/10.1007/3-540-12732-1States, Effects, and Operations Fundamental Notions of Quantum Theory, edited by K. Kraus, A. Böhm, J. D. Dollard, and W. H. Wootters (Springer Berlin Heidelberg, 1983). Busch1986 P. Busch; Unsharp reality and joint measurements for spin observables, https://doi.org/10.1103/PhysRevD.33.2253Phys. Rev. D 33, 2253 (1986). Peres1995 A. Peres; Quantum Theory: Concepts and Methods, Kluwer Academic Publishers 1995); ISBN 0-7923-2549-4. Chitambar2019 E. Chitambar and G. Gour; Quantum resource theories, https://doi.org/10.1103/RevModPhys.91.025001Rev. Mod. Phys. 91, 025001 (2019). Cover2006 T. M. Cover and J. A. Thomas; Elements of Information Theory (2 ed.), Wiley (2006). Markov2003 Markov Chains. In: Applied Probability and Queues. Stochastic Modelling and Applied Probability, https://doi.org/10.1007/0-387-21525-5_1vol 51. Springer, New York, NY (2003). Barrett2007 J. Barrett; Information processing in generalized probabilistic theories, https://doi.org/10.1103/PhysRevA.75.032304Phys. Rev. A 75, 032304 (2007). MairOAM A. Mair, A. Vaziri, G. Weihs and A. Zeilinger; Entanglement of the orbital angular momentum states of photons, https://doi.org/10.1038/35085529Nature 412, 313 (2001). Romero2012 J. Romero and D. Giovannini and S. Franke-Arnold and S. M. Barnett and M. J. Padgett; Increasing the dimension in high-dimensional two-photon orbital angular momentum entanglement, https://doi.org/10.1103/PhysRevA.86.012334Physical Review A 7, 012334 (2012). Shaham_controllable_depol A. Shaham and H. S. Eisenberg; Realizing controllable depolarization in photonic quantum-information channels, https://doi.org/10.1103/PhysRevA.83.022303Phys. Rev. A 83, 022303 (2010). Busch1995 P. Busch, M. Grabowski, and P. J. Lahti; Operational Quantum Physics (Springer, Berlin, 1995); P. Busch, P. J. Lahti, P. Mittelstaedt; The Quantum Theory of Measurement: 2 (Lecture Notes in Physics Monographs) (2013). Banik2013 M. Banik, Md. R. Gazi, S. Ghosh, and G. Kar; Degree of complementarity determines the nonlocality in quantum mechanics, https://doi.org/10.1103/PhysRevA.87.052125Phys. Rev. A 87, 052125 (2013). Ivanovic87 I. D. Ivanovic; How to differentiate between nonorthogonal states, https://doi.org/10.1016/0375-9601(87)90222-2Phys. Lett. A 123, 257 (1987). Peres88 A. Peres; How to differentiate between nonorthogonal states, https://doi.org/10.1016/0375-9601(88)91034-1Phys. Lett. A 128, 19 (1988). Vertesi10 T. Vértesi and E. Bene; Two-qubit Bell inequality for which positive operator-valued measurements are relevant, https://doi.org/10.1103/PhysRevA.82.062115Phys. Rev. A 82, 062115 (2010). Acin16 A. Acín, S. Pironio, T. Vértesi, and P. Wittek; Optimal randomness certification from one entangled bit, https://doi.org/10.1103/PhysRevA.93.040102Phys. Rev. A 93, 040102 (2016). DiMario M. T. DiMario and F. E. Becerra; Demonstration of optimal non-projective measurement of binary coherent states with photon counting, https://doi.org/10.1038/s41534-022-00595-3npj Quantum Inf 8, 84 (2022). SSB S. S. Bhattacharya, S. Rout, and P Horodecki, In preparation. Gomez16 E. S. Gómez, S. Gómez, P. González, G. Cañas, J. F. Barra, A. Delgado, G. B. Xavier, A. Cabello, M. Kleinmann, T. Vértesi, and G. Lima; Device-Independent Certification of a Nonprojective Qubit Measurement, https://doi.org/10.1103/PhysRevLett.117.260401Phys. Rev. Lett. 117, 260401 (2016). Jennewein2000 T. Jennewein, U. Achleitner, G. Weihs, H. Weinfurter, and A. Zeilinger; A fast and compact quantum random number generator, https://doi.org/10.1063/1.1150518Rev. Sci. Instrum. 71, 1675 (2000). Stefanov2000 A. Stefanov, N. Gisin, O. Guinnard, L. Guinnard, and H. Zbinden; Optical quantum random number generator, https://doi.org/10.1080/09500340008233380J. Mod. Opt. 47, 595 (2000). Pironio2010 S. Pironio, A. Acín, S. Massar, A. Boyer de la Giroday, D. N. Matsukevich, P. Maunz, S. Olmschenk, D. Hayes, L. Luo, T. A. Manning, and C. Monroe; Random numbers certified by Bell’s theorem, https://doi.org/10.1038/nature09008Nature 464, 1021 (2010). Putz2014 Pütz, Gilles, Rosset, Denis, Barnea, Tomer Jack, Liang, Yeong-Cherng and Gisin, Nicolas; Arbitrarily Small Amount of Measurement Independence Is Sufficient to Manifest Quantum Nonlocality, https://link.aps.org/doi/10.1103/PhysRevLett.113.190402Phys. Rev. Lett. 113, 190402 (2014). Colbeck2012 R. Colbeck and R. Renner; Free randomness can be amplified, https://doi.org/10.1038/nphys2300Nat. Phys. 8, 450 (2012). Dale2015 H. Dale, D. Jennings, T. Rudolph; Provable quantum advantage in randomness processing, https://doi.org/10.1038/ncomms9203Nat. Commun. 6, 8203 (2015). Patel2019 R. B. Patel, T. Rudolph, and G. J. Pryde; An Experimental Quantum Bernoulli Factory, https://doi.org/10.1126/sciadv.aau6668Sci. Adv. 5, eaau6668 (2019).
http://arxiv.org/abs/2303.06890v1
20230313063041
Scalable Program Implementation and Simulation of the Large-Scale Quantum Algorithm: $1024\times 1024$ Quantum Linear Solver and Beyond
[ "Zhao-Yun Chen", "Cheng Xue", "Xi-Ning Zhuang", "Tai-Ping Sun", "Huan-Yu Liu", "Ye Li", "Yu-Chun Wu", "Guo-Ping Guo" ]
quant-ph
[ "quant-ph" ]
APS/123-QED chenzhaoyun@iai.ustc.edu.cn  Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, Anhui, 230026, P. R. China  CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui, 230026, P. R. China  Origin Quantum Computing Company Limited, Hefei, Anhui, 230026, P. R. China  CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui, 230026, P. R. China  CAS Center For Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui, 230026, P. R. China   Hefei National Laboratory, Hefei, Anhui, 230088, P. R. China  Origin Quantum Computing Company Limited, Hefei, Anhui, 230026, P. R. China  wuyuchun@ustc.edu.cn  Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, Anhui, 230026, P. R. China  CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui, 230026, P. R. China  CAS Center For Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui, 230026, P. R. China  Hefei National Laboratory, Hefei, Anhui, 230088, P. R. China  gpguo@ustc.edu.cn  Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, Anhui, 230026, P. R. China  CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui, 230026, P. R. China  CAS Center For Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui, 230026, P. R. China   Hefei National Laboratory, Hefei, Anhui, 230088, P. R. China  Origin Quantum Computing Company Limited, Hefei, Anhui, 230026, P. R. China Program implementation and simulation are essential for research in the field of quantum algorithms. However, complex and large-scale quantum algorithms can pose challenges for existing quantum programming languages and simulators. Here, we present a scalable program implementation of the quantum walk on a sparse matrix and the quantum linear solver based on the quantum walk. Our implementation is based on a practical scenario in which the sparse matrix is stored in the compressed-sparse-column format in quantum random access memory. All necessary modules are implemented unitarily and are ensured to be decomposed at the quantum gate level, including implementing a quantum binary search and a modification of the original algorithm. The program is validated using a highly efficient quantum circuit simulator which is based on the register level and sparse state representation. With only a single core, we simulate the quantum walk on a 16384-dimensional matrix with 582 qubits in 1.1 minutes per step, as well as a quantum linear solver up to 1024 dimensions and 212245 steps in 70 hours. Our work narrows the gap between the simulation of a quantum algorithm and its classical counterparts, where the asymptotic complexity of our quantum linear solver simulation approximates a classical linear solver. These program implementation and simulation techniques have the potential to expand the boundary of numerical research for large-scale quantum algorithms, with implications for the development of error-correction-era quantum computing solutions. Scalable Program Implementation and Simulation of the Large-Scale Quantum Algorithm: 1024× 1024 Quantum Linear Solver and Beyond Guo-Ping Guo March 30, 2023 ================================================================================================================================ § INTRODUCTION Over the past few decades, there has been significant development in the field of quantum algorithms. One notable example is the quantum walk, which has shown itself to be a powerful tool with a wide range of applications<cit.>. In particular, the quantum walk on a sparse matrix can be used to implement Hamiltonian simulation and the quantum linear solver<cit.>. As a follow-up, the quantum linear solver is often utilized as the fundamental "quantum speedup" subprocess for many other quantum algorithms, including quantum machine learning<cit.> and quantum accelerated equation solvers<cit.>, which are promising to achieve the quantum advantage in real-world tasks. When these algorithms claim to achieve quantum speedup in terms of asymptotic complexity, it is essential to implement programs and conduct classical simulations to assess their actual performance. However, implementing the quantum walk with existing quantum programming languages and simulators<cit.> can be difficult. One major challenge is that the unitary implementation of the quantum walk has not been fully clarified in previous works<cit.>, particularly in terms of how to implement all required oracles. Other difficulties include a lack of support for quantum random access memory (QRAM)<cit.>, the implementation of quantum arithmetics, management of ancilla resources, and the inability to simulate a large-scale quantum program with more than 100 qubits and a sufficiently large depth. In this study, we propose a practical and scalable program implementation method for the quantum walk. To increase practicality, we store the sparse matrix in the QRAM using the compressed-sparse-column (CSC) format<cit.>, which is a common format in classical scientific computing<cit.>. The access of the matrix is completely based on the QRAM queries. To extract the sparsity information of the matrix, the quantum computer must find the position of a column in the compressed storage providing the column indices<cit.>. When the column indices are stored in sorted order, we choose the quantum binary search to implement this oracle. We introduce how a while loop of “quantum data, quantum control”<cit.> can be performed coherently in a quantum computer<cit.> and the method for automatic management of ancilla registers. Based on the quantum binary search, we propose a modified version of the original quantum walk. This version unitarily implements the sparsity oracle by adding two extra registers, which adapts to the cases where the oracle receives unexpected inputs. The program is scalable and can adapt to inputs of various sizes, including the dimensions of the matrix, its sparsity, and the size of the matrix elements. We execute the quantum walk program using a quantum circuit simulator on randomly generated band matrices with dimensions ranging from 16 to 16384. These problems require a circuit size that exceeds the limit of all existing simulators, so we propose a novel method called the sparse state simulator to simulate the quantum circuit on the register level and only store the nonzero components of the quantum state. The basic operations of this simulator include quantum arithmetic<cit.>, QRAM queries, conditional rotation, and other essential operations, which can all be simulated as a whole on the register level. The complexity of the simulation is mainly based on the number of nonzero states and is not limited by the number of qubits. On a single core, each quantum walk step uses 1.1 minutes for a 16384× 16384 matrix and 1.2 seconds for a 1024× 1024 matrix, with a maximum of 582 working qubits. We also program and test Chebyshev's approach of the CKS (Childs, Kothari, Somma) quantum linear solver<cit.> on matrices up to 1024 dimensions. As a result, the 1024× 1024 linear solver takes 70 hours to simulate on a single core. All techniques developed in this paper can be a reference for future research on large-scale quantum algorithms, including but not limited to quantum machine learning, and quantum differential equation solvers which may use hundreds of, even thousands of qubits. This paper is organized as follows. Section <ref> overviews our work, and introduces some fundamentals about the quantum walk and the sparse storage in the QRAM. Section <ref> firstly implements a quantum version of the binary search algorithm, then construct a modified version of O_s, an input oracle required by the quantum walk algorithm. Section <ref> scalably implements the remaining parts of the quantum walk. Section <ref> introduces a novel quantum circuit simulator and shows the numerical results on various sizes of matrices. Later on, we also analyze the reason why we can simulate a quantum algorithm with such a number of qubits. Section <ref> summarizes the results and outlooks for future works including the scalable implementation of other algorithms, and also the classical simulation on the quantum register level. § PRELIMINARIES §.§ Overview The quantum walk on a sparse matrix holds great potential for achieving quantum speedup on practical problems such as solving linear systems. If one hopes to apply this algorithm to real-world problems, it is crucial to consider how the input matrix is provided. In this study, we focus on the practical scenario, in which the sparse matrix is stored in the sparse form in the quantum random access memory. This means that all the subprocesses required for a quantum walk, also known as oracles, can only be obtained by accessing the QRAM. Therefore, our quantum program implementation is based on QRAM access and arithmetic operations to process data in quantum parallel. With all the subprocesses implemented in a standard manner, we ensure that this program can be reproduced on future quantum computers and that its time complexity is consistent with the original quantum walk theory. To implement the sparsity oracle by accessing the CSC sparse matrix, we designed a quantum binary search subroutine, which can find the corresponding sparse number according to the column number of a non-zero element. However, the quantum binary search may produce garbage when the input is not included in the search list, which is common in walking multiple steps. Therefore, we also adjusted the form of the quantum walk operator by increasing two extra registers to accept all inputs. Finally, we show the results of this program executed in a new quantum circuit simulator, including the quantum walk of a 16384-dimensional matrix and the linear system solving of the 1024-dimensional matrix. By comparing with the theoretical quantum walking results, we verify the correctness of the program. §.§ Quantum walk on a sparse matrix A sparse matrix is a kind of matrix whose zeros occupy most positions, which is very common in various fields. Many works proposed methods to achieve quantum speedup in the solution of sparse linear systems. A formal problem statement was proposed in <cit.> and we will follow these definitions throughout this paper. To input the matrix A, two oracles are required. One is O_A, named as “matrix element oracle”, which is O_A|j⟩|k⟩↦ |j⟩|k⟩|A_jk⟩, where A_jk is the matrix element in row j and column k, and |A_jk|≤ 1. The other is O_s, named as “sparsity oracle”, which is O_s|j⟩|k⟩↦ |j⟩|l_j,k⟩, where the l_j,k-th nonzero element is at column j. It is worth mentioning that O_s is an in-place operation, which means the inverse function (from l_j,k to k) is also available. The quantum walk is acted on four quantum registers, that is ℋ^N⊗ℋ^2⊗ℋ^N⊗ℋ^2. The walk operator is a unitary U=S(2 T T^†-1), where T is an isometry T=∑_j ∈[N]|ψ_j⟩⟨ j| and S the swap between the first two and the last two registers. And we have |ψ_j⟩=|j, 0⟩ ⊗ 1/√(d)∑_k ∈[N]: A_j k≠ 0 (√(A_j k^*)|k, 0⟩+√(1-|A_j k|)|k, 1⟩) . Repeating U to extract the information in A is the essential process of the quantum walk. §.§ Sparse matrix storage model in the quantum random access memory A sparse matrix is a matrix where zero occupies most positions. More specifically, a matrix is called s-sparse if each column has at most s nonzero elements. There are many formats for storing a sparse matrix, among which the compressed-sparse-column (CSC) format is widely applied in various scenarios and is more intuitive in the quantum walk task. The CSC format compresses each row and only stores the nonzero entries for every row. Meanwhile, the format also stores the column indices of each element correspondingly. In Fig. <ref>, we demonstrate how a sparse matrix is stored in the QRAM, which includes two continuous segments: the matrix element segment and the sparsity segment. The matrix element segment stores the nonzero data entries a_j,l = A_jk in each row, and the sparsity segment stores the column indices k_j,l of the corresponding data entries. We specify the number of nonzero elements per row as a constant s and fill zeros when the number of nonzeros is less than s. To enable the binary search on the sparsity segment, the column indices in the same row are in sorted order. § IMPLEMENTING O_S VIA THE QUANTUM BINARY SEARCH §.§ Quantum binary search Unitary implementation of O_s is an in-place computation from |l⟩ to |k_j,l⟩, which implies that the out-of-place computation |j,l⟩↦ |j,l⟩|k_j,l⟩ and its inverse |j,k_j,l⟩↦ |j,k_j,l⟩|l⟩ are both required. The former mapping is straightforward with the CSC format, but the inverse requires the search from k to l. <cit.> explicitly pointed out that the quantum search is necessary to implement O_s, either the quantum binary search in O(log s) steps when the nonzero column is stored in sorted order, or Grover's search in O(√(s)) steps. In this section, we show the unitary implementation of the quantum binary search. First, we define the task. Given a unique sorted list d_i (i=0,1,...,N-1) compactly stored in the QRAM, quantum binary search (QBS) is a unitary such that QBS|a⟩|d⟩|j⟩ = |a⟩|d⟩|j⊕ i(d)⟩, where |a⟩ is the address of d_0, |d⟩ the target, |j⟩ any input, ⊕ the bitwise XOR, and i(d)={[ 0 if d is not in the list; i if d[i] = d ].. Quantum binary search is a semi-quantum process, which means that it is a quantum circuit implementation of the classical binary search. However, it is nontrivial to convert the recursive process in the binary search to its quantum version. This is called the quantum recursion of the “quantum data, quantum control” model<cit.>, where the recursion process is determined coherently by a quantum variable. Let us start with a simple and classic model of reversible programming<cit.>, the computation-uncomputation model, shown in Fig. <ref>(a). The computation is usually not reversible, therefore some ancillae will be allocated during the computation and be left as the garbage after computation finishes. Later, a reverse uncomputation is performed, returning the garbage to the initial state and discarding them safely. This model is also applied to quantum computing languages such as <cit.>. For the quantum recursion, we extend the computation-uncomputation model and propose the push-pop model which is inspired by the classical reversible programming language<cit.>, shown in Fig. <ref>. The model contains a garbage stack, which has “push” and “pop” operations. Each push operation will move the immediate value of a variable to the top of the garbage stack. This happens when the state of the ancilla should be overwritten by a new value, such as starting a new loop cycle and all variables are refreshed. The pop operation reverses the push operation, resuming the value in the computation stage. Consequently, garbage stack records the snapshot of variables whenever their value has to be discarded. With the push-pop model, now we can implement the quantum binary search, displayed in Alg. <ref>. The quantum loop, as shown from step 4 to step 14 in Alg. <ref>, runs different steps depending on the input size, thus creating different numbers of ancilla registers. During the quantum loop, some branches have terminated while others may go further. We let the flag control the termination of a branch. In line 9, the flag register flips when compareEqual is true, which represents the loop breaks when the target is found. While terminated branches copy the target to the output register (line 8), other branches have gone to the next loop. In line 13, at end of the loop body, all old variables are pushed to the garbage stack. The original mid should be regarded as the temporal garbage used to record the branches route for the uncomputation. In line 15, the loop body reverses, such that all ancilla registers return to the |0⟩ state, and thus can be discarded safely. Finally, we implement the quantum binary search without creating any garbage, and only output registers are changed. §.§ Implementing a modified O_s Using the QRAM query, one can implement QRAM|j⟩|l⟩|z⟩ = |j⟩|l⟩|z⊕ k_j,l⟩, where k_j,l is the l-th column index of row j. Using the quantum binary search, one can implement QBS|j⟩|k_j,l⟩|z⟩ = |j⟩|k_j,l⟩|z⊕l̃⟩, where l̃=l if k_j,l is a valid column index of row j, and l̃ =0 if the input k_j,l does not exist in row j. With Eqn. (<ref>) and Eqn. (<ref>) and some valid input j and l, we can implement O_s with the following step: |j⟩|l⟩ (Allocate)⟶ |j⟩|l⟩|0⟩ (QRAM)⟶ |j⟩|l⟩|k_j,l⟩ (QBS)⟶ |j⟩|0⟩|k_j,l⟩ (Swap)⟶ |j⟩|k_j,l⟩|0⟩ (Deallocate)⟶ |j⟩|k_j,l⟩. This process is reversible, indicating that |j⟩|k_j,l⟩→ |j⟩|l⟩ is accepted for valid input j and k_j,l. Despite the valid inputs, one should notice that there are also some invalid inputs in the computing process. For example, k_j,l may not correspond to any l. Also, there may have l≥ s, where s is the maximum number of nonzero entries in a row. This will cause the ancilla register introduced in the first step of Eqn. (<ref>) cannot be disentangled in general. If O_s is implemented unitarily and in place, one has to create a bijection mapping that any input 0≤ l<N must correspond to a unique 0≤ k<N. An intuitive example is shown in Fig. <ref>(a), demonstrating a matrix with s=4, and the nonzero column is located in 2, 5, 8, and 10. These valid inputs are marked as blue blocks, where the invalid inputs are marked as green. The red arrows represent the mapping of l≥ s, which map input l=4 to k=0, l=5 to k=1, l=6 to k=3, and so forth. Here, the mapping target for l≥ s is continuously inserted into the space excluded the indices for nonzero columns. However, we show that the unitary implementation of this intuitive mapping consumes at most O(s) extra time and space, see Appendix Section <ref>. To optimize, we propose a method that only consumes O(1) extra space, and O(log s) time to implement the same mapping as required by the quantum walk. Our method is to keep the last register as a working register, and modify the original O_s to a 3-register version O_s' with the following steps: |j⟩|l⟩|z⟩ (QRAM)⟶ |j⟩|l⟩|z⊕ k_j,l⟩ (QBS)⟶ |j⟩|l⊕ y(z⊕ k_j,l)⟩|z⊕ k_j,l⟩ (Swap)⟶ |j⟩|z⊕ k_j,l⟩|l⊕ i(z⊕ k_j,l)⟩, where i(x) denotes the search result produced by the quantum binary search. When z=0 and l<s, this process is identical to the original O_s. The schematic diagram for this mapping is shown in Fig. <ref>(b). Alike the above example, we mark the valid inputs as blue blocks and invalid as green, and the mapping is marked as the red arrow. For the first arrow, when O_s'^† takes k=0 and z=0 input, the QBS cannot find a result and will output l=z=0. Then the QRAM process will read from address 0 and outputs column number 2. The final output will be l=2 and k=0. Because the whole process is always closed in these three registers, this bijection mapping is naturally implemented. Instead of mapping from ℝ^N to ℝ^N, this method implements the mapping from ℝ^N^2 to ℝ^N^2. The extra space is the ancilla register used in the QBS, which is an ignorable overhead. Because no extra search is needed, the time cost is mainly due to the QBS, which is O(log s). Next, we show how to use this modified O_s' in the implementation of the quantum walk. Based on O_s', we add two n-qubit registers j_c and k_c, expanding the row and column register j and k correspondingly. Now we rewrite O_s as a mapping between |j⟩|l⟩|z⟩ and |j⟩|k⟩|k_c⟩. Expanding the original matrix A∈ℝ^N× N to A'∈ℝ^N^2× N^2, where A' has the following property: in row j_cj, the index of zl-th column is k_ck, where xy means Nx+y. For the expanded matrix and this mapping, column index and its position index are a bijection, which means that it is reversible implementation of O_s' in A'. When j_c=0, l<s and z=0, we can write its output as k=k_j,l and k_c=0. Therefore, A is exactly located in the left-upper corner of the matrix A', which forms a block encoding of A A'=[ A *; * ]. As a consequence, the modified quantum walk of A is the walk on the matrix A'. To be simple enough, we let the original O_A'|j⟩|l⟩ controlled by the two newly-added registers' with |j_c⟩=|k_c⟩=|0⟩. Hence, any A'_j_cj,k_ck=0 except for j_c=k_c=0. This simplifies the structure of A' to A'=[ A 0; 0 0 ]. And it is straightforward to see that any walk operators acting on A' is equivalent to a block operation on A. Finally, we show the quantum circuit for implementing O_s' in Fig. <ref>. § A SCALABLE IMPLEMENTATION OF THE QUANTUM WALK Implementation of T̃ The unitary T̃ can be treated as a state preparation process controlled by the first register to mark its row index. For simplicity and without loss of generality, we assume constant s is a power of 2. From |j̃⟩ and concerning the first, third and fourth register, we perform Hadamard on the third register to create the superposition 1/√(s)∑_l=0^s-1|j, l, 0⟩_j,k,k_c . We make a tiny modification to the given oracle by defining O_A'|j, l, z⟩ = |j, l, z⊕ a_i,l⟩. Note that O_A' and O_A are equivalent because O_A' = O_s^† O_A O_s. The benefit is that O_A' can be directly implemented with one QRAM query in the CSC format. By applying O_A' and O_s we obtain 1/√(s)∑_k: A_j k≠ 0|j, k, 0⟩|A_jk⟩ . Finally, we perform a conditional rotation[Here, the conditional rotation is controlled by the row and column indices to deal with the negative element.] and uncompute |A_jk⟩, we can prepare the wanted |ψ_j⟩. To summarize, we show the circuit in Fig. <ref> and the pseudocode of implementing T̃ in Alg. <ref>. Implementation of O_A' O_A' makes access to the QRAM and queries the matrix element with the given input. The QRAM can be written as the following unitary U_ QRAM|i⟩|j⟩↦ |i⟩|j⊕ d[i]⟩. where i is the address, d[i] its corresponding data entry and ⊕ denotes the bitwise XOR. Implementing O_A' is straightforward. First, we compute the address from two input registers and the offset, then we call the QRAM and finally uncompute the first step. The circuit is shown in Fig. <ref>. Implementation of the quantum walk With the modified O_s based on the QBS, now the quantum walk is defined on six registers. Four registers are required by the original quantum walk theory, naming as j, b_1, k, and b_2, each has n, 1, n, and 1 qubit correspondingly. Besides these four, we also extend two more n qubits registers, naming as j_c and k_c. Then we define |j̃⟩=|0,j,0,0,0,0⟩_j_c, j,b_1,k_c,k,b_2. Also, we expand the |ψ_j⟩ to |ψ̃_j⟩ by filling zero state similarly. After expansion, we implement a unitary T̃ which prepares from |j̃⟩ to |ψ̃_j⟩, which corresponds to the process where the extended registers begin from |0⟩ and return to |0⟩ after the preparation finishes, that is T̃ = ∑_j ∈[N]|ψ̃_j⟩⟨j̃|+∑_j^⊥|ψ̃_j^⊥⟩⟨j̃^⊥|. Note that T̃( 2∑ _j∈ [N] |j̃⟩⟨j̃ |-1)T̃^† = (2TT^† -1 )_j⊗ |0⟩⟨ 0|_j_c,b_1,k_c,k,b_2 +∑ _m≠ 0,n≠ 0V^mn_j⊗ |m⟩⟨ n|_j_c,b_1,k_c,k,b_2 =[ 2TT^† -1; * ], forms a block encoding of the wanted operator 2TT^†-1 where 2TT^† -1 is defined in the orthogonal subspace of |0⟩⟨ 0|. 2 ∑_j ∈[N]|j̃⟩⟨j̃|-1 will conditionally occur a phase flip if the state is not |j̃⟩, and we name it after P. To prove that T̃ can effectively represent the T, note that T̃ST̃^† = [ A/s *; * ] forms a block encoding of H=A/s where S swaps j_c,j,b_1 with k_c,k,b_2. This block encoding form is compatible with the theoretical analysis of the walk operator, and we display it in the Supplementary Material. Roughly speaking, we extend the matrix size from N to N^2, where the extended registers j_c and k_c are now considered as the higher digits of the row and column indices, namely j_cj,k_ck, and A exists in the block where j_c=k_c=0. Now we have a unitary implementation of the walk operator W=ST̃PT̃^†. To summarize, we show the circuit in Fig. <ref>. Implementation of the CKS quantum linear solver The CKS quantum linear solver is based on the quantum walk, and is nearly optimal for all parameters. In theory, walking n steps correspond to the n-th order Chebyshev polynomial of the first kind, namely T^† W^nT|ψ⟩|0⟩ = 𝒯_n(A/d)|ψ⟩|0⟩ + |Ψ^⊥⟩. |Ψ^⊥⟩ is some garbage output where the second flag register does not output |0⟩. Additionally, A^-1 can be O(ϵ) approximated by f(A) where f(x) =1-(1-x^2)^b/x =4 ∑_j=0^j_0(-1)^j[∑_i=j+1^b[ 2b; b+i ]/2^2 b] 𝒯_2 j+1(x), and eigenvalues of A lie in [-1,-1 / κ] ∪[1 / κ, 1], κ the condition number of matrix A, j_0=√(blog(4b/ϵ)) and b=κ^2log(κ/ϵ). Hence, f(A)|b⟩ is the weighted sum of a series of 𝒯_2 j+1(A)|b⟩. Using the linear combination of unitaries (LCU) technique, we can compute the weighted sum of different orders of the Chebyshev polynomial to implement f(A)|b⟩, which is ϵ-close to the A^-1|b⟩. § CLASSICAL SIMULATION OF THE QUANTUM WALK PROGRAM To validate the implementation, we run our quantum walk program on a quantum circuit simulator. The quantum circuit simulator is not built on any existing quantum programming language or simulation program because the simulation here often requires more than hundreds of qubits, exceeding the capabilities of nearly all well-known existing algorithms. We build a novel quantum circuit simulator, which only stores nonzero entries in a quantum state, and each quantum state represents a series of quantum registers. §.§ Classical simulation of the quantum circuit on the quantum register level Main idea The classical simulation of the quantum circuit is a computationally hard task. This is generally because the representation of the Hilbert space grows exponentially with the number of qubits. This property usually forbids the simulation of over 100 qubits, which also limits the ability to conduct numerical research on large-scale quantum algorithms, such as the quantum walk used in this paper. To overcome this difficulty, we make two changes to the current classical simulation algorithms. First, we observe that in most of the quantum algorithms, the nonzero entries of the quantum state do not always fill the entire Hilbert space. When there are n working qubits, the quantum state is often not 2^n. In the quantum walk, the maximum number of nonzero entries usually grows polynomially with the dimension of the matrix and the sparsity number. This property allows the compression of the quantum state and greatly reduces the storage space. Also, a sparse state is more efficient to compute, where the time complexity is also polynomial dependent on the number of nonzero entries. Second, the basic unit of the computation is raised to the quantum register level instead of the qubit level. In large-scale quantum algorithms, quantum arithmetics are performed on the register level. When the error is small enough to support running such algorithms, a quantum arithmetic operation can be packed and simulated as a whole. This also benefits the programming of quantum algorithms, where a more natural description of the quantum program is allowed, such as instructions like “ADD”, “SUB”, or “MUL”. The idea of leveraging the sparsity of the quantum state is not initially proposed in our work, but applying the sparse simulation on the register level can dramatically increase the scale of the quantum algorithm that a classical computer can simulate. The programming and simulation of the quantum walk are based on these two changes, so we design a novel simulation program that supports these ideas. Suppose a quantum state that can be written as |ψ⟩ = ∑_i a_i|v^1_i⟩|v^2_i⟩|v^3_i⟩..., where v^j_i is a computational basis state of register j in the branch i. Define the number of registers as K, and the number of branches as N. This quantum state can be represented by a K× N array that stores every v_i^j, and a N-sized vector that stores every a_i. In Fig <ref>(a), a schematic of the data structure is shown. We name the K× N array as the state array, and the vector that stores the amplitude as the amplitude vector. A state array's element can be stored as a plain binary string whose length corresponds to the number of qubits of the register. In practice, all elements are represented by a fixed 64-bit binary string, and the register metadata is recorded to track the size of all registers. Creating a new register is to append a row to the state array as well as the corresponding metadata, and removing a register is to remove the row. When performing arithmetic computations, the data in registers are often processed with some data type. Generally, this data structure does not limit any certain kind of data type, but we still provide some typical types (integer, unsigned integer, fixed-point number, boolean, etc.) and enable the runtime type check. The operations can be divided into two types, as demonstrated in Fig. <ref>(b) and (c). The first type is the semi-quantum operation, which processes each branch in parallel and will not change the number of branches, such as quantum arithmetics and QRAM. The second type is the interference operation. This operation will cause quantum interference among several branches, where some branches may be added or deleted. In the quantum walk, Hadamard and conditional rotation is of this type. Detailed descriptions of the simulation algorithm are listed in the Supplementary Material. Classical simulation of the quantum arithmetic A quantum arithmetic operation is usually a semi-quantum process that satisfies the following properties: * All branches are computed independently (in parallel). No branch will be created or deleted. * It is applied on several registers, and the other registers remain unchanged. * It is usually reversible and creates no garbage. If not, then we can extend the input register set with the garbage registers to make it reversible. The register-level simulation of the quantum arithmetic basically follows these steps. First, iterate over all branches, and for each branch, extract the contents (binary strings) of the input registers. Then use type conversion to process the binary strings into certain data types and directly perform the computation. Finally, change the content in the registers. The most vital problem is that one should guarantee the change of contents of the registers is reversible. Here we introduce a simple protocol for out-of-place arithmetics. Suppose a classical function y=f(x_1,x_2,...,x_n) where x_i is the input and y is the output, and the following operation U is guaranteed reversible: U_f|x_1⟩|x_2⟩...|x_n⟩|z⟩ = |x_1⟩|x_2⟩...|x_n⟩|z⊕ y⟩, where ⊕ is the bitwise XOR. With this protocol, simulating the quantum arithmetic only has to extract all input x_i, compute y, and finally change the content in the output register. For the in-place operation, there are two possible methods. One is to manually compute the mapping and guarantee it to be a bijection mapping. Another is to implement the out-of-place version of the function and the inverse function. For example, if the output of y overwrites x_1, such that U_f^in-place|x_1⟩|x_2⟩...|x_n⟩ = |y⟩|x_2⟩...|x_n⟩. Then it is equivalent to implementing U_f and U_f^-1 such that U_f^-1|y⟩|x_2⟩...|x_n⟩|z⟩ = |y⟩|x_2⟩...|x_n⟩|z⊕ x_1⟩, where x_1=f^-1(y,x_2,...,x_n). Classical simulation of the quantum random access memory The simulation of the quantum random access memory (QRAM) is similar to the simulation of quantum arithmetic operations. QRAM can implement a unitary U_QRAM such that U_QRAM|i⟩_A|z⟩_D = |i⟩_A|z⊕ d_i⟩_D. Here, QRAM manages a vector of memory entries d⃗ and has two variables to control the input: the address length and the word length. The address length n is the size of the address register |·⟩_A, and the word length is the size of data register |·⟩_D. The word length is also the effective size of a memory entry d_i. When the noise is not considered, the simulation of QRAM is to access the classical memory with the content of the address register. Classical simulation of the interference operation The simulation of the interference operation includes three major steps: * Grouping; * Computing; * Clearing zero elements. Suppose the interference operation is acted on a set of input registers, and we call remained registers idle registers. We should notice that any two branches are coherent if and only if the values of all idle registers are the same. The first step is to sort all branches, then split branches into groups in which all registers have the same value except input registers. In each group, we can just calculate a small number of branches. If a group has branches the same number as the dimension of the operation (for example, a Hadamard on k-bit register, and a group with 2^k branches), then this group can be computed in-place. Otherwise, we may append some branches and perform operations on the full size. After the computation step, some branches may have zero amplitude due to the effect of quantum interference, and these branches will be removed from the branch list to reduce memory consumption. §.§ Numerical results We randomly generate positive-valued symmetric band matrices, which is a typical type of matrix arising from realistic world tasks. Two variables control the generation of the matrix: the number of rows N, and the number of bands. Each matrix element is a fixed point number within [0,1), and the number of digit is called word length. Before starting the solver program, we have to preprocess those sparse matrices with the following steps: * If ‖ A‖_ max > 1, rescale it to be 1; * Convert the sparse matrix to CSC format; * Count the maximum number of nonzeros in a row, recorded as s; * Fill zeros if any row does not have s nonzeros; * Calculate the minimum eigenvalue of A/s as λ_ min, then κ = 1/λ_ min. Then we compute the output state |τ_j⟩ for all j≤ j_0 where |τ_j⟩ = 𝒯_2j+1(A/s)|b⟩|0⟩_flag+|τ^⊥⟩. To avoid repetition, we compute them iteratively, that is |τ_j⟩ = T̃^† W^2T̃|τ_j-1⟩. The output state at step j is defined as |T_j⟩ = ∑_k=0^j a_k |τ_k⟩. The successful rate at step j, denoted as p_j, is defined by the probability that the flag register of |T_j⟩ is measured to |0⟩, namely p_j = Tr( (I⊗ |0⟩⟨ 0|)|T_j⟩⟨ T_j|). After measurement, the state in the work register is used to evaluate the fidelity of the target state |x⟩ = A^-1|b⟩/A^-1|b⟩, that is F_j = | ⟨ x,0|T_j⟩|^2. The final result of the CKS solver is the state at j=j_0, which has the successful rate p_succ=p_j_0 and fidelity F = F_j_0. All simulations are conducted on a single core of Intel Xeon E5-2680. We generate five matrices, whose row sizes ranged from 16 to 16384, whose metadata, related variables, and simulation resources are listed in Table <ref>. The test method is the linear solver on the matrix A, B, and C with given input b⃗ as a random uniform vector, and their results are shown in Fig. <ref>. The fidelity and the successful rate versus the iteration step j are plotted. In all three matrices, the curves match perfectly with the theory, which proves the correctness of our program implementation. The plotted j is less than expected j_0 because the computing converges and results do not change since then. For matrices D and E, the test method is to perform 50 steps of the quantum walk and their results also match perfectly with the theory. To summarize, we calculate the quantum walk on 16384× 16384 matrix with s=64 with 1.1 minutes per step and calculate the linear solving on 1024× 1024 matrix with s=32 with 1.2 seconds per step. The number of walking steps for the 1024× 1024 is 212245 (=2j_0+1), and the total time is approximately 70 hours. The qubit number shown in the table is counted automatically by the simulator. We exclude qubits that are not used in the computation even though they are allocated. In the quantum walk, the maximum number of qubits is counted when it reaches the deepest recursion of the quantum binary search. We provide a way to estimate the number of qubits in the Supplementary Material. But we also have to mention that here the qubit number is not a good measure of the problem size. Instead, the maximum number of nonzero state components is more important. For reference, the average time per walk step and the maximum memory usage is also provided in the table. The time and memory usage affects greatly by the row size and the sparsity of the matrix. §.§ Complexity of the classical simulation §.§.§ Qubit and register usage In the main text, we list qubit numbers that are used in the quantum walk on different sizes of matrices, which are automatically counted by the quantum circuit simulator. During the computation, the maximum number of working registers and working qubits are maintained. When a register is allocated, the simulator will update the number of working registers if the system uses more registers than before. When a register is deallocated, the number will not shrink, which implies the recycling of the free space. The number of working qubits is the sum of the qubit number of each working register. Here we also show how to theoretically estimate the qubit number in the quantum walk. It is in the quantum binary search when the system requires the biggest number of registers. Each QBS loop cycle will push four interval variables: mid, midVal, compareLess, and compareEqual, which have n, k, 1, and 1 qubit number correspondingly. Here n and k are the sizes of the address and data which are the QRAM's input, where n=log N + 1 and k is a set value. The number of the loop cycles is log s+1 in order to locate every possible input. Then the qubit number used as the ancilla in the QBS is (log s+1)(n+k+2). The remaining part is the six registers used in the quantum walk, which have 4n+2 qubits. So that in total, the number of qubits is (n+k+2)log s+5n+k+4. §.§.§ The space complexity of simulating the quantum walk The space complexity of this method can be written directly as O(K_maxM_max) where K_max is the maximum number of working registers, and M_max is the maximum number of branches. In the quantum walk scenario, K_max is logarithmic dependent on the problem size. In the quantum binary search, a constant number of ancilla registers will be added for each loop cycle, and the number of the loop cycle is O(log s). Except for this, the number of working registers is always a constant number. Therefore, K_max=O(log s). Next we estimate M_max. The nonzero entries are created during the preparation of |ψ̃_j⟩. In the first application of T̃ on the initial state |b⟩ = ∑_j α_j|j⟩, we have T̃|b⟩ = ∑_j,kα_j√(A_jk^*) |j,k⟩ + √(1-|A_jk|)|j,k+N⟩, where M=O(Ns) because it includes all nonzero elements in the matrix, which is a lower bound for the M_max. After the first walk step, we will produce T̃^† S T̃|b⟩. In each application of T̃, two state preparation processes are applied, where each will maximumly create s-fold copies of the quantum state. Therefore, we will obtain at most O(Ns^3) nonzeros entries. In the theory, the quantum walk operator is a rotation on the subspace span {T|λ⟩, |⊥_λ⟩}, where |λ⟩ is the eigenstate of H with eigenvalue λ, and |⊥_λ⟩ is orthogonal to |λ⟩ in the subspace. For any input |b⟩ = ∑_λ b_λ|λ⟩, the first walk step has already created a superposition over two states in the subspace, that is T̃^† S T̃|b⟩ = ∑_λ b_λ (λ|λ⟩ + √(1-λ^2)|⊥_λ⟩). In the following steps, it only changes the coefficient without evidently changing the number of the nonzero entries on the computational basis. In conclusion, the maximum number of nonzero entries during the whole quantum walk process is upper-bounded by O(Ns^3). Here we plot the max size obtained from numerical experiments on various matrix configurations in Fig. <ref>. In subfigure (a), the max size is approximately linear-dependent on the row number N in the case of s=4 or s=8. In subfigure (b), the dependence on sparsity constant s is nonlinear. To further investigate the relationship, we plot them with a log-log scale in subfigure (c) and compute the slope. From this result, we estimate that M_max is O(Ns) when s is significantly less than N, and between O(Ns^2) and O(Ns^3) when s approaches N. §.§.§ The time complexity for simulating the quantum walk After determining the maximum number of nonzero entries in the quantum state, now we can estimate the time complexity of the simulation. In each quantum walking step, there are two interference operations: one is the state preparation on the register k to create superposition, and another is to uncompute this preparation to achieve a reflection. Except for these two interference operations, the remaining are all semi-quantum operations. For the semi-quantum operations, the time complexity can be computed by the number of nonzero entries M and the number of the operations, which is O(log s), mainly contributed by the quantum binary search. Considering the maximum number of nonzero entries estimated in the previous text, the time complexity for the semi-quantum operations is O(Ns^3log s). For the interference operation, the time complexity is mainly contributed by the sorting of the quantum state that creates groups. Sorting requires O(Mlog M) time complexity, and the other part is proportional to M. Therefore, the time complexity should be O(Ns^3logNs). Adding up these two parts, we obtain an estimated time complexity for simulating each walking step, that is O(Nspolylog(Ns)). Finally, we consider the number of the walk step required for this simulation j_0, which is approximately proportional to κ. In total, the time complexity for conducting the simulation for the entire quantum linear solver is O(Nκpoly(s)log N ). A common knowledge is that simulating quantum computing will introduce many extra overheads, and the simulation ability is much weaker than using a classical algorithm and solving it directly. Surprisingly, the simulation of the quantum walk approaches the complexity of the classical computation, such as the conjugate-gradient method with O(Nκ s) time complexity. For Other quantum circuit simulation methods, the number of qubits and depth of the circuit can often be the restriction and they can hardly achieve a linear dependence on the size of the matrix. In our view, the improvement is mainly caused by only tracking the nonzero entries in the quantum state, and the size of the quantum state is often proportional to the intrinsic complexity of the problem itself. § SUMMARY AND OUTLOOK We believe that programming the quantum algorithm, as well as simulating it with realistic data, is one of the most convincing and concrete ways to study quantum algorithms. However, there is always a gap between the quantum algorithm and an executable quantum program. How to decompose each step of the quantum algorithm into a set of basic operations is the key to filling the gap. In this article, we developed a series of techniques to program the quantum walk on a sparse matrix stored in the QRAM, including a unitary quantum binary search without side-effect and the implementation of the quantum walk on the expanded space. We execute this program on a quantum circuit simulator, test it on several matrices, and compare it with the theory. All the techniques developed in this paper can also be used in the programming of other quantum algorithms, e.g. implementing a quantum while loop and dynamical allocation and deallocation of ancilla registers. Because the quantum walk operator also naturally generates the block encoding of a sparse matrix, we can expect the implementation and simulation of the quantum linear algebra<cit.> and grand unification of quantum algorithms<cit.>. We would like to conduct two future works related to this paper. The first is to add errors to the simulation. The error should be the most critical factor that affects quantum computation. In fault-tolerant quantum computing, the required error rate determines the amount of error correction resources. A noisy simulation could be a key to discovering the minimum resource that a quantum computer requires to achieve quantum speedup in some real-world problems. The second is to estimate the execution time and T-count. It is possible to estimate these via a validated and detailed program implementation, and an automatic tool for the resource and time estimation of a large-scale quantum algorithm might be created in the future. § ACKNOWLEDGEMENT This work was supported by the National Natural Science Foundation of China (Grant No. 12034018), and Innovation Program for Quantum Science and Technology No. 2021ZD0302300. § QUANTUM ARITHMETICS USED IN THIS PAPER Quantum arithmetics are often regarded as the circuit implementations of arithmetic logic units (ALU) in the quantum computer, including addition, subtraction, multiplication, square root, etc. Quantum arithmetics are semi-quantum circuits, which reversibly implement classical logic computations, and are very essential in many quantum algorithms like Shor's factorization. Many previous works have introduced the implementation and optimization of some quantum arithmetics. Different from many other works which explicitly implement all operations in the quantum circuit form, this paper terminates at some “basic operations” including those quantum arithmetics. To ensure these operations can be fully decomposed into quantum gate level, we list all of them in Table <ref>. § THE INTUITIVE IMPLEMENTATION OF THE O_S In this section, we introduce how to implement the original O_s completely in place without causing any side effects. First, we restate the definitions: the dimension of the matrix is N; sparsity is s; in row j, the index of the l-th nonzero column is k. When the matrix is stored in CSC format, it is efficient to compute k(j,l) when 0≤ l<s. Also, the quantum binary search can compute l(j,k) in O(log s) time when k is a correct column index. Now the task is to create a mapping from any 0≤ k<N to 0≤ l<N. The in-place mapping from k to l is equivalent to defining two out-of-place operations, that is |j,k⟩↦ |j,k,l(j,k)⟩ |j,l⟩↦ |j,l,k(j,l)⟩. They can be achieved by first copying the register and then performing the in-place operation on the copied register. In Fig. <ref>, we again display an intuitive example version of O_s. For the given input l, there exist two domains: one is that l<s, called “sparsity mapping”, and the other is l≥ s, called “bijection filler”. The first l in the bijection filler domain maps to the index of the first zero columns and so forth. This mapping can be represented by the following function k(j,l) = {[ k̃(j,l) 0≤ l<s; l-δ_l s≤ l<N ].. Here δ_l is the difference between k and l. Even though it is straightforward to compute this difference from k, it is necessary to compute this difference with only the given input l for reversibility. Then the algorithm is as follows. This algorithm sequentially finds the corresponding k belongs to which section. Therefore, the time complexity for this algorithm is O(s). While this algorithm also uses a for-loop that has to be run in quantum parallel, using the method that described in the main text, we can convert it to the quantum version and obtain the space complexity O(s). § PSEUDOCODE OF THE IMPLEMENTATION Here we list the pseudocode for implementing each module of the quantum walk, including O_A', O_s', T̃, and the walk operator W. § CLASSICAL BINARY SEARCH The binary search is a classic, efficient algorithm that looks up a target in a sorted list. There are many methods to implement a binary search, such as using a while-loop or recursion. Here we use a for-loop version that has a fixed step number, which can more easily be converted to the quantum version. Note that this binary search version only correctly outputs the position when the search target is actually in the list, which has already met the demand for implementing the quantum walk. unsrt
http://arxiv.org/abs/2303.06974v1
20230313101927
Reduced uncertainties up to 43\% on the Hubble constant and the matter density with the SNe Ia with a new statistical analysis
[ "Maria Giovanna Dainotti", "Giada Bargiacchi", "Shigehiro Nagataki", "Malgorzata Bogdan", "Salvatore Capozziello" ]
astro-ph.CO
[ "astro-ph.CO", "astro-ph.HE" ]
First and second authors share the same contribution. Corresponding author, maria.dainotti@nao.ac.jp National Astronomical Observatory of Japan, 2 Chome-21-1 Osawa, Mitaka, Tokyo 181-8588, Japan The Graduate University for Advanced Studies, SOKENDAI, Shonankokusaimura, Hayama, Miura District, Kanagawa 240-0193, Japan Space Science Institute, 4765 Walnut St, Suite B, 80301 Boulder, CO, USA Scuola Superiore Meridionale, Largo S. Marcellino 10, 80138, Napoli, Italy Istituto Nazionale di Fisica Nucleare (INFN), Sez. di Napoli, Complesso Univ. Monte S. Angelo, Via Cinthia 9, 80126, Napoli, Italy Interdisciplinary Theoretical & Mathematical Science Program, RIKEN (iTHEMS), 2-1 Hirosawa, Wako, Saitama, Japan 351-0198 RIKEN Cluster for Pioneering Research, Astrophysical Big Bang Laboratory (ABBL), 2-1 Hirosawa, Wako, Saitama, Japan 351-0198 Astrophysical Big Bang Group (ABBG), Okinawa Institute of Science and Technology Graduate University (OIST), 1919-1 Tancha, Okinawa, Japan 904-0495 University of Wroclaw, plac Grunwaldzki 2/4, Wroclaw, Lower Silesia Province, 50-384, Poland Department of Statistics, Lund University, Box 117, SE-221 00 Lund, Sweden Scuola Superiore Meridionale, Largo S. Marcellino 10, 80138, Napoli, Italy Istituto Nazionale di Fisica Nucleare (INFN), Sez. di Napoli, Complesso Univ. Monte S. Angelo, Via Cinthia 9, 80126, Napoli, Italy Dipartimento di Fisica "E. Pancini" , Universitá degli Studi di Napoli "Federico II" Complesso Univ. Monte S. Angelo, Via Cinthia 9 80126, Napoli, Italy Type Ia Supernovae (SNe Ia) are considered the most reliable standard candles and they have played an invaluable role in cosmology since the discovery of the Universe's accelerated expansion. During the last decades, the SNe Ia samples have been improved in number, redshift coverage, calibration methodology, and systematics treatment. These efforts led to the most recent “Pantheon" (2018) and “Pantheon +" (2022) releases, which enable to constrain cosmological parameters more precisely than previous samples. In this era of precision cosmology, the community strives to find new ways to reduce uncertainties on cosmological parameters. To this end, we start our investigation even from the likelihood assumption of Gaussianity, implicitly used in this domain. Indeed, the usual practise involves constraining parameters through a Gaussian distance moduli likelihood. This method relies on the implicit assumption that the difference between the distance moduli measured and the ones expected from the cosmological model is Gaussianly distributed. In this work, we test this hypothesis for both the Pantheon and Pantheon + releases. We find that in both cases this requirement is not fulfilled and the actual underlying distributions are a logistic and a Student's t distribution for the Pantheon and Pantheon + data, respectively. When we apply these new likelihoods fitting a flat ΛCDM model, we significantly reduce the uncertainties on Ω_M and H_0 of ∼ 40 %. This boosts the SNe Ia power in constraining cosmological parameters, thus representing a huge step forward to shed light on the current debated tensions in cosmology. § INTRODUCTION The most accredited Universe parametrization is the ΛCDM model <cit.>, which includes a cold dark matter (CDM) component and a cosmological constant Λ <cit.>, as suggested by the Universe accelerated expansion<cit.>. Predictions from this scenario are compatible with the cosmic microwave background <cit.>, the baryon acoustic oscillations <cit.>, and SNe Ia. Nevertheless, the ΛCDM model suffers from theoretical and observational shortcomings: the cosmological constant problem <cit.>, the fine-tuning, the origin and properties of dark energy, and the Hubble constant (H_0) tension, the discrepancy between the H_0 value obtained from the Planck data of the CMB within a flat ΛCDM model (H_0 = 67.4 ± 0.5 km s^-1 Mpc^-1, ), and the local H_0 from SNe Ia and Cepheids (H_0 = 73.04 ± 1.04 km s^-1 Mpc^-1, ). This discrepancy varies from 4.4 to 6 σ when different samples are considered <cit.>. Time-delay and strong lensing from quasars <cit.> provide a value close to SNe Ia, while cosmic chronometers favor the CMB H_0 <cit.>. Instead, quasars <cit.>, the Tip of the Red-Giant Branch <cit.>, and Gamma-ray bursts <cit.>, hint at a H_0 value halfway between these two. So, the H_0 tension remains an open question. One way to better highlight the tension is to reduce H_0 uncertainty. Towards this goal, we have questioned the Gaussianity assumption on the likelihood traditionally used for SNe Ia. The common practise of constraining cosmological parameters with a Gaussian distance moduli likelihood, L_Gauss, relies on the implicit assumption that the difference between the distance moduli, μ, measured and expected from a cosmological model, normalized to the uncertainty, is normally distributed. We investigate this assumption, for the Pantheon <cit.> and Pantheon + <cit.> samples. Section <ref> introduces the SNe Ia samples. Section <ref> presents the Gaussianity tests, and the implementation of new likelihoods in cosmological fits in the flat ΛCDM model. In Section <ref>, we describe the results. In Section <ref> we draw our conclusions. § METHODOLOGY §.§ Data We use the “Pantheon" <cit.> and the “Pantheon +" <cit.> samples. The first includes 1048 sources in the redshift range z=0.01 - 2.26, the latter counts 1701 SNe Ia from 18 different surveys in the range z=0.001 - 2.26. §.§ The distance moduli To apply SNe Ia as cosmological tools, we compute the difference between the observed and the theoretical distance moduli, μ. The observed μ is μ_obs = m_B - M + α x_1 - β c + Δ_M + Δ_B where m_B is the B-band overall amplitude, x_1 the stretch parameter, c the color, α and β the coefficients of the relation of luminosity with x_1 and c, respectively, M the fiducial B-band absolute magnitude of a SN with x_1 = 0 and c=0, Δ_M and Δ_B the corrections on the distance accounting for host-galaxy mass and biases, respectively <cit.>. SNe Ia alone cannot determine H_0, as it is degenerate with M <cit.>. Nevertheless, H_0 can be derived by fixing M. Usually, Cepheids are used to determine M <cit.>. <cit.> fix M=-19.35, implying H_0 = 70 km s^-1 Mpc^-1 <cit.>. <cit.> obtain M = -19.253 ± 0.027 and H_0 = 73.04 ± 1.04 km s^-1 Mpc^-1 combining 42 SNe Ia with a sample of Cepheids hosted by the same galaxies. This value of M is assumed to compute μ for the Pantheon +. The theoretical μ, assuming a flat ΛCDM model is <cit.>: μ_th = 5 log_10 d_l (Mpc) + 25 = 5 (1+z_hel) c/H_0 ∫^z_HD_0d z'/√(Ω_M (1+z)^3 + (1- Ω_M)) + 25 where d_l is the luminosity distance, c the light speed, Ω_M the current matter density, z_hel the redshift in the heliocentric frame, and z_HD the redshift corrected for CMB dipole motion and peculiar velocity. In <cit.> for the evaluation of cosmological parameters the χ^2 is defined as χ^2=Δμ^T C^-1Δμ where Δμ = μ_obs - μ_th and C is the uncertainty matrix built as C= D_stat + C_sys, with D_stat the diagonal matrix with statistical errors and C_sys the systematic covariance matrix, both provided by SNe Ia releases <cit.>. §.§ The Gaussianity assumption in the likelihood We investigate if the argument Δ_μ/σ_μ of the likelihood of SNe Ia distance moduli (L) in the Pantheon and Pantheon + fulfills the Gaussianity condition within a flat ΛCDM model with Ω_M = 0.3 and H_0 = 70 km s^-1 Mpc^-1. We indicate with σ_μ the uncertainty on μ. To this end, we apply several methods to test if Δμ/σ_μ is normally distributed. We have applied all the tests to all individual data points of Δ_μ/σ_μ and not in bins. μ_obs in Equation (<ref>) is taken from <cit.> and <cit.> , while μ_th is specified in Eq. (<ref>). When the likelihood is Gaussian there is the implicit assumption that the residual, the argument in the formula of the likelihood (Δμ/σ_μ in Eq. (<ref>)), must be Gaussian. Moreover, the discussion about Gaussianity in the large structure analysis has been already treated in <cit.> along with the impact of the Gaussian assumption on cosmological parameters. We apply the Anderson-Darling <cit.> and Shapiro-Wilk <cit.> normality tests, and we compute skewness and kurtosis of the distributions, the skewness <cit.>, the kurtosis <cit.> and a test that combines both features <cit.> [These analyses are performed with the scipy Python package.]. The Anderson-Darling and Shapiro-Wilk tests determine whether a data sample is drawn from the Gaussian distribution, and they are frequently applied in the literature (e.g. in astrophysics and in statistics). An important property of these tests is their consistency: they can identify any small deviation from normality, if the sample size is large enough <cit.>. Therefore, the larger the sample size, the more these tests tend to reject the null hypothesis of normal distribution <cit.>, even in case of very small deviations from Gaussianity such as in presence of ties caused by limited measurement precision (i.e. the number of decimals). This weakness limits the applicability of the Anderson-Darling and Shapiro-Wilk tests. Thus, we include investigations on skewness and kurtosis. The skewness is the third standardized moment and measures the asymmetry of the distribution as it identifies extreme values in one tail versus the other. The kurtosis is the fourth standardized moment and measures extreme values in both tails: large kurtosis corresponds to more populated tails than the ones of a Gaussian distribution, small kurtosis to less populated tails than the ones of a Gaussian distribution. A normal distribution has skewness and kurtosis equal to zero[We consider Fisher’s definition of kurtosis, in which 3 is subtracted from the result to give 0 for a normal distribution.]. Furthermore, we apply the “skewness+kurtosis" test, which contemporaneously checks departures of skewness and kurtosis from Gaussians. These complementary methods are crucial to obtain reliable results. §.§ Fit with the new likelihoods Since the tests described above fail (Sec. <ref>), we further extend our analysis. First, we fit the Δμ/σ_μ values to find the best-fit distribution. The found distribution is used in L (L_new) instead of the Gaussian probability distribution function (PDF). Thus, we fit the flat ΛCDM model with the D'Agostini method <cit.> using L_new and considering these cases: H_0 fixed and Ω_M free, Ω_M fixed and H_0 free, and both parameters free. We impose wide uniform priors 0 ≤Ω_M ≤ 1 and 50 km s^-1 Mpc^-1≤ H_0 ≤ 100 km s^-1 Mpc^-1 to guarantee that the parameter's space is explored in all physical regions. We then repeat the fit with L_Gauss, thus comparing the outcomes. Further, we test how the cosmological constraints vary if we change the assumptions on the fixed parameter in the cases of one free parameter. We consider Ω_M = 0.30 and Ω_M = 0.34, respectively from <cit.> and <cit.>. We investigate H_0 = 73.04 km s^-1 Mpc^-1 from <cit.>, and H_0 = 70 km s^-1 Mpc^-1 based on <cit.> and chosen arbitrarily <cit.>. We compare our H_0 with the ones from Pantheon (P), Pantheon + (P+), and the CMB, by computing the z-score (ζ), a method to evaluate the statistical distance between a value and its reference value. ζ is defined as ζ= |H_0,i - H_0,our|/ √(σ^2_H_0,i + σ^2_H_0,our) where i is one of the three H_0 reference values with its 1 σ uncertainty. H_0,our and σ_H_0,our are the H_0 and its 1 σ error obtained in our computations. In Table <ref> ζ_CMB is calculated referred to H_0 = 67.4 ± 0.5 km s^-1 Mpc^-1, ζ_P compared to H_0 = 70.00 ± 0.13 km s^-1 Mpc^-1, and ζ_P+ with respect to H_0 = 73.04 ± 1.04 km s^-1 Mpc^-1. § RESULTS §.§ Gaussianity tests results Both SNe Ia samples do not pass neither the Anderson-Darling nor the Shapiro-Wilk tests. Given the limits of these methods, we compute the skewness and kurtosis of the Δμ normalized distributions. The Pantheon sample has skewness = -0.19 and kurtosis = 0.69 , while the Pantheon + presents the same skewness, but kurtosis = 4.2 (see Fig. <ref>). Neither of the samples passes the skewness, kurtosis and “skewness+kurtosis" tests. We also verify that these results are independent on the assumed Ω_M and H_0. Unexpectedly, the Gaussianity implicit assumption for SNe Ia (Δμ)/σ_μ <cit.> is not statistically legitimated and it should be checked for each SNe Ia sample used. §.§ New best-fit distributions Thus, the Δμ distributions are not well-fitted by the Gaussian PDF PDF_Gaussian = 1/√(2 π) σ e^-1/2(x- x̂/σ)^2=1/√(2 π) σ e^-1/2χ^2 where x̂ is the mean, σ is the standard deviation, x -x̂=Δμ and χ^2 is the same defined in Eq. (<ref>). Hence, we fit the Δμ histograms (see Sec. <ref>) obtaining as the best fit for the Pantheon sample a logistic distribution, with the following PDF PDF_logistic = e^-(x-x̂)/s/s (1+ e^-(x-x̂)/s)^2 where s is scale and the variance σ^2 is σ^2 = (s^2 π^2)/3. Left panel of Fig. <ref> shows the best-fit distributions normalized with the uncertainties on the singular SNe Ia, σ_μ, of the logistic with x̂= -0.004 and s=0.08 (orange) and the Gaussian with x̂=0.0007 and σ= 0.14 (green). The best fit for the Pantheon + is a Student's t-distribution, for which the generalized PDF is PDF_student = Γ(ν +1/2)/√(ν π) s Γ(ν/2) [1 + ((x- x̂)/s)^2/ν]^-ν +1/2 where Γ is the gamma function, ν are the degrees of freedom, and σ^2 = (s^2 ν) / (ν -2). The best-fit distributions of the Student's t with x̂= 0.1, s=0.12, and ν = 3.8 (orange) and the Gaussian with x̂=0.096 and σ= 0.19 (green) are shown in the right panel of Fig. <ref> where the distribution is normalized with the SNe Ia uncertainties, σ_μ (Eq. (<ref>)). We have proved that the logistic for the Pantheon and the Student-T distribution for the Pantheon + are favoured against the Gaussian distributions with the Bayesian Information Criterion (BIC). We used for comparison the table in <cit.> to distinguish among the most favoured models. We have used the definition of 2log_e(B_10), where the Bayes factor B_10=e^((BIC_0-BIC_1)/2) <cit.>, B_0 is the reference model (the Gaussian), and B_1 is the alternative model (either the logistic or the T-student distribution). Thus, 2log_e(B10)=BIC_0-BIC_1=Δ_BIC. We found Δ_BIC,Pantheon=6 showing strong evidence for the Logistic against the Gaussian distribution, and Δ_BIC,Pantheon+=134 showing very strong evidence for the T-Student against the Gaussian for the Pantheon+. By definition, for 6 ≤Δ_BIC≤ 10 the evidence against the null hypothesis (the Gaussian being the favorite the model) is strong, when Δ_BIC>10 the evidence against the null hypothesis is very strong. Moreover, we have proved the goodness of the fits with the Anderson-Darling one-sample test. The results yield a probability value that the fit is not randomly drawn, p=0.96 for the Pantheon sample for the logistic distribution, and p=0.86 for the Pantheon + for the Student-T distribution. §.§ Cosmology with the Gaussians and new likelihoods Using L_new, we fit the flat ΛCDM model on the Pantheon and Pantheon + samples (see Section <ref>). Table <ref> reports the best-fit values with 68% confidence level. Panels (b) and (f) of Figs. <ref> and <ref> and panel (b) of Fig. <ref> show the corner plots from the logistic L (L_logistic), while panels (d) and (h) of Figs. <ref> and <ref> and panel (d) of Fig. <ref> the ones from the Student's t L (L_Student). For the Student's t, we treat ν as free parameter. The results of the fit of the flat ΛCDM model with L_Gauss are shown in Table <ref> and in panels (a), (c), (e), and (g) of Figs. <ref> and <ref> and panels (a) and (c) of Fig. <ref>. Considering the Pantheon sample, the cosmological parameters obtained with L_Gauss and L_logistic are compatible in 1 σ, except for Ω_M when H_0 = 73.04 km s^-1 Mpc^-1, that shows a 2-3 σ discrepancy. Concerning the uncertainties, L_logistic shows significantly tighter constraints when both Ω_M and H_0 are free parameters: the errors on Ω_M and H_0 are reduced by 43 % (from 0.021 to 0.012) and 41 % (from 0.34 to 0.20), respectively. Same conclusions are drawn for the Pantheon +. The only difference is that the 3 σ discrepancy in Ω_M emerges when H_0 = 70 km s^-1 Mpc^-1. This can be ascribed to the H_0 = 73.04 km s^-1 Mpc^-1 assumed for Pantheon +. The use of L_Student reduces the errors on Ω_M and H_0, when both are free parameters, by 42 % (from 0.019 to 0.011) and 33 % (from 0.24 to 0.16), respectively. Further, <cit.> reported Ω_M = 0.315 ± 0.007. Thus, the discrepancy with the values in Table <ref>, when Ω_M and H_0 are free, increases using L_new due to the reduced errors. Quantitatively, L_logistic shows a 2 σ discrepancy compared to 1 σ of L_Gauss, while L_Student increases the discrepancy from 2 to 3 σ. Our analysis also reveals interesting trends when comparing the cosmological results from the two SNe Ia samples, independently on the L considered. With Pantheon, we recover Ω_M = 0.3 and H_0 = 70 km s^-1 Mpc^-1, as in <cit.>, except when assuming Ω_M =0.34 and H_0 = 73.04 km s^-1 Mpc^-1. Conversely, with Pantheon +, we recover Ω_M = 0.35 and H_0 = 73 km s^-1 Mpc^-1 as in <cit.> and <cit.>, except when fixing H_0 = 70 km s^-1 Mpc^-1. The significant shifts in Ω_M show how strongly the choice of M (and thus H_0) used to compute μ affects the cosmological results. We have performed reverse engineering reasoning: we have used the same distance moduli provided by <cit.> and <cit.> by using the covariance matrix which include both statistics and systematic uncertainties. When we do a parameter survey of H_0 with the uniform priors 50 km s^-1 Mpc^-1 < H_0 < 100 km s^-1 Mpc^-1, we have not renormalized the Pantheon data and Pantheon + data with a different M value. Thus, if the true value of the data would have led naturally to H_0= 70 km s^-1 Mpc^-1 the values of M would have even weighed more towards the initially fixed value of H_0= 70 km s^-1 Mpc^-1. This is not the case. We have used the same assumption on H_0 used in <cit.> and in <cit.>. Thus, if there was no hidden selection selection biases or redshift evolution at play, we should have recovered the values of the assumption for Ω_M. However, when we fix this value of H_0 we have a varying Ω_M as an inherent evidence of an evolving trend in H_0 already extensively discussed in <cit.> for which <cit.> have further provided a theoretical explanation. This trend of Ω_M (also discussed in ) can be either the consequence that we are forcing the value of H_0 to be fixed while an evolving trend is present in the data or that there is an inherent crisis of the ΛCDM model that brings to an evolving trend of Ω_M. Another possibility is that there are selection biases or evolutionary effects at play which are still unclear. The difference in the trend of Ω_M and H_0 could be due to the fact that in the local Universe we do not see a dependence on Ω_M and H_0 which instead is revealed at high-z. Anyhow, regardless of the physical meaning and the explanation such a trend is revealed in the data and is important to highlight the impact associated with the quantification of the H_0 tension. The evolving trend of H_0 is shown also in <cit.> with H(z) and additional data samples for the SNe Ia. Additionally, we compute ζ (see Sec. <ref>) for each cosmological computation (Table <ref>). The high ζ_P values (∼ 20) when calculated for the Pantheon + sample may depend on the smaller error on the reference value H_0 = 70.00 ± 0.13 km s^-1 Mpc^-1 compared to the errors of the reference values pertinent to ζ_CMB and ζ_P+. ζ_P+ is always ∼ 3 when computed for Pantheon; ζ_CMB is higher for Pantheon + (ζ_CMB∼ 12) than Pantheon (ζ_CMB∼ 5) as the H_0 value in <cit.> is more discrepant from the one derived from CMB compared to the H_0 in <cit.>. § CONCLUSIONS We investigated the Gaussianity assumption on the μ of Pantheon <cit.> and Pantheon + <cit.> of SNe Ia. We show that this assumption, usually implicitly assumed, is not fulfilled. The logistic and the Student's t distributions are the ones that best-fit Pantheon and Pantheon +, respectively (see Fig. <ref>). The L_logistic and L_Student, used to fit respectively the Pantheon and Pantheon + samples, with a flat ΛCDM model with both Ω_M and H_0 free parameters, significantly reduce the uncertainties on these parameters. L_logistic reduces the uncertainties on Ω_M and H_0 by 43 % (from 0.021 to 0.012) and 41 % (from 0.34 to 0.20), respectively, while L_Student reduces the error on Ω_M and H_0 by 42 % (from 0.019 to 0.011) and 33 % (from 0.24 to 0.16), respectively. Our results steadily demonstrate that choosing the actual distribution for each SNe Ia sample is key to substantially improving the constraints on cosmological parameters. In conclusion, we show for the first time that Δμ of Pantheon and Pantheon + does not verify the Gaussianity assumption. This unexpected result has a significant repercussion on the SNe Ia cosmology, the approach implicitly assumed in SNe Ia cosmology, and future SNe Ia collections for which the Gaussianity assumption will have to be carefully inspected. § ACKNOWLEDGEMENTS This study uses data from <https://github.com/dscolnic/Pantheon> and <https://github.com/PantheonPlusSH0ES>. GB acknowledges Scuola Superiore Meridionale, for supporting her visit at NAOJ, Division of Science. MGD acknowledges NAOJ. SN acknowledges JSPS KAKENHI (A: 19H00693), Interdisciplinary Theoretical and Mathematical Sciences Program (iTHEMS), and the Pioneering Program of RIKEN for Evolution of Matter in the Universe (r-EMU). We thank E. Lusso, G. Risaliti and E. Nardini for the interesting discussion. To further test the reliability of our results we have generated mock data for the redshift, the distance moduli, μ, assuming a given cosmology, and the uncertainties on the distance moduli, σ_μ_i for both Pantheon (1048 mock data) and Pantheon + (1701 mock data) samples by extracting random values from their actual distributions for the redshift, and σ_μ_i. We here show that the observed redshift distribution for the Pantheon sample is a Mixture Gaussian distribution between a Normal distribution with mean=0.2 and standard deviation σ=0.13, and a Γ distribution with the shape parameter 6.3 and a scale of 0.1, see the upper left panel of Fig. <ref>. For the Pantheon+ we still have a Gaussian Mixture distribution between a Normal with mean=0.12 and σ=0.11 and a log Normal with a mean of -0.66 and σ=0.38, see the upper right panel of Fig. <ref>. We have then checked that the distribution of the mock sample for μ/σ_μ for the Pantheon sample obtained from the mock redshift distribution resembling the observed sample is still a logistic distribution and for the Pantheon+ sample is still a T-student distribution. The lower left and right panels of Fig. <ref> show the best-fit distributions of μ/σ_μ superimposed in orange to the differential distributions for the Pantheon and Pantheon+ samples, respectively. As a comparison for both panels we have also shown the corresponding Gaussian fit in green in both panels. We have computed the μ with the theoretical formula in Equ. <ref> assuming a given cosmological model in the flat ΛCDM model. Specifically, we have tested three cases: Ω_M=0.3 and H_0=70 km s^-1 Mpc^-1, Ω_M=0.8 and H_0=65 km s^-1 Mpc^-1, and Ω_M=0.1 and H_0=80 km s^-1 Mpc^-1. We fit the mock data leaving both Ω_M and H_0 free to vary both with the Gaussian and the Logistic likelihood, see the upper and lower panels of Fig. <ref>, respectively, for Pantheon SNe Ia. We fit the Gaussian and the Student T likelihoods for Pantheon + SNe Ia again leaving both Ω_M and H_0 free to vary, see the upper and lower panels of Fig. <ref>, respectively. As it is shown in the figures all results with the observed distributions are confirmed by the results obtained with the mock samples. aasjournal
http://arxiv.org/abs/2303.06859v1
20230313050418
Learning Distortion Invariant Representation for Image Restoration from A Causality Perspective
[ "Xin Li", "Bingchen Li", "Xin Jin", "Cuiling Lan", "Zhibo Chen" ]
cs.CV
[ "cs.CV", "cs.MM", "eess.IV" ]
Learning Distortion Invariant Representation for Image Restoration from A Causality Perspective Xin Li1[1], Bingchen Li1[1], Xin Jin2, Cuiling Lan3[2], Zhibo Chen1[2] 1University of Science and Technology of China 2EIT Institute for Advanced Study 3Microsoft Research Asia {lixin666, lbc31415926}@mail.ustc.edu.cn, jinxin@eias.ac.cn, culan@microsoft.com, chenzhibo@ustc.edu.cn Received: date / Accepted: date ====================================================================================================================================================================================================================================================================================================== [1]Equal contribution [2]Corresponding Author In recent years, we have witnessed the great advancement of Deep neural networks (DNNs) in image restoration. However, a critical limitation is that they cannot generalize well to the real-world degradations with different degrees or types. In this paper, we are the first to propose a novel training strategy for image restoration from the causality perspective, to improve the generalization ability of DNNs for unknown degradations. Our method, termed Distortion Invariant representation Learning (DIL), treats each distortion type and degree as one specific confounder, and learns the distortion-invariant representation by eliminating the harmful confounding effect of each degradation. We derive our DIL with the back-door criterion in causality by modeling the interventions of different distortions from the optimization perspective. Particularly, we introduce the counterfactual distortion augmentation to simulate the virtual distortion types and degrees as the confounders. Then, we instantiate the intervention of each distortion with a virtually model updating based on corresponding distorted images, and eliminate them from the meta-learning perspective. Extensive experiments demonstrate the effectiveness of our DIL on the generalization capability on unseen distortion types and degrees. Our code will be available at <https://github.com/lixinustc/Casual-IR-DIL>. § INTRODUCTION Image restoration (IR) tasks <cit.>, including image super-resolution <cit.>, deblurring <cit.>, denoising <cit.>, compression artifacts removal <cit.>, etc, have achieved amazing/uplifting performances, powered by deep learning. A series of backbones are elaborately and carefully designed to boost the restoration performances for specific degradation. Convolution neural networks (CNNs) <cit.> and transformers <cit.> are two commonly-used designed choices for the backbones of image restoration. However, these works inevitably suffer from severe performance drops when they encounter unseen degradations as shown in Fig. <ref>, where the restoration degree in training corresponds to the noise of standard deviation 20 and the degrees in testing are different. The commonly-used training paradigm in image restoration, i.e., empirical risk minimization (ERM), does not work well for out-of-distribution degradations. Particularly, the restoration networks trained with ERM merely mine the correlation between distorted image I_d and its ideal reconstructed image I_o by minimizing the distance between I_o and the corresponding clean image I_c. However, a spurious correlation <cit.> is also captured which introduces the bad confounding effects of specific degradation d. It means the conditional probability P(I_o|I_d) is also conditioned on the distortion types or degrees d (i.e., d ⊥⊥ I_o|I_d). A robust/generalizable restoration network should be distortion-invariant (i.e., d ⊥⊥ I_o|I_d). For instance, given two distorted images with the same content I_c but different degradations d_1 and d_2, the robust restoration network is expected to recover the same reconstructed image I_o from these two distorted images (i.e., P(I_o|I_d, d=d_1)=P(I_o|I_d, d=d_2)), respectively. Previous works for the robustness of the restoration network can be roughly divided into two categories, distortion adaptation-based schemes, and domain adaptation/translation-based schemes. Distortion adaptation-based schemes <cit.> aim to estimate the distortion types or representations, and then, handle the different distortions by adaptively modulating the restoration network. Domain adaptation/translation-based schemes <cit.> regard different distortions as different domains, and introduce the domain adaptation/translation strategies to the image restoration field. Notwithstanding, the above works ignore the exploration of the intrinsic reasons for the poor generalization capability of the restoration network. In this paper, we take the first step to the causality-inspired image restoration, where novel distortion invariant representation learning from the causality perspective is proposed, to improve the generalization capability of the restoration network. As depicted in <cit.>, correlation is not equivalent to causation. Learning distortion invariant representation for image restoration requires obtaining the causal effects between the distorted and ideal reconstructed images instead of only their correlation. From the causality perspective, we build a casual graph for the image restoration process. As shown in Fig. <ref>, the distortions D including types D_t or degrees D_l are the confounders in IR, which introduces the harmful bias and causes the restoration process I_dI_o condition on D, since a spurious relation path is established via I_dDI_o. The causal connection we want between distorted and ideal reconstructed image is I_dI_o, of which the casual conditional probability can be represented as P(I_o|do(I_d)). Here, a “do" operation <cit.> is exploited to cut off the connection from the distortion D to I_d, thereby removing the bad confounding effects of D to the path I_dI_o, and learning the distortion-invariant feature representation (i.e., D ⊥⊥ I_o|I_d). There are two typical adjustment criteria for causal effects estimation <cit.>, the back-door criterion, and the front-door criterion, respectively. In particular, the back-door criterion aims to remove the bad confounding effects by traversing over known confounders, while the front-door criterion is to solve the challenge that confounders cannot be identified. To improve the generalization capability of the restoration network, we propose the Distortion-Invariant representation Learning (DIL) for image restoration by implementing the back-door criterion from the optimization perspective. There are two challenges for achieving this. The first challenge is how to construct the confounder sets (i.e., distortion sets). From the causality perspective <cit.>, it is better to keep other factors in the distorted image invariant except for distortion types. However, in the real world, collecting the distorted/clean image pairs, especially with different real distortions but the same content is impractical. Inspired by counterfactual <cit.> in causality and the distortion simulation <cit.>, we propose the counterfactual distortion augmentation, which selects amounts of high-quality images from the commonly-used dataset <cit.>, and simulate the different distortion degrees or types on these images as the confounders. Another challenge of implementing DIL stems from finding a stable and proper instantiation scheme for back-door criterion. Previous works <cit.> have incorporated causal inference in high-level tasks by instantiating the back-door criterion <cit.> with attention intervention <cit.>, feature interventions <cit.>, etc, which are arduous to be exploited in the low-level task of image restoration. In this work, we theoretically derive our distortion-invariant representation learning DIL by instantiating the back-door criterion from the optimization perspective. Particularly, we model the intervention of simulated distortions for the restoration process by virtually updating the restoration network with the samples from the corresponding distortions. Then, we eliminate the confounding effects of distortions by introducing the optimization strategy from Meta Learning to our proposed DIL. In this way, we can instantiate the causal learning in image restoration and enable the DIL based on the back-door criterion. The contributions of this paper are listed as follows: * We revisit the image restoration task from a causality view and pinpoint that the reason for the poor generalization of the restoration network, is that the restoration network is not independent to the distortions in the training dataset. * Based on the back-door criterion in causality, we propose a novel training paradigm, Distortion Invariant representation Learning (DIL) for image restoration, where the intervention is instantiated by a virtually model updating under the counterfactual distortion augmentation and is eliminated with the optimization based on meta-learning. * Extensive experiments on different image restoration tasks have demonstrated the effectiveness of our DIL for improving the generalization ability on unseen distortion types and degrees. § RELATED WORKS §.§ Image Restoration Image Restoration (IR) <cit.> aims to recover high-quality images from the corresponding distorted images, which plays a prominent role in improving the human visual experience. With the advancement of deep learning, a series of works have achieved remarkable progress in lots of IR tasks, including image denoising <cit.>, deblurring <cit.>, super-resolution (SR) <cit.>, etc. Particularly, most of them are devoted to elaborately designing the frameworks for different IR tasks based on their degradation process, which can be roughly divided into two categories, CNN-based framework <cit.>, and Transformer-based framework <cit.>. Despite that, the above works only explore how to improve the ability of inductive bias toward specific degradation, which lacks enough generalization capability. To improve the model's robustness, some works seek to incorporate the domain translation <cit.> or distortion-adaptive learning <cit.> into image restoration. In contrast, we introduce causal learning <cit.> to image restoration. We answer the reason for the bad robustness of the restoration network and propose distortion-invariant representation learning from a causality perspective. §.§ Causal Inference Causal Inference is proposed to eliminate the harmful bias of confounders and discover the causal relationship between multiple variables <cit.>. A do operation is implemented with adjustment criteria, e.g., front-door or back-door, to estimate the causal effects <cit.>. In recent years, deep learning has boosted the vast development of a series of intelligent tasks, e.g., image classification <cit.>, segmentation <cit.>, detection <cit.>, low-level processing <cit.>. However, prominent works focus on fitting the correlation between inputs and their outputs while ignoring the causation. Due to the existence of confounders, the networks are easy to capture the spurious correlation between inputs and their outputs. For instance, if most lions lie in the grass in the training data, the model inevitably mistakes the grass for a lion. To get rid of the harmful bias of confounders, some studies seek to incorporate casual inference into deep learning. <cit.> model the interventions of confounders from the feature perspective <cit.> integrate the front-door criterion to vision-language task from the attention perspective. To improve the generalization capability, <cit.> introduce the causal learning to domain adaptation/generalization. However, the above causality-inspired methods merely focus on the high-level tasks. In this paper, for the first time, we investigate the causality-based image restoration, which aims to improve the generalization capability of restoration networks on different distortion types and degrees. § METHODS §.§ A Causal View for Image Restoration Image restoration aims to restore the distorted images, of which the degradation process can be represented as a function I_d = g(I_c, D). Here, I_c, I_d, D denotes the clean, distorted images, and distortions, respectively. A restoration network f is trained with the loss function to minimize the difference between its ideal reconstructed images I_o and the original clean image I_c. We model this whole process with a causal structure graph as shown in Fig. <ref>. Here, DI_d I_c denotes the degradation process of I_d = g(I_c, D). I_c I_o denotes I_o is learned with the supervision of I_c by maximizing the probability of P(I_c|I_o). In addition, DI_o refers to the knowledge learned from D to I_o. I_dI_o means the restoration process with restoration network f. From the causality perspective, the casual representation of image restoration requires that the restoration network f obtains the causal relationship between I_dI_o (i.e., P(I_o|do(I_d))). However, there are two extra paths I_dDI_o and I_dI_cI_o introducing the spurious correlation to I_d and I_o, where I_c and D are confounders in causality. Importantly, the I_c are commonly diverse in the datasets and bring more vivid textures to reconstructed image I_o, which is a favorable confounder. We do not take into account of the confounder I_c in our paper. We aim to improve the robustness of the restoration network to unseen or unknown distortions, which are inhibited by the bad confounding effects from confounders D. But, how do the confounders D limit the generalization capability of the restoration network? As shown in Fig. <ref>, the existing of I_dDI_o causes the conditional probability P(I_o|I_d) learned by restoration network f is also condition on distortions D, i.e., the fitting conditional probability of f is in fact as P(I_o|I_d, D). Consequently, the restoration network f is not robust to different distortions due to that it is not independent of different distortions D. A robust restoration network f should be independent of different distortions (i.e., D⊥⊥ I_o|I_d). To achieve this, we adopt the back-door criterion in causal inference to realize distortion-invariant learning (DIL). We formulate the back-door criterion in image restoration as Equ. <ref>. P(I_o|do(I_d)) = ∑_d_i∈ D P(I_o|I_d, d_i)P(d_i), P(d_i)=1/n, where the casual conditional probability P(I_o|do(I_d)) is the optimization direction for restoration network f towards distortion invariant learning. To simplify the optimization, we set the probability of each distortion d_i as 1/n, where n is the number of distortion types and degrees that existed in confounders. From Equ. <ref>, two crucial challenges for achieving it arise. 1) How to construct the virtual confounders (i.e., different distortion types or degrees)? since collecting different real distorted images with the same contents are nontrivial in the real world. 2) How to instantiate the intervention of different distortions to the reconstruction process (i.e., the P(I_o|I_d, d_i)) in image restoration. We achieve this through counterfactual distortion augmentation and distortion-invariant representation learning as described in the following sections. §.§ Counterfactual Distortion Augmentation To learn the distortion-invariant representation for the restoration network, it is vital to construct the distortion set D (i.e., confounders). For instance, if we expect the restoration network to have the generalization capability for different distortion degrees, we require to construct the distortion set D with the distortions at different levels. Similarly, we can increase the generalization capability of the restoration network for unknown distortion types by constructing the D with different but related distortion types. Furthermore, to avoid the effects of different image contents, it is better for each clean image to have corresponding distorted images with various distortion types or degrees in D. However, it is non-trivial to collect datasets that satisfy the above principles in the real world, which is labor-intensive and arduous. In this paper, we construct the distortion set D with synthesized distortions, which we can call them virtual confounders in causality. Concretely, we collected a series of high-quality images I_c, and generated the distorted images by modifying the degradation process as I_d=g(I_c, d_i), d_i∈ D. We can also prove the rightness of the above distortion augmentation from the counterfactuals in causlity <cit.>, where we answer the counterfactual question that “if D is d_i, what the I_d would be with I_c invariant?". The proof can be found in the Supplementary. §.§ Distortion-invariant Representation Learning After constructing the virtual confounders/distortions set D={d_i|1 ≤ i≤ n}. We are able to achieve the distortion-invariant representation learning by implementing the back-door criterion as Eq. <ref> for image restoration. Let us first introduce the relationship between the probability P(I_o|I_d) and the commonly-used training paradigm ERM (empirical risk minimization). In image restoration, an ideal reconstruction I_o is expected to learn by maximizing the condition probability P(I_o|I_d) with loss function as ℒ(f_θ(I_d), I_c), where f_θ is the restoration network with the parameters θ and L denotes the loss function, such as the commonly-used ℒ_1 or ℒ_2 loss. The ERM is used to optimize the network f_θ (with parameters denoted by θ) by minimizing the loss function overall training dataset 𝒟={I_d, I_c|d∈ D} as: θ^* = min_θ𝔼_(I_d,I_c)∼𝒟 [ℒ (f_θ(I_d), I_c)], where θ^* enables the restoration network f to maximize the P(I_o|I_d)≈ P(I_c|I_d). However, the above training process also leads the P(I_o|I_d) to be not independent to the distortions d ∈ D in the training dataset 𝒟, which eliminate the generalization ability of f on the out-of-distribution distortions (i.e.,, when d ∉D). To achieve the distortion-invariant representation learning, we aim to maximize the causal conditional probability P(I_o|do(I_d)) as instead of P(I_o|I_d). The key challenge stems from how to model the conditional probability P(I_o|I_d, d_i) in Eq. <ref> (i.e., how to model the intervention from the distortion d_i∈ D for the restoration process P(I_o|I_d)). In this paper, we propose to model the intervention from d_i∈ D to the restoration process (i.e., P(I_o|I_d, d_i)) through the optimization of the network parameters θ. From the above analysis, we know that the restoration network f_θ trained with ERM on the paired training data (I_d_i, I_c) is condition on the distortion d_i. This inspires us to instantiate the intervention of different distortion types or degrees d_i∈ D through updating the model parameter θ to ϕ_d_i based on ERM with the training distorted-and-clean image pairs (I_d_i, I_c) as: ϕ_d_i = θ - α∇_θℒ(f_θ(I_d_i), I_c), where ϕ_d_i denotes the parameters of the restoration network after one-step update, which is conditioned on the confounder d_i. Consequently, the maximum of the conditional probability P(I_o|I_d, d_i) can be obtained by minimizing the loss ℒ(f_ϕ_d_i(I_d), I_c). The optimization direction toward maximizing the causal condition probability P(I_o|do(I_d)) in Eq. <ref> can be derived as: θ^* = min_θ𝔼_(I_d, I_c)∼𝒟[ ∑_d_i∈ Dℒ(f_ϕ_d_i(I_d), I_c)], where D denotes the confounder set which contains n distortion degrees or types. Based on the above optimization objective, we learn distortion-invariant representation learning from a causality perspective. §.§ Implementations of DIL from Meta-Learning An interesting finding is that the derived optimization direction of DIL from causality perspective in Eq. <ref> is consistent with one typical meta-learning strategy termed as MAML <cit.>, even they have different purposes. MAML aims to enable the fast adaptation capability of a network for few-shot tasks, while ours aims to improve the generalization capability of the restoration network. We facilitate our DIL in image restoration based on this meta-learning strategy. However, it is arduous to directly incorporate the optimization direction of Eq. <ref> into the practical training process, which is computationally prohibitive. The reason is that it requires multiple gradient computing and updating, which is expensive, especially for the pixel-wise image restoration. To simplify this process, we utilize the Talyor expansion and inverse expansion to derive Eq. <ref> as: θ^* = min_θ𝔼_(I_d, I_c)∼𝒟 [ ℒ(f_ϕ_d(I_d), I_c)], where  ϕ_d= θ - α∇_θ∑_d_i∈ D1/nℒ(f_θ(I_d_i), I_c), where ϕ_d denotes the parameters of restoration network f that is virtually updated with loss function with samples overall all distortions D={d_i}, 1≤ i ≤ n. We define it as parallel sampling for DIL, which reduces the complex training process of DIL to two steps. In this paper, we call the original sampling strategy as serial sampling. The comparison between serial sampling and parallel sampling are shown in Fig. <ref>. The detailed derivation for Eq. <ref> are described in the Supplementary. We also investigate two different gradient updating strategy for DIL. From Eq. <ref> and Eq. <ref>, we can observe that they require the second-order gradient since the gradient is computed with two-step forward through ϕ_d_i, which is shown in Fig. <ref>. To simplify it, Reptile <cit.> proposes an alternative strategy (i.e., approximating the second-order gradient by the sequential parameter updating with one-order gradient. The optimization direction (i.e., gradient) is computed with the deviation between the initial and last-step parameters. We integrate it into our DIL and call it first-order optimization. In contrast, the original optimization in Eq. <ref> is termed second-order optimization. In summary, we propose four variants for DIL following the above two strategies. DIL_sf adopts the serial sampling and first-order gradient optimization. DIL_pf utilizes the parallel sampling and first-order optimization. DIL_ss/DIL_ps exploits the second-order optimization and serial/parallel sampling. § EXPERIMENTS In this section. we first describe the implementation details. Then, we validate the effectiveness of our DIL from two typical out-of-distribution settings, i.e., Cross Distortion Degrees, and Cross Distortion Types. Particularly, for cross-distortion degrees, we train the restoration network with seen distortion degrees while testing it with unseen distortion degrees. For cross-distortion types, the restoration network is trained with synthesized distortions and validated on the corresponding real-world or other distortions. §.§ Implementation We adopt the typical RRDB <cit.> as our image restoration backbone, which has demonstrated remarkable performances towards various low-level image tasks <cit.>. All the experiments are done with four NVIDIA 2080Ti GPUs. Adam optimizer is adopted to optimize network parameters in both ERM and DIL training paradigms. More details are given in the Supplementary. §.§ Cross Distortion Degrees Results on Image Denoising. For image denoising, the training data are composed of distorted images with noise levels [5, 10, 15, 20] and their corresponding clean images. After training the restoration network, we validate it on the test datasets with unseen noise degrees, including [30, 40, 50]. We compare the empirical risk minimization (ERM) and four variants of our proposed DIL, i.e., DIL_sf, DIL_pf, DIL_ss, and DIL_ps, respectively. The experimental results are shown in Table <ref>. We can observe that all four variants of DIL achieve great generalization ability on multiple unseen noise levels compared with commonly-used empirical risk minimization (ERM). On several typical scenarios, including natural images (i.e., CBSD68 <cit.>, Kodak24 <cit.>, McMaster <cit.>), building images (Urban100 <cit.>), cartoon images (i.e., Manga109 <cit.>), our DIL even outperforms the ERM by a promising/amazing gain of 8.74 dB at most. Moreover, with the increase of the distribution gap between training and testing data, ours can achieve larger improvements for ERM. Furthermore, for cross distortion degree, DIL_sf shows the best generalization capability compared with the other three variants by serial sampling and first-order optimization. We also visualize the reconstructed images of the above methods in Fig. <ref>. For the unseen distortion degree (σ=30), the ERM cannot remove the noise well and the reconstructed image also contains obvious noise distortion. However, our DIL_sf enables the restoration network to recover more vivid and clean images from the unseen noise degrees, which validates the correctness and effectiveness of our proposed DIL. Results on Image Deblurring. We also validate the generalization capability of our DIL on the challenging image deblurring. Under this scenarios, we train the restoration network with our proposed DIL with the gaussian blurring level [1.0, 2.0, 3.0, 4.0], and validate its generalization capability on the more severe and difficult blurring levels, including 4.2, 4.4, 4.6, 4.8, and 5.0. As shown in Table. <ref>, we validate our DIL on five benchmark datasets, including Set5 <cit.>, Set14 <cit.>, BSD100 <cit.>, Urban100 <cit.>, and Manga109 <cit.>. With the increase of blurring level, the restoration network trained with ERM suffers from a severe performance drop, since the unseen blurring levels are far away from the blurring levels used for training. But our DIL can improve ERM on each unseen blurring level for five datasets. In particular, we achieve the gain of 2.09 dB for the cartoon scene Manga109 <cit.> on the blurring level 5.0. Results on Hybrid-distorted Image Restoration. Except for the above single distortion, we also explore the generalization capability of our DIL on hybrid-distorted image restoration. Following <cit.>, the hybrid distorted images are degraded with blur, noise, and Jpeg compression in a sequence manner. Based on the distortion degree, it can be divided into three levels from low to high, i.e., mild, moderate, and severe. In this setting, the restoration network is trained with severe hybrid distortions and validated on the mild and moderate levels. As shown in Table <ref>, our DIL achieves an average gain of 1.05 dB, and 0.66 dB on the mild-level, and moderate-level hybrid distortions than ERM, which has a large distribution gap with severe-level hybrid distortions. We can also notice that with the increase of the distribution gap, ours can preserve more performances on the restoration of the out-of-distribution distortions. We also conduct the subjective comparison of our methods with the commonly-used ERM in Fig. <ref>. We can observe that the restoration network trained with ERM suffers from new artifacts for unseen hybrid-distorted images. But our DIL can eliminate the artifacts well and generate more promising results. §.§ Cross Distortion Types In this section, we investigate the effects of our proposed DIL on the cross-distortion type setting, which is more challenging than the cross-degree setting. Results on Real Image Super-resolution Real Image Super-resolution (RealSR) has attracted great attention since it is urgently required in real life, where the distorted image contains complex hybrid distortions, such as blurring, low resolution, noise, etc. However, the distorted/clean pairs for RealSR are hard to be collected. Simulating distortions like Real-world distortion has been a popular solution for RealSR <cit.>. In this paper, we follow the Real-ESRGAN <cit.> and utilize its proposed RealSR distortion simulating to generate image pairs as training datasets. Then we test the restoration network on the out-of-distribution datasets, RealSR V3 <cit.>, DRealSR <cit.>, which are two commonly-used datasets for RealSR evaluation. We show the experimental results on RealSR in Table. <ref>. Without access to any training samples in RealSR V3, DRealSR, our DIL_sf can outperform the ERM by 0.29dB on RealSR V3 <cit.> and 0.26dB on DRealSR dataset <cit.>. Particularly, we notice that DIL_ps is more suitable for cross-distortion type scenarios than DIL_sf, which exceeds the ERM by a 0.47dB on RealSR V3, and 0.85dB on DRealSR dataset. The reason for that we guess is that DIL_ps is more capable of improving the generalization for the large distribution gap in image restoration. We also visualize the comparison corresponding to the subjective quality for different methods. As shown in Fig. <ref>, Real-ESRNet <cit.> and BSRNet <cit.> cause the overshooting at the edge of the text. But our DIL_ps can eliminate the artifacts and achieve a high-quality restoration Results on Real Image Denoising. We also study the generalization capability of our training paradigm DIL on the Real Image Denoising task. Concretely, we select four synthesized distortions based on four categories of color space among camera ISP process <cit.>, and generate training image pairs from DF2K <cit.> in an online manner. Then we verify its generalization on the commonly-used Real Denoising dataset SIDD <cit.> and DND <cit.>. As Table <ref> illustrated, our DIL_ps achieves the PSNR of 39.92 dB, which outperforms the ERM by 1.02dB, which is almost the same with DIL_sf. Results on Image Deraining. As an extension experiment, we introduce our DIL to the experiments of image deraining task. Particularly, the raining types and degrees between different datasets are severely different in image deraining. Here, we optimize the restoration network with three image deraining datasets, including DID-MDN <cit.>, Rain14000 <cit.>, and Heavy Rain Dataset <cit.>. Then we validate the generalization capability of the restoration network on three unseen deraining datasets, i.e., Rain100L <cit.>, Rain12 <cit.>, and Rain800 <cit.>. We report the experimental results in Table <ref>. Our DIL (DIL_ps) enables the restoration network to have a better generalization capability than ERM, which obtains a gain of 0.76dB on Rain100L <cit.> and 1.63dB on Rain12 <cit.> dataset. §.§ Ablation Studies Impact of different restoration networks. We demonstrate the effectiveness of DIL across different network backbones. In addition to the convolution-based RRDB <cit.> network, we also incorporate our DIL into the transformer-based SwinIR <cit.>. The performances are reported in Table <ref>, which reveals that our DIL can also improve the generalization capability of Transformer-based backbones. This study reveals our DIL is a general training paradigm for different backbones. Effects of different variants for DIL As shown in Table. <ref>,and <ref>, we can observe that DIL_sf is more proper for cross-distortion degrees. But for cross-distortion types, DIL_ps achieves better performance for RealSR and Image Deraining. It is noteworthy that the distribution gap of different distortion types is larger than different degrees. The first-order optimization is more stable but lacks enough capability for a severe distribution gap compared to second-order optimization. But all of them are competent in improving the generalization capability. § DISCUSSION ON LIMITATIONS The performance on training data. We also report the performance of our DIL on the seen training data in Table <ref>. It can be seen that our DIL will cause a slight performance drop but the generalization capability is improved obviously. The reason for that is our DIL implements distortion invariant representation learning, which prevents the restoration network from over-fitting to the training data. The impact of different distortion augmentation. As shown in Table <ref>, despite that our DIL achieves the improvement of the generalization capability. The final generalization performance is still related to the distortion augmentation strategy. It is vital to find a universal distortion augmentation strategy, which requires more exploration. We believe it will be a potential/important direction to improve the generalization ability of the restoration network. § CONCLUSION In this paper, we propose a novel distortion invariant representation learning (DIL) training paradigm for image restoration from the causality perspective. In particular, we provide a causal view of the image restoration process, and clarify why the restoration network lacks the generalization capability for different degradations. Based on that, we treat the distortion types and degrees as confounders, of which the confounding effects can be removed with our proposed DIL. Concretely, we produce the spurious confounders by simulating the different distortion types and degrees. Then, an instantiation of the back-door criterion in causality is introduced from the optimization perspective, which enables the restoration network to remove the harmful bias from different degradations. Extensive experiments on the settings, cross distortion degrees, and cross distortion types, have demonstrated that our DIL improves the generalization capability of the restoration network effectively. § ACKNOWLEDGEMENTS This work was supported in part by NSFC under Grant U1908209, 62021001, and ZJNSFC under Grant LQ23F010008. ieee_fullname § APPENDIX Section <ref> provides the systematic introduction for the related notations of the back-door criterion in casual learning. Section <ref> explains the counterfactual distortion augmentation from the causality perspective. Section <ref> theoretically derives the parallel sampling in Eq. 5 of our paper. Section <ref> clarifies the implementations of four variants of our DIL, which can help the readers to reproduce our methods more easily. Section <ref> describes the more detailed experimental settings and the construction of distortion/confounder set D in different image restoration tasks. Section <ref> visualizes more subjective comparisons on different image restoration tasks. § THE BACK-DOOR CRITERION IN CAUSALITY. In this section, we clarify the related notations and derivations for the back-door criterion in causality. Structure causal Model. As described in <cit.>, we can describe the causal relationship between different vectors with a directed Structural Casual Model (SCM) like Fig. <ref>. A directed arrow XY represent X is the cause of the Y. The difference between correlation and causation is as follows: 1) In causation, given XY, changing the X will cause the effect on Y. But changing Y does not have an effect on X since Y is not the cause of X. 2) In correlation, we can compute the correlation between X and Y with conditional probability P(Y|X) and P(X|Y) no matter whether there is causation between X and Y. In general, model training in deep learning is a process to fit the correlation between inputs and their labels instead of the causation. Confounder. The confounder is defined based on the SCM, which represents the variables (e.g., C in Fig. <ref>) that are the common cause between two other variables (e.g., X and Y in Fig. <ref>). The fork connection XCY causes the spurious correlation for X and Y, which has a confounding effect on the estimation of the causal relationship between X and Y. In other words, the correlation between X and Y learned by the model also is implicitly conditioned on the confounder C. do operation. A do operation means to cut off the connection from the CX, which is shown in Fig. <ref>. In this way, the correlation introduced from the path XCY is removed from do operation. Then the correlation learned by the model is only from the XY, which are represented as P(Y|do(X)). And this causal correlation is independent of the confounder C and is what we expect the model to learn. Back-door criterion. The back-door criterion is proposed in <cit.>, which aims to implement the do operation and eliminate the spurious correlation existed in XCY. It removes the confounding effects of confounder C by computing the average casual effects between XY by traversing all values of C as: P(Y|do(X)) = ∑_c P(Y|X,C=c)P(C=c) Based on Eq. <ref>, we can achieve the do operation in Fig. <ref> (b). The back-door criterion in Image Restoration As shown in Fig. 2 in our paper, we model the image restoration process as a structural causal model, where D={d_i|1≤ i ≤ n} are the confounders between the distorted images I_d and the expected reconstruction images I_o, which satisfies the back-door criterion. Therefore, we can derive the back-door criterion in image restoration as: P(I_o|do(I_d)) = ∑_i=1^n P(I_o|I_d,D=d_i)P(D=d_i) § A PROOF FOR COUNTERFACTUAL DISTORTION AUGMENTATION. The conterfactuals aims to answer the question "“if X been x, in the situation U, what Y_X=x(U) would be?". The three variables are in the same structural causal model (SCM), and X and U are the cause of Y. As described in  <cit.>, the calculating of counterfactuals follows three steps: 1) Abduction: Use evidence e to determine the value of U. 2) Action: Remove the structural equations for the variables X to modify the model M (i.e., the SCM). Then, set the X as X=x to obtain the modified M_x. 3) Prediction: Use the M_x and U=u to compute the value of Y (i.e., the consequence of the counterfactual). Considering the generation process of the distorted images I_d = g(I_c, d), where I_c and d are the clean images and distortion type/degree, respectively. g is the degradation process. The generation process can be modeled as a structural causal model I_cI_dd. To construct the datasets for the training of DIL, it is better to collect various distorted/clean image pairs with different distortions but the same content. However, in the real world, it is non-trivial to collect the datasets to satisfy this. Therefore, we can construct the ideal datasets by answering the counterfactual question “if D is d_i, what the I_d would be with I_c invariant?". We call the construction counterfactual distortion augmentation. Analogously, the computing of counterfactuals in distortion augmentation follows a three-step procedure. 1) Abduction: Use the distorted image I_d to determine the value of I_c, i.e., P(I_c|I_d). 2) Action: Modify the degradation model, g, so that D is adjusted to the counterfactual value d_i, that might rarely existed in real-world (e.g., the synthesised distortions). 3) Prediction: Compute the consequence I_d_i of the counterfactual based on estimated I_c and modified degradation model g_d_i. It is fortunate that there are amounts of high-quality images captured by professional devices, that are only degraded by some extremely mild distortions. We can regard these images as clean images I_c. Therefore, the first step in counterfactuals is unnecessary and can be ignored. We can implement the counterfactual distortion augmentation by adding different synthetic distortion types or degrees to the same image contents I_c. § THE DERIVATION OF THE PARALLEL SAMPLING. In this section, we will give the derivation of our parallel sampling in Eq. 5 of our paper. From Eq. 3 and Eq. 4 in our paper as: θ^* = min_θ𝔼_(I_d, I_c)∼𝒟[ 1/n∑_d_i∈ Dℒ(f_ϕ_d_i(I_d), I_c)], where ϕ_d_i = θ - α∇_θℒ(f_θ(I_d_i), I_c) we can conduct the Taylor expansion for the above equation at position θ as: θ^* = min_θ𝔼_(I_d, I_c)∼𝒟{1/n∑_d_i∈ D[ ℒ(f_θ(I_d), I_c) - α∇_θℒ(f_θ(I_d_i), I_c) ∇_θℒ(f_θ(I_d), I_c) +o(∇_θℒ(f_θ(I_d), I_c))] } = min_θ𝔼_(I_d, I_c)∼𝒟{ℒ(f_θ(I_d), I_c) -1/n∑_d_i∈ Dα[∇_θℒ(f_θ(I_d_i), I_c)]∇_θℒ(f_θ(I_d), I_c) +o(∇_θℒ(f_θ(I_d), I_c))] }} = min_θ𝔼_(I_d, I_c)∼𝒟{ℒ(f_θ(I_d), I_c) -α∇_θ [∑_d_i∈ D1/nℒ(f_θ(I_d_i), I_c)]∇_θℒ(f_θ(I_d), I_c) +o(∇_θℒ(f_θ(I_d), I_c))] }} Then we conduct the Taylor inverse expansion for the Eq. <ref>. The Eq. <ref> can be derived as: θ^* = min_θ𝔼_(I_d, I_c)∼𝒟[ ℒ(f_(θ-α∇_θ∑_d_i∈ D1/nℒ(f_θ(I_d_i), I_c))(I_d), I_c)] Let ϕ_d= θ - α∇_θ∑_d_i∈ D1/nℒ(f_θ(I_d_i), I_c), we can obtain the final equation as Eq. 5 of our paper as: θ^* = min_θ𝔼_(I_d, I_c)∼𝒟 [ ℒ(f_ϕ_d(I_d), I_c)], where  ϕ_d= θ - α∇_θ∑_d_i∈ D1/nℒ(f_θ(I_d_i), I_c), § THE DETAILED ALGORITHMS ON FOUR VARIANTS OF DIL. We further demonstrate the algorithm details of four variants of our proposed DIL in the Alg. <ref> (DIL_ps), Alg. <ref> (DIL_ss), Alg. <ref> (DIL_pf), and Alg. <ref> (DIL_sf). As derived in Eq. <ref>, we can utilize the parallel data sampling for all distortions D to substitute the serial sampling based optimization. The implementation differences between the two sampling strategies can be observed by comparing the Line 5-6 in the Alg. <ref> and Line 5-9 in the Alg. <ref>. We can find that parallel sampling can reduce the number of parameter updating by 1/n. By comparing the Alg. <ref> and Alg. <ref>, we can find that only first-order gradient existed in the DIL_pf, which is an approximation of the second-order optimization in Alg. <ref>. The related proof can be found in the <cit.>. § IMPLEMENTATION DETAILS. §.§ Overall Settings. For all image restoration tasks (except for the image deraining task) in this paper, we use 800 images from DIV2K <cit.> and 2650 images from Flickr2K <cit.> as the clean images to construct the datasets for training. Following the common setting <cit.>, In the training process, we randomly crop the distorted/clean image pairs with the size of 64×64 from the training images, and feed them to the restoration network to optimize the parameters. In the process of the counterfactual distortion augmentation, the distorted patches I_d are generated online according to distortion set D of different image restoration tasks. For ERM, we use Adam optimizer with β_1=0.9 and β_2=0.999. For DIL_sf and DIL_pf training paradigms, the same Adam optimizer with ERM is used for the training optimization for the above two variants. For the virtual updating process, we adopt the Adam optimizer with β_1=0 and β_2=0.999 following <cit.>. For DIL_ss and DIL_ps, we utilize the same two Adam optimizers as that used in ERM for the virtual updating step and training optimization step. We set the batch size to 8 on each GPU. The total training iterations and initial learning rate are set to 400K and 1e-4, respectively. The learning rate will reduce by half at [200K, 300K]. All the tasks are optimized with the L1 loss if not mentioned. In the image deraining task, we utilize Charbonnier <cit.> Loss as: ℒ_char = √(I_o - I_c^2 + ϵ^2) where I_o and I_c denotes the reconstructed images and clean images, respectively. Following previous works <cit.>, we set ϵ to 1e-3. §.§ The distortion/confounders set D for different tasks. In this section, we describe the specific construction of the distortion/confounder set D in the counterfactual distortion augmentation strategy. §.§.§ Cross distortion degrees Image Denoising. For image denoising, the distortion/confounder set is composed of Additive White Gaussian Noise (AWGN) with the noise intensity of [5, 10, 15, 20], which is added to the clean images from DF2K <cit.> to construct the training data. For testing, we utilize several unseen noise intensities, including [30, 40, 50] to estimate the generalization capability of different schemes. Image Deblurring. For image deblurring, we obtain I_d by applying the distortion/confounding set D to I_c, which contains the 2D gaussian filter with different blurring sigma of [1.0, 2.0, 3.0, 4.0]. For testing, we validate the generalization capability of different schemes on the sigma [4.2, 4.4, 4.6, 4.8, 5.0]. Hybrid distortion restoration. Following the <cit.>, the hybrid distortions are degraded with the superposition of blur, noise, and Jpeg compression artifacts in a sequence manner. The distortion/confounder set D for training is composed of multiple levels of severe hybrid distortions. The test datasets are composed of unseen distortion levels, including mild and moderate hybrid distortions. §.§.§ Cross distortion types Real Image Super-resolution. For real image super-resolution, we utilize the degradation model introduced by <cit.> for training. To simplify the training process, we adopt the one-order distortion synthesis mode in  <cit.> to construct the distortion/confounder set D, where different d_i∈ D are divided with different noise types and blur types in the degradation model of <cit.>. To validate the generalization capability of different schemes for the “cross distortion types", we exploit the RealSR <cit.> and DRealSR <cit.> for the real image super-resolution as our test data. Real Image Denoising. For real image denoising, we obtain I_d based on the ISP process introduced by <cit.>. We divide this degradation model into four different distortion types based on the different color filter arrays (CFA) to construct D. We follow previous works <cit.> and utilize real denoising datasets DND <cit.> and SIDD <cit.> as the benchmarks to validate the generalization capability of different schemes. Image Deraining. For image deraining, we utilize three datasets with three different raining types, including Rain14000 <cit.>, DID-MDN <cit.>, and Heavy Rain Dataset <cit.>, to construct the training data 𝒟, and test the generalization capability of the restoration network on other three unseen raining types, including 100 rainy images from Rain100L <cit.>, 100 rainy images from Rain800 <cit.>, and 12 rainy images from Rain12 <cit.>. It is noteworthy that the synthesis strategies of the above raining types are rarely released. Therefore, in this task, we relax the content consistency between different raining types for training. And our DIL is still effective for improving the generalization capability of the restoration network. § MORE SUBJECTIVE VISUALIZATION We provide more visual comparisons for different image restoration tasks in this section. As shown in Fig. <ref>, the commonly-use ERM and our proposed DIL all achieve similar reconstructed results on the seen noise level (σ=15). But ERM fails to restore high-quality images on unseen noise levels well, (e.g., σ=40 and σ=50), which indicates that ERM lacks of enough generalization ability for the unseen distortion degrees. In contrast, our DIL_sf can recover noise-free and structure-preserved images despite the distortion degrees do not exist in the training data. This further proves the correctness and effectiveness of our proposed DIL. We show more visual comparisons of image deblurring in Fig. <ref>. When dealing with unseen blur degrees, our proposed DIL can restore the clear structures, while ERM produces overshooting artifacts on the edges. More visualizations for real image denoising can be found in Fig. <ref>. And more visualizations for image deraining can be found in Fig. <ref>. We also visualize the subjective comparisons on hybrid-distorted image restoration in Fig. <ref>.
http://arxiv.org/abs/2303.06739v1
20230312194428
Extreme values of Dirichlet polynomials with multiplicative coefficients
[ "Max Wenqiang Xu", "Daodao Yang" ]
math.NT
[ "math.NT", "math.PR" ]
Dirichlet polynomials with multiplicative coefficients]Extreme values of Dirichlet polynomials with multiplicative coefficients Department of Mathematics, Stanford University, Stanford, CA, USA maxxu@stanford.edu Institute of Analysis and Number Theory Graz University of Technology Kopernikusgasse 24/II, A-8010 Graz Austria yang@tugraz.at yangdao2@126.com We study extreme values of Dirichlet polynomials with multiplicative coefficients, namely D_N(t) : = D_f, N(t)= 1/√(N)∑_n⩽ N f(n) n^it, where f is a completely multiplicative function with |f(n)|=1 for all n∈ℕ. We use Soundararajan's resonance method to produce large values of |D_N(t)| uniformly for all such f. In particular, we improve a recent result of Benatar and Nishry, where they establish weaker lower bounds and only for almost all such f. [ Daodao Yang =============== § INTRODUCTION Resonance methods are very successful in giving extreme values of arithmetic functions. The earliest applications of resonance methods can at least be traced back to Voronin's work in <cit.>. A more general and powerful version of the resonance method was introduced by Soundararajan in <cit.> which was successful in finding extreme values of zeta and L functions. There have been many further developments and applications of the method, we refer readers to <cit.> and references therein. In this paper, we study the extreme values of Dirichlet polynomials with multiplicative coefficients. Let be the set of completely multiplicative functions f with |f(n)|=1 for all n ∈. Let D_N(t) : = D_f, N(t)= 1/√(N)∑_n⩽ N f(n) n^it. Let D_f, N(t) be defined as above. Let δ, γ∈ (0, 1) be fixed. Let T=N^C(N) where C(N) satisfies 2/δ⩽ C(N)⩽ (log N)^γ . Then for sufficiently large N, we have sup_|t|⩽ T |D_f, N(t)| ⩾exp( √((1-δ)log T/loglog T)) , uniformly for all f ∈. A Steinhaus random multiplicative function (n) is a completely multiplicative function and (p) are independent random variables taking value on the complex unit circle for all primes p. Another way to state Theorem <ref> is that is the family of all possible Steinhaus random multiplicative functions. In particular, for all , and all large N, sup_|t|⩽ N^C(N)|1/√(N)∑_n⩽ N(n) n^it| ⩾exp( √((1-δ)log T/loglog T)) ⩾exp( √(( 1-δ/1+γ)C(N) log N/loglog N)). This improves the lower bound obtained in a recent interesting paper <cit.> where they have (loglog N)^4 instead of our loglog N in the denominator. Our result is stronger also in the sense that the bound holds uniformly for all f, rather than just almost all f as in <cit.>. We remark that the multiplicativity of (n) is crucial here. Without it, the extreme values are significantly smaller (see <cit.> for more discussions). We refer readers to recent results in extreme values of sums of random multiplicative functions to <cit.>. § PROOF OF THEOREM <REF> Our method was initialed by Soundararajan in <cit.>. We first set up the framework by using the resonance method. Let R(t):= ∑_n⩽ Xr_f(n)n^it where X= T^1-2δ/3, where r_f(n) is a function defined on integers. As in <cit.>, we define Φ: ℝ→ℝ to be a smooth function, compactly supported in [1/2, 1], with 0 ⩽Φ(y) ⩽ 1 for all y, and Φ(y)=1 for 5/8⩽ y⩽ 7/8. Let M_1(R, T): = ∫_-∞^+∞ |R(t)|^2Φ(t/T) dt, and M_2 (R, T): = ∫_-∞^+∞ |R(t)|^2Φ(t/T) |D_N(t)|^2 dt . Then sup_|t|⩽ T |D_N(t)| ⩾√(M_2(R, T)/M_1(R, T)). The quantity M_1(R, T) has a nice expression. We have M_1(R, T) = TΦ̂(0) (1 + O(T^-1) ) ∑_n⩽ X |r_f(n)|^2. The result is in <cit.>. The key point is that partial integration gives that for any positive integer ν, Φ̂(y) ≪_ν |y|^-ν which leads to the expression (<ref>). Now we focus on estimating M_2(R, T). M_2(R, T) = T/N∑_m, n⩽ N∑_a, b ⩽ X f (n) f (m) r_f(a) r_f(b)Φ̂ (T log (ma/nb)). We split M_2(R, T) into two parts by considering two cases ma =nb or ma≠ nb. M_2(R, T) = T/NΦ̂(0)∑_m, n⩽ N a, b ⩽ X ma = nb f (n) f (m) r_f(a) r_f(b) + T/N∑_m, n⩽ N a, b ⩽ X ma ≠ nbf (n) f (m) r_f(a) r_f(b)Φ̂ (T log (ma/nb)) We first consider the off-diagonal terms, i.e., ma≠ nb. By our assumption, T = N^C(N)⩾ N^2/δ. So in this case, we have T| logma/nb| ⩾ T1/NX = T^2δ/3/N⩾ T^δ/6. Apply (<ref>) to get that |Φ̂ (T log (ma/nb))| ≪_δ T^-10 . This leads to | T/N∑_m, n⩽ N a, b ⩽ X ma ≠ nbf (n) f (m) r_f(a) r_f(b)Φ̂ (T log (ma/nb))| ≪_δ T/N∑_m, n⩽ N1 ( ∑_a ⩽ X |r_f(a)|)^2 T^-10 ≪_δ T^-9N X ∑_n ⩽ X |r_f(n)|^2 ≪_δ T^-7∑_n⩽ X |r_f(n)|^2 , where in the second step we use Cauchy–Schwarz inequality. This shows that the off-diagonal terms are negligible. So in the next steps, we just need to consider the diagonal terms in (<ref>), i.e the sum involving terms ma = nb. We use the following trick to get rid of dependence on f. Set r_f(n) = f(n) r (n), where r is a non-negative multiplicative function to be chosen later, independent of f. By noticing that |f(n)|=1, the sum involving diagonal terms is the same as T/NΦ̂(0)∑_m, n⩽ N a, b ⩽ X ma = nb r(a) r(b). By the estimates on off-diagonal terms and (<ref>), we have M_2(R, T)/M_1(R, T)= 1/N∑_m, n⩽ N a, b ⩽ X ma = nb r(a) r(b) /∑_n⩽ X r(n)^2 + O_δ(1/T) . Now our theorem would immediately follow from Hough's work <cit.> on large character sums. In particular, his work would imply 1/N∑_m, n⩽ N a, b ⩽ X ma = nb r(a) r(b) /∑_n⩽ X r(n)^2 ⩾exp( (2+o(1)) √(log X/loglog X)). For completeness, we present Hough's work. Let g = (a, b), h = (m ,n), a = a'g, b = b'g then (a', b' ) = 1 and m=hb', n=ha'. With this parametrization, we have ∑_m, n⩽ N a, b ⩽ X ma = nb r(a)r(b) ⩾∑_a', b' ⩽ X (a', b') = 1r(a')r(b')∑_g ⩽X/max(a', b') (g, a'b')=1 r^2(g) ∑_h ⩽N/max(a', b') 1 ⩾(1+o(1)) N ∑_a', b'⩽min{X, N} (a',b')=1r(a')r(b') a'b'/max(a',b')^3∑_g ⩽X/max(a', b') (g, a'b')=1 r^2(g). We replace the sum over g by multiplicativity and Rankin's trick, for any α>0, ∑_g ⩽X/max(a', b') (g, a'b')=1 r^2(g) = ∑_(g, a'b')=1 r^2(g) - ∑_g > X/max(a', b') (g, a'b')=1 r^2(g) = ∏_p ∤ a'b'(1+r(p)^2) + O((X/max(a', b'))^-α∏_p∤ a'b'(1+r(p)^2p^α) ). We also have, by multiplicativity of r(n), ∑_n⩽ Xr(n)^2⩽∏_p(1+r(p)^2). Combining the above two estimates and (<ref>), we have that the main term in (<ref>) is at least M: = ∑_a', b'⩽min(X, N) (a', b')=1r(a')r(b')a'b'/max(a', b')^3/ ∏_p|a'b'(1+r(p)^2), and the error term is (let z:= min(X, N)) at most E: = ∏_p(1+r(p)^2)^-1 X^-α∑_a', b'⩽ z (a',b')=1r(a')r(b')(a'b')^1+α/(a'b')^3/2∑_(g, a'b')=1r(g)^2 g^α. Next, we make a choice of the resonator r(n). Set λ= √(log X loglog X ). We choose r(n) supported square-free integers and let r(p)= λ/√(p)log p , λ^2⩽ p ⩽exp((logλ)^2) 0 , otherwise. We define a multiplicative function t(n) supported on squarefree integers by setting t(p)= r(p)/1+r(p)^2. We have the following estimates borrowed from <cit.>. Uniformly in z⩾ 1, ∑_m_1, m_2 ⩽ z (m_1, m_2) =1 t(m_1) t(m_2) m_1 m_2/max(m_1 , m_2)^3⩾1/log z(∑_m⩽ zt(m)/√(m))^2. Assume that z>exp(3λloglogλ) with λ = √(log Xloglog X). As X → +∞, we have ∑_m_1, m_2 ⩽ z (m_1, m_2) =1 t(m_1) t(m_2) m_1 m_2/max(m_1 , m_2)^3⩾exp((1+o(1)) λ/logλ). Assume that z>exp(3λloglogλ) with λ = √(log Xloglog X) and α = (logλ )^-3. Then X^-α∑_m_1, m_2⩽ z (m_1, m_2)=1r(m_1)r(m_2)/(m_1m_2)^1/2 - α∑_(d, m_1m_2)=1 r(d)^2d^α/ (∑_m⩽ Xt(m)/√(m))^2∑_d r(d)^2⩽exp(-(1+o(1)) 32 log X/(loglog X)^4). By our assumption that C(N)⩽ (log N)^γ and X= T^1-2δ/3= N^C(N)(1-2δ/3), we have log N > 3 λloglogλ. And clearly, log X > 3λloglogλ for all large X. Apply Lemma <ref> to get that ∑_a', b'⩽min(X, N) (a', b')=1r(a')r(b')a'b'/max(a', b')^3/ ∏_p|a'b'(1+r(p)^2) ⩾exp( (2+o(1)) √(log X/loglog X)). By Lemma <ref>, we find that the ratio E/M tends to zero as X→ +∞, where the quantities M, E are defined in (<ref>) and (<ref>). Thus we complete the proof of (<ref>). Combining (<ref>), (<ref>), (<ref>) and recalling that X= T^1-2δ/3, we are done. §.§ Acknowledgement The authors would like to thank Kannan Soundararajan for interesting discussions. Yang thanks the hospitality of the math department at Stanford University during his visit when the project started. Xu is supported by the Cuthbert C. Hurd Graduate Fellowship in the Mathematical Sciences, Stanford. Yang is supported by the Austrian Science Fund (FWF), project W1230. abbrv
http://arxiv.org/abs/2303.07310v1
20230313173246
Learning Reduced-Order Models for Cardiovascular Simulations with Graph Neural Networks
[ "Luca Pegolotti", "Martin R. Pfaller", "Natalia L. Rubio", "Ke Ding", "Rita Brugarolas Brufau", "Eric Darve", "Alison L. Marsden" ]
cs.LG
[ "cs.LG", "cs.CE" ]
Nearest-Neighbor Inter-Intra Contrastive Learning from Unlabeled Videos David Fan Deyu Yang Xinyu Li Vimal Bhat Rohith MV Amazon Prime Video {fandavi, deyu, xxnl, vimalb, kurohith}@amazon.com March 30, 2023 =================================================================================================================================== Reduced-order models based on physics are a popular choice in cardiovascular modeling due to their efficiency, but they may experience reduced accuracy when working with anatomies that contain numerous junctions or pathological conditions. We develop one-dimensional reduced-order models that simulate blood flow dynamics using a graph neural network trained on three-dimensional hemodynamic simulation data. Given the initial condition of the system, the network iteratively predicts the pressure and flow rate at the vessel centerline nodes. Our numerical results demonstrate the accuracy and generalizability of our method in physiological geometries comprising a variety of anatomies and boundary conditions. Our findings demonstrate that our approach can achieve errors below 2% and 3% for pressure and flow rate, respectively, provided there is adequate training data. As a result, our method exhibits superior performance compared to physics-based one-dimensional models, while maintaining high efficiency at inference time. § INTRODUCTION In the last twenty years, Computational Fluid Dynamics (CFD) has become an essential tool in the study of the cardiovascular system <cit.>. For example, CFD simulations have been used to noninvasively assess the severity of coronary artery aneurysms <cit.>, to propose novel surgical methods for congenital heart disease <cit.>, and to optimize medical devices <cit.>. Full 3D blood flow models, often solved with the finite element method, allow for patient-specific modeling and extraction of detailed quantities such as wall shear stress and velocity fields. However, the implementation of these simulations in clinical practice is still limited due, in part, to their high computational cost. Reduced-order models (ROMs) have been devised to overcome this issue, though their increased efficiency generally comes with a cost of lost accuracy. This paper aims to develop and validate a novel ROM following a data-driven approach based on graph neural networks (GNNs). The typical approach to deriving ROMs for cardiovascular simulations is physics-based. These formulations rely on simplifying assumptions that reduce the vessel geometry's complexity, and, consequently, the number of variables necessary to describe the quantities of interest. This physics-based class of ROMs includes popular zero-dimensional and one-dimensional models. In zero-dimensional formulations (often called lumped-parameter network models) the cardiovascular system is analogous to an electric circuit in which the pressure drop across portions of the arterial tree and blood flow rate play the role of electric potential difference and currents, respectively. These quantities of interest do not depend on any spatial variable. We refer to <cit.> for examples of uses of such models in cardiovascular simulations, from simple Windkessel models <cit.> to full circulatory networks. One-dimensional models are derived by integrating the three-dimensional Navier-Stokes equation over the vessel cross-section to reduce the equations to a single spatial variable <cit.>. Specifically, arterial trees are approximated as compositions of segments representing the centerline of the vessels, and pressure, flow rate, and vessel wall displacement are considered functions of the axial component only. Compared to lumped-parameter network models, one-dimensional models capture more of the physics due to their ability to account for wave propagation phenomena due to the interaction of flow with elastic vessel walls. One-dimensional models have proven to be useful in numerous studies; see, for example, <cit.>. Zero- and one-dimensional formulations often lead to reasonably accurate results at a fraction of the computational cost of full three-dimensional simulations. However, these ROMs sometimes perform poorly because (i) they do not account correctly for pressure losses at vascular junctions and (ii) they rely on specific mathematical models (mostly based on empirical data or heuristics), particularly to describe pathological cases (e.g., stenoses or aneurysms). A recent study conducted on 72 cardiovascular models selected from a freely available database of cardiovascular models, the Vascular Model Repository (VMR),[<http://www.vascularmodel.com>] compared zero- and one-dimensional formulations against three-dimensional reference simulations <cit.>. The authors observed average relative errors of 2.1% & 1.8% on the pressure (zero- and one-dimensional models, respectively) and 3.9% & 3.4% on the flow rate (zero- and one-dimensional models, respectively). Data-driven ROMs have the potential to overcome the issues mentioned above. Typical data-driven reduced-order approaches include projection-based methods such as reduced-basis or proper-orthogonal decomposition techniques <cit.>. Although these methods can be adapted to specific geometries through interpolation strategies <cit.>, they are often not capable of representing the full range of geometrical variability characterizing patient-specific anatomic models. These problems can be partially overcome by employing projection-based methods in simple subdomains making up the vascular geometry of interest <cit.>. Another option for generating data-driven models for physical simulations is deep learning. While, in the context of cardiovascular modeling, deep learning has been used to accelerate other aspects of the simulation pipeline, for example, image-based segmentation <cit.> and model generation <cit.>, it has not yet been used widely to model physical processes. Among the most popular architectures devoted to this scope are physics-informed neural networks (PINNs) <cit.>, which are neural networks trained to mimic known physical laws. PINNs have been applied, for example, to ocean and climate modeling in <cit.>, in the field of atomistic simulations in <cit.>, to approximate cardiac activation mapping in <cit.> and blood flow dynamics in <cit.> and <cit.>. For an overview of fluid dynamics and machine learning efforts, we refer to <cit.>. As with projection-based methods, these algorithms are typically not flexible with respect to changes in the domain geometry, which is a crucial drawback for their use in cardiovascular simulations on patient-specific applications. Recently, GNNs have been proposed as an alternative to classic fully connected and convolutional neural networks to address these difficulties. GNNs are used, for example, in <cit.> to learn the laws governing particle interactions in particle-based simulations and in <cit.> as solvers for mesh-based simulations called MeshGraphNets. More recently, GNNs have also been used to estimate steady blood flow in a synthetic dataset of three-dimensional arteries <cit.>. In this paper, we consider an approach inspired by MeshGraphNets to derive a one-dimensional surrogate ROM for cardiovascular simulations. We apply the GNN to learn the laws governing bulk quantities, such as average pressure and flow rate at the centerline nodes, as opposed to using it to approximate the solution of the three-dimensional blood flow equations (as in the original paper). Owing to its capacity to resolve pressure and flow rate on cardiovascular models' centerlines, we consider our method a data-driven one-dimensional model. The network iteratively considers the state of the system, comprising pressure and flow rate at a particular timestep and other relevant features (such as cross-sectional area and parameters governing the boundary conditions), and computes approximations for the next values of pressure and flow rate. We adapt the original MeshGraphNet implementation to make it suitable for blood flow simulations. In particular, we include graph edges to efficiently transfer boundary condition information to the interior graph nodes, and we include special parameters as node features to handle Windkessel-type or resistance-type boundary conditions, which are typically encountered in cardiovascular modeling. In our numerical results, we demonstrate the GNN on a diverse set of geometries. We assess its ability to generalize to multiple geometries and compare its performance with physics-based one-dimensional models. In summary, the main contributions of this paper are threefold: * We consider a modified version of MeshGraphNet capable of handling complex boundary conditions by adding special edges and patient-specific features to the graph. We show that these modifications lead to substantial improvements compared to MeshGraphNet in an ablation study performed in <Ref>. * We assess the ability of the GNN to generalize to different geometries, which, to our knowledge, has not been investigated in previous works. We reiterate that geometrical variability plays an essential role in patient-specific modeling (see <Ref> and <Ref>). * We demonstrate that our ROM outperforms physics-driven one-dimensional models in geometries characterized by many junctions or pathological conditions (see <Ref>). Our GNN implementation is freely available at <https://github.com/StanfordCBCL/gROM>. § NOTATION Let us consider a set of G patient-specific cardiovascular geometries Ω_1, …, Ω_G. Given a geometry Ω_g, we generate a directed graph consisting of a set of nodes n^g_1, …, n^g_N^g along the vessel centerline; see <Ref> (left). We denote e^g_ij as the directed edge connecting node i to node j. We denote T_cc^g as the period of one cardiac cycle of the patient and consider the discrete time sequence t^0,g, t^1,g, …, t^M,g, such that t^0,g = 0, t^M,g= T_cc^g, and Δ t^g = t^1,g - t^0,g = … = t^M,g - t^M-1,g. In this paper, we take a constant Δ t^g for all patients to simplify the learning process. However, we envision that the generalization to variable time step size is possible with minimal changes to the architecture (for instance, by including Δ t^g in the set of node features). We call the set of all node and edge features at time t^k,g the state of the system Θ^k,g(μ), where μ is a vector of system parameters—in this work, these are related to its boundary conditions. We call a sequence of states Θ^k,g(μ) for a particular choice of system parameters μ a trajectory. We refer to <Ref> for a description of the features we consider in this work. For brevity, we will implicitly assume that all quantities must be patient-specific and omit the superscript g in the following sections whenever possible. § MESHGRAPHNETS FOR CARDIOVASCULAR SIMULATIONS Our GNN acts as a data-driven one-dimensional ROM; for a description of classical physics-based one-dimensional models, we refer to <Ref>. During the rollout phase shown in <Ref> (top-right), the network takes as an input Θ^k and computes an update that allows us to advance the state of the system from Θ^k to Θ^k+1. We apply the GNN iteratively. In each time step t^k with k > 0 we provide it with the previously estimated system state. At t^0, we feed the network a prescribed initial condition. The action of the GNN is described in <Ref>. §.§ Graph features We select the node and edge features based on our knowledge of the problem. For example, it is well known that, under a Poiseulle condition, a linear relation exists between flow rate Q and pressure drop Δ P across an approximately cylindrical vessel. Specifically, Δ P = R Q = 8 μ Lπ r^4 Q. The proportionality constant R is called resistance and depends on the viscosity of blood μ, the length of the vessel L, and its radius r. In this work, we assume that the viscosity and density of the blood are equal to μ = 0.04 g cm^-1 s^-1 and ρ = 1.06 gr cm^-3 for all patients, respectively, and we do not include viscosity and density as graph features. Based on these notions of fluid dynamics, we include the cross-sectional area in the node features. Node features We consider the cross-sectional average pressure p^k_i ∈ℝ^+ and the flow rate q^k_i ∈ℝ in every centerline node n_i as descriptors of the state of the system Θ^k at time t^k. These are computed on the section obtained as the intersection between the plane orthogonal to the centerline and the thee-dimensional model of the vessel. Similarly, the area of the vessel lumen A_i ∈ℝ is the area of the section passing through node i and is considered a node feature for the above reasons. We introduce a one-hot vector α_i ∈ℝ^4 to encode different node types. These are branch nodes, junction nodes, model inlet (one per geometry), and model outlets, as shown in <Ref> (left). The distinction between branch and junction nodes is necessary because the area of sections within junctions varies discontinuously across the centerline (owing to nearby slices sometimes cutting through a different number of branches). This leads to different blood dynamics in branches and junctions when looking at quantities averaged over such sections. We use the same automated algorithm for junction detection as in <cit.>. Additional node features are the tangent to the centerline evaluated at node n_i, which we denote ϕ_i ∈ℝ^3, the period of the cardiac cycle T_cc∈ℝ^+, minimum and maximum pressure over the whole cardiac cycle (p_min∈ℝ^+ and p_max∈ℝ^+), three parameters associated with the boundary conditions (R_i,p∈ℝ^+, C_i∈ℝ^+, and R_i,d∈ℝ^+; see <Ref> for further information), and a boolean loading variable l^k ∈{0,1} associated with model initialization (see <Ref>). We remark that, although in this work p_min and p_max are set based on simulation data, these values are typically known for the patient at hand—for example, they are identified as diastolic and systolic pressure in aorta models—and are often used in physics-based cardiovascular simulations to tune the boundary conditions discussed in <Ref>. In summary, we associate with each node n_i the vector of features 𝐯^k_i = [p_i^k, q_i^k, A_i, α_i^T, ϕ_i^T, T_cc, p_min, p_max, R_i,p, C_i, R_i,d, l^k]^T∈ℝ^17. Node features and their definitions are summarized in <Ref>. Edge features We define 𝐝_ij = 𝐱_j - 𝐱_i ∈ℝ^3 as the difference between the position of nodes n_j and n_i, and z_ij the length of the shortest path between the two nodes. In addition to physical edges, in this work we introduce edges connecting boundary nodes to interior ones (see <Ref>). We, therefore, introduce the one-hot vector β_ij∈ℝ^4 to encode the edge type. We define the following edge types: edges connecting branch nodes to branch nodes, edges connecting junction nodes to junction nodes, and edges connecting the model inlet or outlets to interior nodes. For simplicity, edges connecting branch nodes to junction nodes are assigned the same type as those within branches. We note that edges within branches and junctions are those defining the centerline of the anatomical model and that, when computing the shortest path z_ij, we only consider these edges. Moreover, we highlight that although the introduction of boundary edges changes the topology of the graph, information regarding the original topology is maintained through the different edge types. The edge features associated with e_ij are 𝐰_ij = [𝐝_ij^T / ‖𝐝_ij‖_2, z_ij, β_ij^T]^T∈ℝ^8. Edge features and their definitions are summarized in <Ref>. Note that all features (except for the unitary vectors 𝐭_i and 𝐝_ij^T / ‖𝐝_ij‖_2) are normalized to follow a standard Gaussian distribution 𝒩(0,1) using statistics computed on the dataset. §.§ Extension of MeshGraphNet to support cardiovascular boundary conditions The hemodynamics in the vasculature are determined by the boundary conditions at the inlet and outlets. In cardiovascular simulations, we represent the downstream vasculature as three-element Windkessel-type (RCR) or resistance-type boundary conditions, as shown in <Ref>. In RCR boundary conditions, the pressure in the capacitor P_c(t, Q) is determined by the relationship d P_cd t = 1C (Q(t) - P_cR_d ). Then, the pressure at the outlet (P in <Ref>) is found as P(t, Q) = P_c(t,Q) - R_p Q(t). In resistance boundary conditions, the relationship between pressure and flow rate at the outlet is simply P(t) = R Q(t). We remark that this is a special case of RCR boundary conditions where C and R_d tend to zero. In both RCR and resistance boundary conditions, we assume that the distal pressure is zero for simplicity. To integrate these boundary condition types into the MeshGraphNet framework, we provide the values of R_p, C, and R_d as node features in the outlet nodes. We set those features to zero for all remaining nodes in the graph. When using resistance-only boundary conditions, we also set C = 0 and R_d = 0. During training and in every iteration of the rollout phase, we solely prescribe the flow rate value at the next time step at the inlet. Due to the nature of the centerlines we consider in this paper, most centerline nodes are connected to only two neighbors, which hinders the information transfer between the boundary nodes and the interior ones. For this reason, we add artificial edges connecting each interior node to the closest node on the boundary. Specifically, every interior node n_i is connected to the boundary node n_j for which the shortest path length between n_i and n_j, i.e., z_ij, is minimized. Edges connecting inlets and outlets to interior nodes are associated with different types of edges (see Edge features in <Ref>) and are bidirectional as all the other types of edges that we consider in this paper. §.§ Initial conditions As we shall see in <Ref>, we train our GNN on time-dependent simulation data over one cardiac cycle. However, the initial condition of the system at the start of the cardiac cycle is in general not a piece of information that can be easily estimated from clinical data. For this reason, when generating the trajectories in the dataset, we start from a constant solution in which p^0 = p_min and q^0 = 0 in all graph nodes and then linearly interpolate between this initial state and the actual initial condition at the start of the cardiac cycle over T_l = 0.1 s. We then include a node feature, denoted l^k, taking a unitary value between t = -0.1 sec and t = 0 sec, and zero for t > 0, to differentiate between the loading stage and the actual simulation of the cardiac cycle. §.§ Forward step of the Graph Neural Network In this section, we denote by 𝐟_* a fully-connected neural network (FCNN) <cit.> with n_h hidden layers. The number of neurons in the hidden layers is constant and equal to n_s. We consider the LeakyReLU activation function for every layer except the output layer, and we apply a layer normalization on the output layer unless explicitly specified. When an FCNN accepts multiple arguments, these should be concatenated into a single tensor. MeshGraphNet is based on the three main stages shown in <Ref> (bottom-right): * Encode: we transform the node and edge features into latent features using FCNNs. In particular, given node feature 𝐯_i^k, we compute its latent representation as 𝐯_i^k,(0) = 𝐟_en(𝐯_i^k) ∈ℝ^n_l, where 𝐟_en is an FCNN mapping the space of node features into ℝ^n_l. Similarly, we compute 𝐰_ij^(0) = 𝐟_ee(𝐰_ij) ∈ℝ^n_l for all edges e_ij. Although the size of the latent space n_l does not need to coincide for edges and nodes, we take it to be the same to facilitate the optimization of our architecture, discussed in <Ref>. * Process: the process stage is performed L times and is further divided into two phases. In the first phase, we compute new edge features as 𝐰_ij^(l) = 𝐟_pe^(l)(𝐰_ij^(l-1), 𝐯_i^k,(l-1), 𝐯_j^k,(l-1))∈ℝ^n_l, where l ≥ 1 is the iteration number. Then, we compute new node features using aggregation functions as 𝐯_j^k,(l) = 𝐟_pn^(l)(𝐯_j^k,(l-1), ∑_i: ∃ e_ij𝐰_ij^(l), 𝐰_in,j, 𝐰_out,j)∈ℝ^n_l. All the networks considered in this stage feature a residual connection. * Decode: in the last stage, node features are transformed from the latent space to the desired output space using an FCNN. The desired output is a vector that contains the update of pressure and flow rate [δ p_i^k, δ q_i^k] = 𝐟_dn(𝐯_i^k,(L)) ∈ℝ^2. Following <cit.>, we do not use layer normalization on the output layer of 𝐟_dn. At the end of the forward pass of the GNN, we update the pressure and flow rate nodal values p_i^k and q_i^k as p_i^k+1 = p_i^k + δ p_i^k and q_i^k+1 = q_i^k + δ q_i^k. We introduce δ𝐯_i^k = [δ p_i^k, δ q_i^k, 0,…,0] ∈ℝ^17 and the function Ψ_m, which denotes the result of applying the GNN m consecutive times (rollout phase). Specifically, Ψ_1(Θ^k) = ⋃_i = 1^N {𝐯_i^k + δ𝐯_i^k } ∪⋃_i,j: ∃ e_ij{𝐰_ij}, andΨ_m(Θ^k) = (Ψ_1 ∘⋯∘Ψ_1_m)(Θ^k). We denote the approximation of p and q at node i, after m applications of the GNN, as Ψ_m(Θ^k)|_p,i and Ψ_m(Θ^k)|_q,i, respectively. §.§ Training We now introduce the loss function ℒ minimized during training of the GNN. Let us define the training set {Ω_g}_g ∈𝒯, where 𝒯 is a subset of [1,…,G]. We train the network on small strides of s consecutive time steps so that it approximates the exact values of the nodal pressure and flow rate p̂^k,g_i and q̂^k,g_i. Here, we consider s = 5. Considering multiple steps has been proven to be beneficial in <cit.>. In particular, we define the strided MSE sMSE^k,g,s = 1N^g∑_l = 1^s∑_i = 1^N^ga_l b_i [ ( p̂^k+l,g_i - Ψ_l(Θ^k,g)|_p,i)^2 + (q̂^k+l,g_i - Ψ_l(Θ^k,g)|_q,i)^2 ], where a_l = 1 if l = 1 and a_l = 0.5 otherwise, and b_i = 100 for boundary nodes and b_i = 1 otherwise. Then, the loss function reads ℒ = MSE = ∑_g ∈𝒯1|𝒯|(M^g-s)∑_k = 0^M^g-ssMSE^k,g,s. Our goal is to make the GNN robust for rollouts of many time steps. In order to achieve this, it is imperative to add random noise during training to simulate the effect of the error caused by the network in the rollout phase, as described in <cit.>. During training, we perturb the pressure and flow rate in the state Θ^k,g as p̃_i^g = p̂_i^g + ε_p and q̃_i^g = q̂_i^g + ε_q, where ε_p ∼ N (0,σ^2), ε_q ∼ N(0,σ^2), and σ is a hyperparameter controlling the noise standard deviation. The loss function (<ref>) is optimized using stochastic gradient descent and the Adam optimizer. For details on the GNN and training hyperparameters, we refer to <Ref>. We consider each entire trajectory as a datapoint. Due to the limited size of the datasets that we obtain in this way (as opposed to, for example, considering every possible set of s consecutive timestep as separate datapoints), we use k-fold cross-validation <cit.>, that is, we train k networks on different train-test splits using the same set of hyperparameters and report their average performance. The train-test splits are made such that 1-1/k and 1/k of the trajectories are assigned to the train and test set, respectively, and such that each trajectory appears in the test set exactly once. Consider as an example the dataset employed in <Ref>, which is composed of 160 trajectories. During 10-fold cross-validation, each of the 10 networks is trained on 144 trajectories and tested on 16, and we report the average performance achieved on train and test. §.§ Hyperparameter optimization Hyperparameter optimization is essential for achieving state-of-the-art performance using machine learning methods. In this work, we employ the optimization platform SigOpt.[<https://sigopt.com>] As our objective function, we employed the average rollout error on pressure and flow rate obtained on the test set after training. More specifically, given the anatomy of patient g, the errors for pressure and flow rate are computed as e_p^g = ∑_i ∈ℬ^g∑_k = 1^M^g (p̂^k,g_i - Ψ_k(Θ^0,g)|_p,i)^2∑_i ∈ℬ^g∑_k = 1^M^g (p̂^k,g_i )^2, e_q^g = ∑_i ∈ℬ^g∑_k = 1^M^g (q̂^k,g_i - Ψ_k(Θ^0,g)|_q,i)^2∑_i ∈ℬ^g∑_k = 1^M^g (q̂^k,g_i )^2, where p̂^k,g_i and q̂^k,g_i are the exact pressure and flow rate values at time t^k and at node n_i for patient g. Note that, when computing these errors, we only consider the indices of nodes located in branches, that is, ℬ^g. Our optimization yielded the following choices of hyperparameters: * Network architecture. Each fully-connected network in the GNN consists of n_h = 2 hidden layers and n_s = 64 neurons per hidden layer. The optimal number of processing iterations in the forward step of the GNN is L = 5, and we consider n_l = 16 as the size for the latent space. * Training hyperparameters. We consider a starting learning rate of 10^-3. This is decreased using a cosine annealing function; the final value of learning rate is 10^-6. We use batches of 100 graphs. During training, we inject normally distributed noise N(0,σ^2) with σ = 5 · 10^-2. Unless explicitly stated, we train the GNNs for 100 epochs. § DATASET We consider eight healthy and diseased patient-specific models selected from the VMR and shown in <Ref>. Models 1-5 are healthy aorta models, Model 6 is an aortofemoral model featuring an aneurysm, Model 7 is a healthy pulmonary model, and Model 8 is an aorta affected by coarctation. We selected these models as, based on previous studies such as <cit.>, they present features—e.g, many junctions (Model 7) or stenoses (Model 8)—that are typically challenging for traditional physics-based models. The data-generation pipeline consists of three main steps: three-dimensional simulation using SimVascular <cit.>, transformation to the one-dimensional representation, and graph generation. Three-dimensional simulation. In addition to geometrical information, the VMR also contains simulation data and boundary conditions information tuned to match clinical measurements. The models include a prescribed flow rate profile over one cardiac cycle at the inlet and RCR (Models 1-6 and Model 8) or resistance boundary conditions (Model 7) at the outlets. We performed 32 (Models 1-5) and 50 (Models 6-8) three-dimensional simulations for each of these geometries under random perturbations of the original boundary conditions. In particular, we multiplied the inlet flow rate and each of the parameters governing the outlet boundary conditions by independent factors uniformly distributed in the range [0.8,1.2]. Using the notation introduced in <Ref>, each model in the VMR was associated with a particular parameter set μ = [μ^in,μ^out_1,…,μ^out_N_out] governing its boundary conditions, and we ran simulations for multiple perturbed parameter sets each of the form μ = [c^inμ^in ,c^out_1μ^out_1 ,…,c^out_N_outμ^out_N_out], where c^in,c^out_1,…,c^out_N_out∼ U(0.8,1.8). We performed the three-dimensional finite-element simulations of the unsteady Navier–Stokes of two cardiac cycles on 128 dual-socket AMD(R) EPYC 7742 cores of the San Diego Super Computing Center (SDSC) Expanse cluster. In <Ref> we report the average simulation run time for each of the eight considered models. Post-processing of simulation results. We restricted the three-dimensional results to the model centerlines. We achieved this by considering the orthogonal sections of the vascular geometry at each centerline node and integrating the pressure and normal component of the velocity over the cross section, thus computing average pressure and flow rate. We also associated with each centerline node the area of the corresponding section. For clarity, <Ref> (middle) shows a subset of the sections where we integrated the pressure and velocity field. Graph generation. Our GNN implementation is based on PyTorch and the Deep Graph Library (DGL)[<https://www.dgl.ai>]. In this last step of the pipeline, we generated nodes, edges, and relative features, in a format compatible with DGL. As discussed in <Ref> and shown in <Ref> (right), at this stage we added edges connecting boundary nodes to interior ones. The time-dependent pressure and flow rate fields are here resampled at each graph node using cubic splines at a constant Δ t. We also performed data augmentation and increase the number of graphs 4-fold by starting each trajectory at a different offset. <Ref> shows statistics computed over the graphs considered in this paper. Each row is indexed based on the ID of the corresponding cardiovascular model (see <Ref> for reference). These three steps of the pipeline are summarized in <Ref>. § RESULTS In this section, we present the results obtained on the datasets described in <Ref>. We trained the networks in a distributed fashion over 16 36-core dual-socket Intel(R) Ice Lake Xeon(R) nodes. For inference, we use an Apple M1 Max processor. §.§ Convergence study with respect to dataset size and sensitivity analysis We first assessed the performance of the GNN as a function of the dataset size. We used the five healthy models shown in <Ref> (Models 1-5) and extracted the solution from the last cardiac cycle (32 per geometry) to train MeshGraphNet. Considering data augmentation, this resulted in 640 resolved flows in the dataset. We performed 10-fold cross-validation by considering a 90-10% split between train and test sets and avoiding data leaks—that is, the augmented data for each simulation belonged to the same (train or test) set as the original simulation. <Ref> shows the performance of the network when trained over 10, 20, 40, 80, and 160 trajectories. On the left, we report the train and test loss value decay over the training epochs. As the size of the dataset increases, the gap between train and test validation loss decreases, as does the value of the final loss. On the right, we numerically demonstrate the expected convergence in the pressure and flow rate errors (computed as in <Ref> and <Ref>) with respect to the dataset size. Our results also show that, as we consider more trajectories to train the GNN, the generalization gap between train and test rollout errors decreases and is less variable. The variability in performance is represented in <Ref> (right) by 95% confidence intervals computed over the 10 networks trained during 10-fold cross-validation. We analyzed the sensitivity of MeshGraphNet with respect to each of the node and edge features as follows. We selected one trajectory at random in the dataset and assessed the baseline performance of each of the 10 GNNs trained over the whole dataset in terms of pressure and flow rate rollout errors. Then, we performed many rollouts using the same GNNs while applying random Gaussian noise N(0, 0.05) to only one feature per rollout in each node and edge in each timestep (in the case of multidimensional node features such as tangent and node type, we divide the standard deviation by the size of the vector). We recall that node and edge features are standard normalized, which motivates the use of the same noise distribution for all features. We define the sensitivity factor with respect to a particular feature as the ratio between the error obtained in the perturbed configuration and the baseline error. Therefore, sensitivity close to one indicates robustness with respect to noise. Features associated with higher values of sensitivity are more important to the result accuracy than those associated with lower values. Our findings are summarized in <Ref>. The accuracy in the global approximation of pressure and flow rate did not depend dramatically on the previous timestep. As a matter of fact, we train our GNNs specifically to be robust to noise in pressure and flow rate, as discussed in <Ref>. The networks were most sensitive to variations in the cross-sectional area (which is consistent with our understanding of fluid dynamics) and patient-specific data such as boundary conditions parameters and reference values for pressure (p_min and p_max). Unexpectedly, the cardiac cycle period T_cc also played an important role; we believe that this is due to the low number of distinct T_cc considered here (five, i.e., one per geometry) and that increasing the variability of that parameter in the dataset will also reduce its effect. Geometrical features such as tangent or node distance did not significantly affect the accuracy of the results. This might be partially due to the fact that those features are not independent of each other—for instance, the tangent value can be estimated starting from the node positions and vice versa. Finally, we observe that the loading variable l^k, which we introduced to distinguish between the loading phase and cardiac cycle simulation, did not play an important role in the rollout accuracy. §.§ Comparison against physics-based one-dimensional models To assess the performance of our method against a physics-based ROM, we considered Models 6, 7, and 8 (see <Ref>), which present characteristics that are typically difficult to handle using one-dimensional models. For each geometry, we simulated two cardiac cycles using 50 random configurations of the boundary conditions associated with that cardiovascular model in the VMR. We also performed one-dimensional simulations using the same boundary conditions used in the three-dimensional ones. We set the material properties of the arterial wall to obtain close-to-zero variations in the lumen area, following the approach adopted in <cit.>. We refer to <Ref> for more details about our implementation of one-dimensional models. We initialized the ROM with the pressure and flow rate approximations by the three-dimensional model evaluated at the one-dimensional nodes and ran it for two cardiac cycles. In our experience, this configuration leads to better agreement with the three-dimensional data (instead of initializing the ROM using constant values for pressure and flow rate or performing the simulation for more cardiac cycles). Similarly to <Ref>, we used 4-fold data augmentation for training and, therefore, each anatomical model was associated with a training dataset of 200 trajectories. We considered two approaches for training. In the first approach, we considered a global dataset with trajectories computed on all three cardiovascular models. We denoted the networks trained this way GNN-A. The second strategy consists of training three distinct GNNs over datasets comprising trajectories from the same anatomical models. In other words, we trained one GNN on all trajectories associated with Model 6, one on all trajectories associated with Model 7, and one on all trajectories associated with Model 8. As these networks are trained on a single geometry, we denote them GNN-Bg, where g=6, g=7 or g=8 is the patient identifier. <Ref>, which reports statistics on the models considered in this section, motivates the choice of training geometry-specific networks. Indeed, different vascular regions are characterized by different ranges for key quantities such as pressure, flow rate, and cross-sectional area. Since the GNN operates on data normalized using statistics computed over all graphs in the dataset, we aim to investigate whether normalizing the data with values adapted to each cardiovascular region presents advantages in terms of accuracy. We perform 5-fold cross-validation for GNN-A and GNN-Bg. Due to the different dataset sizes, we train GNN-A networks for 100 epochs and GNN-Bg ones for 500. <Ref> shows the performance of GNN-A, GNN-B6 (left column), GNN-B7 (middle column), and GNN-B8 (right column), over trajectories contained in the test sets. We evaluate the error in pressure at 20 graph nodes sampled at random in the models' branches and display the pressure and flow rate evolution at the locations where the error in pressure achieved by GNN-A is minimum (top row), median (middle row), and maximum (bottom row). The GNNs are remarkably accurate in all considered locations. <Ref> also shows the performance of one-dimensional models ran with Δ t = 10^-2 s (same time step as GNN-A and GNN-Bg). The data- and physics-driven models both performed well on the aortofemoral model (left column), but the GNNs outperformed the one-dimensional ROM on the pulmonary and aorta coarctation models (middle and right columns). <Ref> compares the accuracy of the GNN-A and one-dimensional models over the whole dataset; since GNN-A and GNN-Bg performed comparatively well, we here focus on the more general GNN-A for simplicity. In all cases Δ t = 10^-2 s. We plot the pressure (top row) and flow rate (bottom row) approximations by the GNNs and one-dimensional models against the ground truth at locations randomly sampled in space and in time in all the models in the dataset. Points positioned on the bisector indicate good agreement between ROM approximation and ground truth. Once again, these results demonstrate that the GNN achieves a much higher accuracy than the physics-based one-dimensional models. In <Ref>, we report the average performance of the GNNs and one-dimensional models over all 150 trajectories. Owing to 5-fold cross-validation and the fact that each trajectory appears in the test set exactly once, the GNN results are averaged over all trajectories in the dataset. We observe that the accuracy of GNN-A and GNN-Bg are comparable, which suggests that a single GNN can generalize to multiple geometries. We also note that using Δ t = 2 · 10^-2 s instead of Δ t = 10^-1 s when training GNN-A leads to lower accuracy. However, we highlight that different time-step sizes might require a different set of hyperparameters—most notably, the standard deviation of the noise we use to make the network robust during rollout. In our case, the hyperparameter optimization discussed in <Ref> is performed considering Δ t = 10^-2 s. The relative errors for pressure and flow rate produced by the GNNs in each anatomical model are considerably lower than those produced by the one-dimensional ROMs. Moreover, we do not observe a strong effect of Δ t on the global accuracy of one-dimensional models. This indicates that the poor performance achieved on Models 7 and 8 was due to limitations intrinsic to the methods. The GNNs showed similar efficiency than the one-dimensional models in terms of run time using the same time step size Δ t in the Model 6 and lower efficiency in Model 8. In the case of the more complex pulmonary model (Model 7), the GNNs are orders of magnitude more efficient than the one-dimensional models: for example, for Δ t = 0.01 s the one-dimensional models took 60.6 seconds to complete a single cardiac cycle, whereas GNN-A and GNN-Bg took around 4.0 seconds. We observe that, when using a larger Δ t to train GNN-A, the run time decreased accordingly: the run times for Models 6, 7, and 8 scales from 3.1, 4.0, and 2.9 (approximately the same for GNN-A and GNN-Bg) to 1.6, 2.0, and 1.5, respectively. The run times in the one-dimensional models do not scale linearly due to the larger number of Newton iterations necessary to reach convergence in the solution of the nonlinear system with larger Δ t. Finally, we performed an ablation study to evaluate the effects of different GNN components by excluding them altogether. Our goal was to determine whether the main modifications to MeshGraphNet proposed in this paper improve the accuracy of the original algorithm. These modifications are: (i) all graph features listed in <Ref> and <Ref>, except for p_i^k, q_i^k, α_i, 𝐝^T_ij/‖𝐝^T_ij‖, and z_ij, and (ii) the boundary edges discussed in <Ref>. For the sake of clarity, we define the set τ = {A_i, ϕ_i, T_cc, p_min, p_max, R_i,p, C_i, R_i,d, l^k, β_ij, for all i,j,k}, which includes all node and edge graph features we propose to incorporate in MeshGraphNet, for all nodes, edges, and timesteps. We trained one GNN-A by excluding τ and another one by excluding boundary edges using the same hyperparameters discussed in <Ref>, performed 5-fold cross-validation, and compared their performance against a baseline GNN-A. <Ref> shows the results averaged over all networks and divided into Models 6, 7, and 8. We observed the biggest performance decline when excluding the boundary edges. This suggests that, in our application, MeshGraphNet cannot be used as is without including those edges to allow information to flow more quickly in the graph. Excluding all the graph features we introduced in this paper also resulted in a noticeable performance drop, particularly in the diseased models (Models 6 and 8). These results demonstrate that our modifications to MeshGraphNet lead to noticeable improvements in the ROM. § CONCLUSIONS We presented a reduced-order model to simulate blood dynamics in one-dimensional approximations of patient-specific vasculatures. Our architecture is a modified version of MeshGraphNet adapted to suit cardiovascular simulations. We demonstrated the generalizability of the network on a variety of different geometries and topologies. We showed the convergence of rollout error on train and test datasets as the number of trajectories used for training increased. We performed a sensitivity analysis to determine which node and edge features are more important to correctly approximating pressure and flow rate. In our experiments, the most influential features were nodal cross-sectional area and patient-specific quantities such as parameters governing the boundary conditions. In <Ref>, we carried out a direct comparison with physics-driven one-dimensional models, showing superior performance of the graph neural network, in particular when handling complex geometries such as those with many junctions (Model 7) or stenosis (Model 8). Specifically, our networks consistently achieved errors below 2% and 3% in pressure and flow rate, respectively. We also considered different approaches to train our algorithm: training networks specific to different cardiovascular regions instead of a single network able to handle different geometries. Our results show that low errors can be obtained by following the latter strategy, which indicates that, with sufficient training data, our algorithm will adequately mimic three-dimensional simulations in all regions of the cardiovascular tree. Motivated by our sensitivity study, we performed an ablation study to determine which of our contributions played a more critical role in the accuracy of the network when excluding them altogether. Our results indicate that introducing boundary edges is essential to ensure meaningful results and that using patient-specific graph features also leads to performance improvements with respect to the original MeshGraphNet architecture. Future work will focus on further quantifying and improving the graph neural network's ability to generalize to unseen geometries during training. We will pursue methods that enable the graph neural network to robustly achieve the accuracies and efficiencies demonstrated in this work using smaller training datasets. This could be done by modifying the structure of the graph neural network (e.g., by incorporating notions of physics like conservation of mass) or the composition of the training dataset to include more patient-specific geometries with fewer trajectories each. Another open direction of research (motivated by our sensitivity analysis in <Ref>) consists of investigating whether introducing new features or removing some of the existing ones will improve the performance of the method. Removing the parameters associated with the boundary conditions—while keeping the patient-specific data that is normally used to determine them—would be a significant advantage over existing approaches. Indeed, boundary condition tuning is a critical step in current physics-based simulations and is typically performed by varying the boundary condition parameters of surrogate models (for example, zero- or one-dimensional reduced-order models) in Bayesian optimization frameworks that usually require many model evaluations to converge. These optimization procedures are based on objective functions that measure how closely the surrogate model reproduces key physiological quantities such as systolic and diastolic pressures. Incorporating these physiological measures into the neural networks would allow us to bypass the boundary condition tuning stage and reduce the number of steps between medical image acquisition and simulation result assessment. The results presented in <Ref> give us confidence that further tuning of the model and improvements in the training dataset will allow us to obtain accurate approximation results without providing boundary condition parameters to the networks. § ACKNOWLEDGMENTS This work was supported by NIH Grants R01LM013120, R01EB029362, and K99HL161313. Additional funding was provided by the Stanford Graduate Fellowship and an NSF GRFP. This publication was additionally supported by the Stanford Maternal and Child Health Research Institute. The authors gratefully acknowledge the San Diego Super Computing Center (SDSC) and Intel for providing the computational resources to run the three-dimensional simulations and to train the GNNs presented in this paper. The authors also thank Dr. Tailin Wu for the insightful discussions and support on GNNs implementation and calibration. unsrtnat § DETAILS ON ONE-DIMENSIONAL MODELS One-dimensional models approximate pressure, flow rate, and wall displacement along the centerline of compliant blood vessels. Given a curve in three-dimensional space parametrized by axial variable z, we define p=p(z,t), q=q(z,t) and A=A(z,t) are pressure and flow rate of blood and the area of the vessel lumen at z, respectively. Under the assumption of Poiseuille flow, the blood dynamics equations read ∂ A∂ t + ∂ q∂ z = 0, ∂ q∂ t + ∂∂ z (43q^2A ) = -8πνqA + ν∂^2 q∂ z^2 - Aρ∂ p∂ z, where ν is the kinematic viscosity of blood, which is typically set to ν = 3.77 · 10^-2 s cm^-2. To accurately predict the vessel response to blood flow, it is necessary to supplement <Ref> with a constitutive model. The Olufsen model p(z,t) = p_0(z) + 43 (k_1 e^k_2 r_0(z) + k_3 ) (1 - √(A_0(z)A(z,t)) ) is an example of commonly used constitutive law based on a reduced form of linear elasticity <cit.>. Here, p_0(z), r_0(z), A_0(z) are reference values for pressure, radius, and lumen area, and k_1, k_2, and k_3 are empirical constants. Since the three-dimensional simulations we use as benchmark are obtained under rigid-wall assumptions, in the tests presented in <Ref> we set k_1 = 0 and k_3 to an arbitrarily large value, to obtain the same kind of wall response in the one-dimensional models. This approach was also followed in <cit.>, where one-dimensional models were compared with three-dimensional simulations on 72 diverse cardiovascular geometries. While <Ref> models behavior in branches, we need to add conditions to model the dynamics in junctions. Typical conditions include flow rate conservation—i.e., the sum of incoming inflow must equal the sum of outgoing outflow—and zero pressure drop between junction inlets and outlets. Our results are obtained using an open-source C++ code publicly available at <https://github.com/SimVascular/svOneDSolver>. § CARDIOVASCULAR MODELS REFERENCE IDENTIFIERS The cardiovascular models used in this study are associated with the following identifiers in the VMR: 1 = 0090_0001, 2 = 0091_0001, 3 = 0093_0001, 4 = 0094_0001, 5 = 0095_0001, 6 = 0140_2001, 7 = 0080_0001, 8 = 0104_0001. § REMOVAL OF BOUNDARY CONDITIONS PARAMETERS FROM GRAPH FEATURES Similar to the ablation study performed in <Ref>, we aimed to investigate the effects of removing a feature from the graph and evaluating the effects on the GNN performance. In particular, we focused on RCR values for boundary conditions. This choice is motivated by the fact that, in the standard simulation pipeline, RCR parameters are estimated starting from physiological measurements in an optimization process that requires numerous model evaluations. Due to the flexibility provided by data-driven approaches that allows the easy incorporation of physiological features during inference (in our case, for example, we include p_min and p_max among the graph node features, which are often used to estimate boundary values parameters), we foresee that, in the future, it will be possible to omit the boundary condition tuning step in the simulation pipeline. To motivate this hypothesis, we trained a GNN-A by removing RCR values from the node graph features. We report the performance obtained on the same three models considered in <Ref> in <Ref>. Similar to the results presented in <Ref>, these results are averages obtained during 5-fold cross-validation. Although the addition of RCR values to the graph led to increased accuracy in some cases (particularly in the flow rate approximation), the difference with respect to the baseline GNN-A was negligible, which supports our initial hypothesis. Future work will focus on corroborating our hypothesis further and on analyzing the dependencies among graph features to decrease their number while preserving accuracy.
http://arxiv.org/abs/2303.07048v1
20230313121328
Hybrid Variational Autoencoder for Time Series Forecasting
[ "Borui Cai", "Shuiqiao Yang", "Longxiang Gao", "Yong Xiang" ]
cs.LG
[ "cs.LG" ]
1 .001 mode = title]Hybrid Variational Autoencoder for Time Series Forecasting [1]Corresponding author 1]Borui Cai [1] 2]Shuiqiao Yang 3]Longxiang Gao 1]Yong Xiang [1]organization=School of Information Technology, Deakin University, city=Burwood, postcode=3125, state=VIC, country=Australia [2]organization=School of Computer Science and Engineering, University of New South Wales, city=Sydney, postcode=2032, state=NSW, country=Australia [3]organization=Qilu University of Technology (Shandong Academy of Sciences), city=Jinan, country=China Email addresses: b.cai@deakin.edu.au (B.Cai); shuiqiao.yang@unsw.edu.au (S.Yang); gaolx@sdas.org (L.Gao); yong.xiang@deakin.edu.au (Y.Xiang) Variational autoencoders (VAE) are powerful generative models that learn the latent representations of input data as random variables. Recent studies show that VAE can flexibly learn the complex temporal dynamics of time series and achieve more promising forecasting results than deterministic models. However, a major limitation of existing works is that they fail to jointly learn the local patterns (e.g., seasonality and trend) and temporal dynamics of time series for forecasting. Accordingly, we propose a novel hybrid variational autoencoder (HyVAE) to integrate the learning of local patterns and temporal dynamics by variational inference for time series forecasting. Experimental results on four real-world datasets show that the proposed HyVAE achieves better forecasting results than various counterpart methods, as well as two HyVAE variants that only learn the local patterns or temporal dynamics of time series, respectively. Time series forecasting Variational autoencoder Deep learning [ [ Received; accepted ====================== § INTRODUCTION Time series forecasting aims at learning the generation process of time series and uses previously observed samples to predict future values <cit.>. Accurate forecasting is essential and can help with the success of many applications/businesses. For example, an electricity company can design effective energy policies in advance by predicting the future energy consumption <cit.>; a corporation can minimize its investment risk if the future stock prices are accurately predicted <cit.>. Time series forecasting has been studied in the literature for decades, but to date, it remains a challenging and active research problem due to the complexity of time series. Classical time series forecasting methods, including autoregressive models (AR), moving average models (MA), and autoregressive integrated moving average models (ARIMA) <cit.>, predict future values by assuming they have linear relationships with observed values; however, this simplification normally leads to unsatisfactory results for complex real-world time series. With the booming of deep learning techniques, deep neural networks (DNN) are widely used to tackle time series forecasting problems. Unlike classical models, DNNs are flexible non-linear models that can capture the temporal information of time series for forecasting <cit.>. Convolutional neural networks (CNN) <cit.> and recurrent neural networks (RNN) <cit.> are two types of DNN widely adopted for time series forecasting. CNN captures salient local patterns of short time series subsequences/segments (e.g., seasonality <cit.> and trend <cit.>), while RNN learns long-term or mid-term temporal dynamics/dependencies of the entire time series <cit.>. In fact, many works capture both types of temporal information by proposing hybrid DNN models and obtaining more accurate forecasting results <cit.>. For example, the researchers <cit.> adopts a hybrid neural network, which stacks CNN with RNN, for DNA sequence prediction. Specifically, CNN can capture short and recurring sequence motifs, which represent biological function units in a DNA sequence. RNN, i.e., long short-term memory (LSTM) <cit.>, is stacked with the output of CNN to learn the spatial arrangement of these motifs. However, these DNN-based models cannot capture temporal information from time series with high accuracy since they are sensitive to small perturbations on time series <cit.>. Recent works refer to variational autoencoder (VAE) <cit.>, which is a type of deep generative model, to learn representations of time series as latent random variables and obtain improved results <cit.>. Compared with directly fitting the exact values of time series, the latent random variables learned by VAE represent the generation process of time series and thus can more accurately capture essential temporal information of time series <cit.>. Based on this, existing methods learn either local seasonal-trend patterns <cit.> or temporal dynamics <cit.>; but to date, there is no VAE model that can jointly capture both information for time series forecasting. In this paper, we bridge this gap by proposing a novel hybrid variational autoencoder (HyVAE) method for time series forecasting. HyVAE follows the variational inference <cit.> to jointly learn local patterns and temporal dynamics of time series. To achieve this goal, HyVAE is designed based on two objectives: 1) capturing local patterns by encoding time series subsequences into latent representations; 2) learning temporal dynamics through the temporal dependencies among latent representations of different time series subsequences. HyVAE integrates the two objectives following the variational inference. Extensive experiments conducted on four real-world time series datasets show that HyVAE can improve the time series forecasting accuracy over strong counterpart methods. The contributions of this paper are summarized as follows: – We propose a novel hybrid variational autoencoder (HyVAE) for time series forecasting. HyVAE derives an objective following variational inference to integrate the learning of local patterns and temporal dynamics of time series, thereby improving the accuracy of forecasting. – We conduct comprehensive experiments on four real-world datasets to demonstrate the effectiveness of the proposed HyVAE method, and the results show that HyVAE achieves better forecasting accuracy than strong counterpart methods. The rest of this paper is organized as follows. The related works are reviewed in Section <ref>. The preliminary knowledge is introduced in Section <ref>. The proposed method is detailed in Section <ref>, and is evaluated in Section <ref>. The paper is summarized in Section <ref>. § RELATED WORK In this section, we briefly review time series forecasting methods and VAE-related forecasting approaches. §.§ Time series forecasting Classical auto-regressive model (AR) predicts by the linear aggregation of past time series values and a stochastic term (e.g., white noise). ARIMA extends AR to non-stationary time series by incorporating moving average (MA) and differencing. Other statistical models, such as linear regression <cit.> and support vector regression <cit.>, enhances the model capacity but still have limited expressiveness. DNNs are flexible non-linear models and are widely used for time series forecasting in recent years. Specifically, RNNs memorize historical information with feedback loops and can conveniently learn the temporal dynamics of time series. Long short-memory network (LSTM) <cit.> is a typical RNN that alleviates gradient vanishing with forget gates, and that enables the learning of long-term temporal dynamics for time series. Other types of RNN, e.g., GRU <cit.>, and Informer <cit.>, which uses the attention mechanism <cit.>, are also used to improve the effectiveness of different forecasting scenarios. In addition, CNNs <cit.> are further adopted to capture local patterns of time series (such as seasonality <cit.> and trends <cit.>). Many works stack CNN and RNN to learn both the local patterns and the temporal dynamics for challenging forecasting problems; for example, combining multi-layer one-dimensional CNNs with bi-directional LSTM for air quality forecasting <cit.> and DNA sequence forecasting <cit.>; integrating a Savitzky–Golay filter (to avoid noise) and a stacked TCN-LSTM for traffic forecasting <cit.>. §.§ Variational autoencoder-based forecasting Variational autoencoder (VAE) <cit.> is a powerful deep generative model that encodes the input data as latent random variables, instead of deterministic values. To enhance the flexibility of VAE (learns independent latent random variables), follow-up methods introduce extra dependencies among the latent random variables. For example, ladder variational autoencoder <cit.> specifies a top-down hierarchical dependency among the latent random variables, fully-connected variational autoencoder <cit.> includes all possible dependencies among variables, and graph variational autoencoder <cit.> automatically learns an acyclic dependency graph. Due to the high flexibility, it is introduced to time series forecasting <cit.>. To improve the performance of the vanilla VAE, VRNN <cit.> introduces an RNN as the backbone to capture the long-term temporal dynamics of time series. LaST <cit.> develops disentangled VAE to learn dissociated seasonality and trend patterns of time series for forecasting. The proposed HyVAE is different from existing methods as it integrates the learning of both local patterns and the temporal dynamic for time series forecasting. § PRELIMINARIES In this section, we first define the problem and then introduce the preliminary knowledge of VAE. §.§ Notation and problem statement A scalar is denoted as a lowercase character, a vector is denoted as a bold lowercase character, and a matrix is denoted as an uppercase character. A time series is denoted as s={s_1,s_2,...,s_m,s_m+1,...,s_m+n}, the time series forecasting problem is defined as determining {s_m+1,...,s_m+n} with known {s_1,s_2,...,s_m}, where n is the step of forecasting. For the convenience, we denote y={s_m+1,...,s_m+n}, and the forecasting problem can be formulated as ŷ=f(s_1,s_2,...,s_m), where ŷ is the predicted values for y. The error of forecasting is measured as follows: Err(y,ŷ)=1/n∑_i=1^n(y_i-ŷ_i)^2, Time series subsequence is denoted as x_t={s_t,..,s_t+l-1}, where l is the length. Time series subsequence contains contextual information that expresses local patterns <cit.>, and thus we use subsequences in the forecasting task. Following <cit.>, we obtain a series of l length subsequences from time series, using a sliding window. Time series represented by subsequences is denoted as {x^1,...,x^T}, where T=m-l+1 is the number of its subsequences. Thus, the forecasting problem becomes ŷ=f(x^≤ T)=f(x^1,...,x^T). §.§ Variational autoencoder Variational autoencoder (VAE) <cit.> is an unsupervised generative learning model that learns the latent representation of the input data as random variables. Similar to the conventional autoencoder <cit.>, VAE has an encoding process that encodes the input into latent representations, and a decoding process that reconstructs the original input with the learned representations. We show the process of VAE in Figure <ref>. VAE learns the generative model as p(x,z) = p(x|z)p(z), where x is the input data and z is its latent representations. The prior of z, p(z), is normally defined as a multivariate Gaussian distribution, i.e., z∼𝒩(0,I); we denote that as p(z)= 𝒩(z|0,I) for convenience. The posterior p(z|x) normally can be an arbitrary non-linear non-Gaussian distribution and thus is intractable. To resolve that, VAE approximates the posterior with q(z|x)=𝒩(z|μ(x),σ(x)), where mean and variance are determined by x. Then, VAE defines the learning problem as the maximum likelihood estimation of logp(x), which can be formulated as: logp(x)=KL(q(z|x)||p(z|x))+ℓ, where the first term is the KL divergence between the approximated posterior and the true posterior. Specifically, the KL divergence of two distributions q(x) and p(x) measures their similarity and is defined as: KL(q(x)||p(x))=∑_xq(x)q(x)/p(x)=𝔼_q(x)q(x)/p(x). In Eq. (<ref>), since p(z|x) is intractable and KL divergence is non-negative, maximizing logp(x) is achieved by maximizing ℓ, which is the evidence lower bound (ELBO) of logp(x) defined as follows: ℓ=E_q(z|x)logp(x|z)-KL(q(z|x)||p(z)), The first term in ℓ maximizes the conditional probability of x given the latent representation z and can be seen as the reconstruction loss, while the second term minimizes the difference between the prior and the approximated posterior. § THE PROPOSED METHOD In this section, we first provide an overview of the proposed hybrid variational autoencoder (HyVAE) method and then elaborate on its details. §.§ Overview of HyVAE Inspired by existing deterministic deep neural models, we propose a novel generative hybrid variational autoencoder (HyVAE) model for time series forecasting. HyVAE jointly learns the local patterns from time series subsequences and the temporal dynamics among time series subsequences. To achieve that, HyVAE is derived based on variational inference to integrate two processes: 1) the encoding of time series subsequences, which captures local patterns; and 2) the encoding of entire time series, which learns temporal dynamics among time series subsequences. In the following content, we separately detail the encoding of time series subsequences and the encoding of the entire time series, respectively, and then explain the integration of these two processes for time series forecasting. §.§ Encoding of time series subsequence As discussed in Section <ref>, many existing models have shown that learning the local patterns can effectively improve time series forecasting <cit.>. To capture the flexible local patterns, we encode time series subsequences as latent random variables, rather than deterministic values. The conventional VAE encodes a subsequence (x^t) into latent representations as independent random variables (z^t), which follow a multivariate Gaussian distribution, i.e., p(z^t)=𝒩(z^t|μ^t,σ^t) and σ^t is the diagonal of a diagonal covariance matrix. However, the values of a time series subsequence are normally not independent and have a causal relationship (e.g., autoregressive); that is, the independent latent random variables cannot properly preserve the meaningful causal information <cit.> within a subsequence. Inspired by ladder variational autoencoder (LVAE) <cit.>, we enforce a hierarchical dependency among the latent random variables to capture the causal information in a subsequence. We separate the latent random variables z^t into L groups/ladders (L is the ladder size), i.e, {z^t_1,...,z^t_L}, and the groups have a top-down hierarchical dependency (from 1 to L). We illustrate the encoding and decoding process of subsequence encoding in Fig. <ref>, in which the top row is the encoding process and the bottom row is the decoding process. For the convenience of implementation, we adopt the same top-down dependency among the latent random variables (z^t_1...z^t_L) in the encoding and decoding processes. Based on this, the prior distribution of z^t can be factorized as: p(z^t) =p(z^t_L)∏_i=1^L-1p(z^t_i|z^t_i+1), p(z^t_i|z^t_i+1) =𝒩(z^t_i|μ_i^t(z_i+1^t),σ_i^t(z_i+1^t)), where {μ(⋆),σ(⋆)}=φ(⋆) and we implement φ(⋆) as a multilayer perceptron (MLP). By changing the size of dependency (L, the ladder size), we can regulate how well causal information is preserved, and no causal information when L=1 (i.e., all latent random variables are independent). Based on this, the generative model of subsequence encoding can further be factorized as follows: p(x^t,z^t)=p(x^t|z_1^t)p(z_L^t)∏_i=1^L-1p(z_i^t|z_i+1^t), where p(x^t|z^t_1)=𝒩(x^t|μ_i^t(z^t_1),σ_i^t(z^t_1)). This hierarchical dependency ensures the latent random variables have sufficient flexibility to model the complex local patterns of subsequences. Since the posterior p(z^t|x^t) is intractable, q(z^t|x^t) is used as an approximation. Meanwhile, to avoid {z_L^t,...,z_1^t} converging to arbitrary variables, they all depend on x^t in the inference model similar to <cit.> as follows: q(z^t|x^t) =q(z_L^t|x^t)∏_i=1^L-1q(z_i^t|z_i+1^t,x^t), q(z_L^t|x^t) =𝒩(z_L^t|μ_i^t(x^t),σ_i^t(x^t)), q(z_i^t|z_i+1^t,x^t) =𝒩(z_i^t|μ_i^t(z_i+1^t,x^t),σ_i^t(z_i+1^t,x^t)), where {μ(⋆,⋆),σ(⋆,⋆)}=φ([⋆;⋆]) and [;] is the concatenation operation. §.§ Encoding of entire time series From the global perspective, we encode all time series subsequences {x^1,...,x^T} as {z^1,...,z^T} to learn the temporal dynamics of entire time series. Since time series subsequences are normally not independent across different time stamps, we first impose a temporal dependency for consecutive subsequences (e.g., p(z^t,z^t-1)=p(z^t|z^t-1)p(z^t-1)). In addition, we capture long-term temporal dependency with other subsequences by hidden states of a recurrent neural network, i.e., gated recurrent unit (GRU) <cit.>. Therefore, we have the following derivation: p(z^t|z^<t) can be derived as follows: p(z^t|z^<t) =p(z^t|z^t-1,h^t-1), p(z^t|z^t-1,h^t-1) =𝒩(z^t|μ_i^t(z^t-1,h^t-1),σ_i^t(z^t-1,h^t-1)), where h is the hidden state and is obtained by: h^t=GRU(h^t-1,x^t). GRU(*) is the calculation of hidden states in a GRU unit. GRU adopts gates and memory cells and alleviates the gradient vanishing problem while being easier to train than LSTM due to fewer gates used. The structure of GRU is formulated as follows: r^t =σ(W_r[h^t-1;x^t]), ζ_t =σ(W_ζ[h^t-1;x^t]), h̃^t =tanh(W_h̃[r^t∘h^t-1;x^t]), h^t =(1-ζ_t)∘h^t-1+ζ_t∘h̃^t, where ∘ is the element-wise product. Specifically, r^t and ζ^t are the reset gate vector and update gate vector, which decides how much past information needs to be forgotten/preserved, respectively. Meanwhile, h̃^t is the candidate activation vector that memorizes the past information, and h^t is obtained as the balanced sum of the short (h^t-1) memory and the long (h̃^t) memory. For the generative process p(x^≤ T,z^≤ T), we explicitly simplify p(x^t|z^≤ t) as p(x^t|z^t) to ensure the local pattern of x^t is mainly preserved in z^t; this simplification also can largely reduce the complexity of the reconstruction/decoding process. Based on (<ref>), the generation model can be factorized as follows: p(x^≤ T,z^≤ T)=∏_t=1^Tp(x^t|z^t,x^<t)p(z^t|x^<t,z^t-1), p(x^t|z^t,x^<t) also can be denoted as p(x^t|z^t,h^t-1), due to the recursive nature of GRU, which requires h^t-1 being obtained by the recursive calculation with x^<t. Similarly, we derive the inference model as: q(z^t|x^≤ t,z^t-1)= 𝒩(z^t|μ_i^t(x^≤ t,z^t-1),σ_i^t(x^≤ t,z^t-1)) = 𝒩(z^t|μ_i^t(h^t-1,x^t,z^t-1),σ_i^t(h^t-1,x^t,z^t-1)). The above approximated posterior of z^t captures the long-term dynamics carried by x^<t (h^t-1), the neighbouring dependency with z^t-1, and the corresponding subsequence x^t. §.§ Integration and joint learning Based on the encoding of a subsequence and the encoding of the entire time series (represented as subsequences) discussed above, we now integrate them into a HyVAE model, which can jointly learn the local patterns and temporal dynamics for time series forecasting. The jointly learned latent random variables for both time series subsequences and the entire time series are denoted as {(z_L^1,...,z_1^1),...,(z_L^T,...,z_1^T)}, with respect to time series {x^1,...,x^T}, and the encoding process is illustrated in Fig. <ref>. By combining the prior of subsequence encoding in Eq. (<ref>) and the prior of entire time series encoding in Eq. (<ref>), we obtain the prior of HyVAE, which is factorized as follows: p(z^t|z^t-1,h^t-1) =p(z_L^t|z_1^t-1,h^t-1)∏_i=1^Lp(z_i^t|z_i+1^t), p(z_L^t|z_1^t-1,h^t-1) =𝒩(z_L^t|μ^t(z_1^t-1,h^t-1),σ^t(z_1^t-1,h^t-1)), p(z_i^t|z_i+1^t) =𝒩(x^t|μ_i^t(z^t_1),σ_i^t(z^t_1)). As shown in Fig. <ref> (a), the prior of HyVAE integrates the long-term temporal dynamics by affecting the first latent random variable of each subsequence (e.g., z_L^t) with the hidden states (e.g., h^t-1, generated by GRU) of its precedent subsequence. Meanwhile, h^t is obtained by the recurrence process with GRU as shown in Fig. <ref> (b). We then obtain the inference model of HyVAE by integrating Eq. (<ref>) and Eq. (<ref>) as follows (Fig. <ref> (c)): q(z^t|x^≤ t,z^t-1) =q(z_L^t|x^≤ t,z_1^t-1)∏_i=1^L-1q(z_i^t|z_i+1^t,x^t), q(z_L^t|x^≤ t,z_1^t-1) =𝒩(z_L^t|μ^t(z_1^t-1,x^≤ t),σ^t(z_1^t-1,x^≤ t)), q(z_i^t|z_i+1^t,x^t) =𝒩(z_L^t|μ_i^t(z_i+1^t,x^t),σ_i^t(z_i+1^t,x^t)). Similarly, for x^t, the above encoding process also includes the temporal dynamics carried by h^t-1 during the encoding of z_L^t, while the rest latent random variables of z^t only learn from x^t. Then, as shown in Fig. <ref> (d), the generation model of HyVAE is obtained by combining Eq. (<ref>) and Eq. (<ref>) as follows: p(x^t|z^t,x^<t) =p(x^t|z_1^t,h^t-1), =𝒩(x^t|μ_i^t(z_1^t,h^t-1),σ_i^t(z_1^t,h^t-1)). Following the derivative process of variational inference, with Eq. (<ref>) to (<ref>), HyVAE learns the latent representations by maximizing its ELBO defined as follows: ℓ_enc= ∑_t=1^T{𝔼_q(z_l^t|x^≤ t,z_1^t-1)log p(x^t|h^t-1,z_1^t) -∑_1^l-1KL(q(z_i^t|z_i+1^t,x^t)||p(z_i^t|z_i+1^t)) -KL(q(z_l^t|x^≤ t,z_1^t-1)||p(z_l^t|x^<t,z_1^<t)}. The first term in ℓ_enc implies the reconstruction loss of HyVAE for each time series subsequence, i.e., between the input x^t and the x̂^t reconstructed with (z^t_1,h^t-1) (see Fig. <ref> (d)). The second and third terms are regularization terms that enforce the encoded latent random variables to jointly capture the local patterns of individual subsequences and learn the temporal dynamics of the entire time series. The expectation of ℓ_enc is approximated by Monte Carlo estimation <cit.> and is estimated with the average of the ℓ_enc of each sample time series. We use h^t and z^t for the final time series forecasting, i.e., ŷ=ψ(h^t,z^t), where ψ(*) is a single-layer fully-connected neural network. The forecasting loss is measured by Eq. (<ref>): ℓ_pred=Err(y,ŷ). Then, the overall loss minimizes the negative ELBO of HyVAE and the forecasting loss as follows: ℓ=-ℓ_enc+ℓ_pred. In ℓ, ℓ_enc aims at learning representations that capture the latent distribution of time series, while ℓ_pred can be regarded as a regularization term that ensures the latent representations can provide insights for accurate forecasting. We perform ADMA <cit.> for the optimization and use the reparameterization trick <cit.> for the model training. For ℓ_enc, we adopt the warm-up scheme <cit.> during the implementation to avoid inactive latent random variables caused by the variational regularization. § EVALUATION In this section, we first introduce the real-world datasets used to evaluate the proposed method. Then, we explain the accuracy metrics for time series forecasting and briefly describe the counterpart methods. Finally, we analyze the results and compare HyVAE with counterpart methods regarding the effectiveness of time series forecasting. All the experiments are implemented with Python 3.7 and run on a Linux platform with a 2.6G CPU and 132G RAM. §.§ Datasets We choose four datasets widely used for time series forecasting. Parking Birmingham dataset <cit.> is collected from car parks in Birmingham, which regularly records the total occupancy of all available parking spaces between October 4, 2016, and December 19, 2016. We down-sample the recording frequency to every 5 hours and result in 3571 records. Another NASDAQ stock dataset <cit.> consists of stock prices of 104 corporations together with the overall NASDAQ100 index, which is collected from July 26, 2016, to December 22, 2016. We use the NASDAQ100 index for forecasting, and down-sample the records every 30 minutes, which results in 1352 records. The other two datasets[https://research.cs.aalto.fi/aml/datasets.shtml.] record the electricity load values of Poland from the 1990s and monthly Darwin sea level pressures from 1882 to 1998, respectively; both datasets contain 1400 records. We preprocess each dataset with Min-Max normalization by: s'_i=s_i-min(s)/max(s)-min(s). Then, each dataset is split into a training set, a validation set and a test set by {80%,10%,10%}. The number of known time series values used for forecasting is fixed as 50 for all datasets. The statistics of the datasets are shown in Table <ref>. §.§ Performance metric We use three different metrics widely used for time series forecasting <cit.> in the evaluation, and they are mean square error (MSE), mean absolute error (MAE), and mean absolute percentage error (MAPE). MSE and MAE respectively measure the variance and average of the residuals of the forecasting results to ground truth and are respectively defined as follows: MSE=1/n∑_i=1^n(y_i-ŷ_i)^2, MAE=1/n∑_i=1^n|y_i-ŷ_i|. MAPE measures the proportion of forecasting deviation to the ground truth as follows: MAPE=1/n∑_i=1^n|y_i-ŷ_i/max(ϵ,y_i)|, where ϵ is an arbitrarily small positive value to ensure the dividing is always legal. §.§ Counterpart methods We select three types of counterpart methods to compare with the proposed method, i.e., the classical statistical models, deterministic DNN-based methods, and VAE-based methods. The classical models include the widely used AR, ARIMA, and SVR. For deterministic DNN-based methods, we choose the LSTM and Informer and implement a stacked CNN and LSTM model (CNN+LSTM) following <cit.> for time series forecasting. For the VAE-based methods, other than the vanilla VAE, we adopt VRNN <cit.> and LaST <cit.>. We brief these methods as follows: – AR forecasts with the weighted sum of past values. ARIMA incorporates moving average and differencing to AR for non-stationary time series. – SVR <cit.> is based on the support vector machine (SVM) and the principle of structural risk minimization. – LSTM <cit.> is an RNN model that can learn the long dynamics with its forget gates. – Informer <cit.> uses multi-head attention with position encoding to learn the latent structure of time series for forecasting. – CNN+LSTM <cit.> stacks CNN and LSTM for accurate air quality forecasting. CNN+LSTM includes three TCN layers and two bi-LSTM layers. – Vanilla VAE <cit.> is the basic variational autoencoder that learns latent representations as independent Gaussian random variables. – VRNN <cit.> extends VAE to be capable of learning temporal dynamics by introducing temporal dependency among the latent representations. – LaST <cit.> adopts disentangled variational autoencoder to capture seasonality and trend, with auxiliary objectives to ensure dissociate representations. §.§ Experiment setup In all the experiments, we use the validation sets to tune optimal parameters and use the test sets for forecasting accuracy measurement. For AR, we search the optimal number of lag (past time series values) from 1 to 10, and use the same strategy to search optimal p (the number of past observations) and q (the size of moving average window) for ARIMA, with the optimal differencing degree searched from 0 to 3. For SVR, we adopt the radial basis function (RBF) kernel for running, with its parameters C (regularization parameter) searched from {1,10,100,1000} and γ (kernel coefficient) searched from {0.00005,0.0005,0.005,0.05}. For LSTM, Informer, CNN+LSTM, vanilla VAE, VRNN, LaST, and HyVAE, we search the optimal batch size from {32,64,128} and set the maximum iteration to be 100 epochs. The learning rate is searched from {0.001,0.01,0.1}. The dimension of the LSTM/GRU hidden states and latent representations are searched from {8,16,32,64,128}, and the number of layers is no more than 3. For HyVAE, the ladder size and the subsequence length are searched from {2,4,6,8,10} and {10,20,30,40}, respectively. We run each method 50 times and report the average accuracy as the final results. §.§ Main results In this experiment, we compare the accuracy of HyVAE with counterpart methods, with respect to single-step forecasting and multi-step (3, 4, and 5 steps) forecasting, respectively, on the four datasets. As shown in Table <ref>, HyVAE generally achieves the best performance among all methods on the four datasets. Notably, we observe on the Parking dataset, the MSE achieved by HyVAE (0.133× 10^-2) is nearly three times smaller than that of the second-best performed LaST (0.366× 10^-2). The least improvement over all the counterpart methods is shown in the Sealevel dataset, in which HyVAE reduces the MSE, MAE, and MAPE of VRNN (the second best) by 6.3%, 9.1% and 1.6%, respectively. When further considering the type of the counterpart methods, first, we see HyVAE achieves significant improvement over the classical AR, ARIMA, and SVR methods, by achieving nearly one magnitude smaller MSE on the Parking and Stock datasets. Second, compared with the deterministic DNN-based LSTM, Informer, and CNN+LSTM, HyVAE also shows significant improvement; especially on the Stock dataset, HyVAE achieves around two times smaller MSE, MAE, and MAPE than the best-performed deep neural network model (CNN+LSTM). Although CNN+LSTM also considers both local patterns and temporal dynamics of time series and outperforms LSTM and Informer on all the datasets, HyVAE constantly being more effective and thus is better at capturing the complex structure of time series for forecasting. Third, we can see that HyVAE achieves more accurate forecasting results than other VAE-based methods that only learn part of the information of time series. That includes the vanilla VAE, which misses the temporal dynamics, VRNN, which only learns the temporal dynamics, and LaST for seasonality/trend patterns of time series. This observation shows the effectiveness of HyVAE to learn both the local patterns and temporal dynamics for time series forecasting. For multi-step forecasting, in Table <ref>, we show the MSE of LSTM, Informer, CNN+LSTM, VRNN, LaST, and HyVAE; AR, ARIMA, SVR, and vanilla VAE are excluded due to low performance. The results show that HyVAE achieves more accurate forecasting results than compared counterpart methods. Although generally, the forecasting accuracy decreases with larger forecasting steps, except for the Parking dataset, the forecasting accuracy of HyVAE decreases much slower than the compared counterpart methods since it captures more informative patterns of time series. For example, from 3-step forecasting to 5-step forecasting in the Electricity dataset, the MSE of HyVAE only decreases by 0.028, while LSTM, Informer, CNN+LSTM, VRNN, and LaST decrease by 0.046, 0.143, 0.034, 0.226 and 0.063, respectively. Meanwhile, CNN+LSTM and HyVAE constantly produce more accurate forecasting results than other deterministic DNN-based methods and VAE-based methods, respectively, and that again supports the effectiveness of learning both local patterns and temporal dynamics for time series forecasting. §.§ Ablation analysis We conduct an ablation analysis to further understand the effectiveness of learning both the local patterns and the temporal dynamics in HyVAE. To do that, we implement two variants of HyVAE by removing the learning of one type of information, respectively; that is, w/o Subseq that excludes the learning of local patterns from subsequences, and w/o Entire that does not learn the temporal dynamics of the entire time series. The parameters of w/o Subseq and w/o Entire are tuned with the validation set the same as HyVAE, and we show the results of time series forecasting measured by MSE in Table <ref>. In Table <ref>, HyVAE that learns both information achieves higher forecasting accuracy than the two variants. Specifically, the largest improvement of HyVAE towards the variants is shown in the Stock dataset (0.087), i.e., around six times smaller than that of w/o Subseq (0.513, second best). The smallest improvement appears in the Sealevel dataset, but the MSE of HyVAE is still around two times smaller than that of the second-best performed w/o Subseq (0.623 to 1.088). Meanwhile, it is interesting to observe that w/o Entire, which misses the temporal dynamics, constantly performs worse that w/o Subseq, which misses local patterns, on the four datasets. We further show the forecasting results of HyVAE and the variants against the ground truth in Fig. <ref>. For w/o Entire, since no temporal dynamics is learned, it cannot properly capture the global trend of time series; especially for the Stock dataset (Fig. <ref> (b)), it misunderstands the steady curves between the 55 and 75 timestamps as sharp spikes. As for the results of the Electricity dataset and the Sealevel dataset shown in Fig. <ref> (c-d), w/o Entire only emphasizes recurring local patterns but misses their differences at different timestamps. Meanwhile, w/o Subseq can better express the temporal dynamics than w/o Entire, as clearly shown in Fig. <ref> (b); however, it fails to properly capture local details. By combining the strengths of w/o Entire and w/o Subseq, HyVAE achieves the best forecasting results that are quite close to the ground truth. §.§ Parameter analysis In this experiment, we analyze the impact of three parameters of HyVAE, i.e., the ladder size, the subsequence length, and the embedding size, on its performance. Specifically, the ladder size determines the causal information during subsequence encoding, and we vary the ladder size from 0 to 10, where 0 means HyVAE learns no causal information of subsequences (see Fig. <ref>). The subsequence length balances the local patterns and the temporal dynamics, i.e., HyVAE is degraded to w/o Subseq or w/o Entire if subsequence length is 0 (no subsequence) or the maximum (50, the subsequence becomes the entire time series), respectively. The results measured by MSE are shown in Fig. <ref>. For the ladder size shown in Fig. <ref> (a-d), the forecasting accuracy significantly decreases when ladder size is too small or too large. The optimal ladder sizes are relatively small (2 for the Sealevel dataset, 4 for the Parking and Stock datasets, and 6 for the Electricity dataset). Meanwhile, we see that when the ladder size equals 0, HyVAE still outperforms w/o Subseq on all the datasets. The results of subsequence length are shown in Fig. <ref> (c-d), in which we see that HyVAE prefers short subsequences to obtain optimal forecasting results, i.e., subsequence length is 10 (Parking, Electricity, and Sealevel datasets) or 20 (Stock dataset). The reason is that if the subsequences are too long, temporal dynamics can hardly be preserved. Not surprisingly, HyVAE that learns temporal dynamics with different subsequence length achieves better forecasting accuracy than w/o Entire, which does not learn temporal dynamics at all. We then run HyVAE with varying embedding size {8,16,32,64,128}, which determines the dimension of latent representation and the dimension of hidden states in neural networks, and the results are shown in Fig. <ref>. On all the datasets, accuracy measured by MSE, MAE, and MAPE has similar trends. First, the forecasting accuracy is low with small embedding size, mainly because the small size of latent random variables cannot properly capture the complex non-linear processes of time series. When the embedding size becomes too large (128), the accuracy decreases due to over-fitting. The results show that HyVAE can obtain optimal forecasting results with relatively small embedding size. § CONCLUSION This paper proposes a novel hybrid variational autoencoder (HyVAE) model for time series forecasting. HyVAE integrates the learning of local patterns and temporal dynamics into a variational autoencoder. Through comprehensive evaluation on four real-world datasets, we show that HyVAE achieves better time series forecasting accuracy than various counterpart methods, including a deterministic DNN-based method (CNN+LSTM) that also learns both information of time series. Moreover, the ablation analyses demonstrate that HyVAE outperforms its two variants which only learn local patterns or temporal dynamics from time series. elsarticle-num
http://arxiv.org/abs/2303.07872v1
20230313030759
Object-based SLAM utilizing unambiguous pose parameters considering general symmetry types
[ "Taekbeom Lee", "Youngseok Jang", "H. Jin Kim" ]
cs.CV
[ "cs.CV" ]
[ [ March 30, 2023 ================== empty empty Existence of symmetric objects, whose observation at different viewpoints can be identical, can deteriorate the performance of simultaneous localization and mapping (SLAM). This work proposes a system for robustly optimizing the pose of cameras and objects even in the presence of symmetric objects. We classify objects into three categories depending on their symmetry characteristics, which is efficient and effective in that it allows to deal with general objects and the objects in the same category can be associated with the same type of ambiguity. Then we extract only the unambiguous parameters corresponding to each category and use them in data association and joint optimization of the camera and object pose. The proposed approach provides significant robustness to the SLAM performance by removing the ambiguous parameters and utilizing as much useful geometric information as possible. Comparison with baseline algorithms confirms the superior performance of the proposed system in terms of object tracking and pose estimation, even in challenging scenarios where the baseline fails. § INTRODUCTION Simultaneous localization and mapping (SLAM), one of the core technologies for autonomous driving, is a technology that reconstructs the environment around the robot and estimates the robot position in the reconstructed map. Despite a significant progress in precise localization using geometrical information of the surrounding environment, it is still difficult for a SLAM system to achieve advanced tasks based on human interaction and scene understanding. To overcome the problem, semantic SLAM that uses semantic information in SLAM has been in using deep learning techniques such as recently developed instance segmentation <cit.>, <cit.>, <cit.> and 3d object detection <cit.>, <cit.>, <cit.>. Object-based SLAM <cit.>, <cit.> is a branch of semantic SLAM that reconstructs an object-based map and provides high-level information. Object-based SLAM simultaneously estimates the location of semantic object inferred from the network while performing feature-based localization used in existing SLAM systems, and enables to estimate camera poses even in featureless environments. In addition, a more expressive map can be constructed by expressing the pose, type, and shape of the semantic objects in the map. However, if the shape of the object itself is symmetric or if the observed shape is symmetric due to occlusion, object-based SLAM can suffer from significant error in the estimation process of ego motion and pose of the object. Since symmetric objects may have the same observation at different viewpoints, data association or motion estimation may fail. We propose a system for robustly optimizing the pose of cameras and objects even in the presence of symmetric objects. The 3d detection module <cit.> is modified to obtain a local observation that predicts multiple poses for each object, similar to <cit.>. We classify object types into asymmetry, discrete, and continuous symmetry based on the local observation of the observed objects. By extracting a parameter corresponding to the symmetry type from the pose of object, only the robust parameter is used as a constraint to jointly optimize the camera pose and object pose. Therefore, the proposed SLAM system has the advantage of robustness by using as much useful geometric information as possible even when symmetric objects are observed, while directly using 3d detection networks with many existing research and dataset. In summary, the contributions of the paper are as follows: * We design a symmetry and pose ambiguity aware object SLAM system which fully utilizes information from multiple pose hypotheses of objects to jointly optimize camera pose and globally consistent object pose. * We propose a method to extract reliable information from ambiguous pose of symmetric objects. We categorize symmetry types of general objects and distinguish pose parameters into ambiguous one and unambiguous ones. The extracted unambiguous parameters of each symmetry type are used in the proposed object association and optimization modules. * We use multiple hypotheses 3d detection network as observation module of our system, which can be easily edited from existing networks and changed to better networks in the future. The remainder of this paper is organized as follows. Section <ref> reviews related literature. The overview and core concepts of the system are provided in Section <ref>. Detailed methods for applying core concepts to systems are described in Sections <ref> and <ref>. In Section <ref>, experiments in simulation and public dataset are presented. Finally, conclusions are provided in Section <ref>. § RELATED WORK This section reviews related studies on object-based SLAM and symmetric-aware object pose estimation. §.§ Object-based SLAM Object-based SLAM attempts to build a robust SLAM system by simultaneously optimizing camera poses, feature positions, and poses of objects from semantic information. To express the shape and pose of an object, <cit.>, <cit.>, and <cit.> use prior object model, cuboid, and ellipsoid, respectively. And <cit.>, <cit.> represent the shape and pose of an object using category specific embedding method. Although they showed that joint optimization could increase the robustness of both camera and object pose estimation, they did not consider the presence of ambiguous detection due to symmetric objects or occlusion. §.§ Symmetry-aware object pose estimation §.§.§ Single view <cit.> proposes a network that can determine whether a shape has symmetry using an object's CAD model, and <cit.> predicts multiple candidate poses for the detected object and analyzes ambiguity that may be caused by occlusion as well as ambiguity by the shape of an object. However, they estimated object pose only from a single view and did not treat multi-view cases such as SLAM. §.§.§ Multiple view Recently, studies considering the pose-ambiguity of objects have been proposed in object-based SLAM. PoseRBPF <cit.> estimates the pose distribution of asymmetric and symmetric objects using the rao-blackwellized particle filter. However, it requires a predefined codebook for the pose of the object model. <cit.> is the object-based SLAM system that simultaneously optimizes camera poses and object poses using the projection of reconstructed 3d keypoints as a prior. However, every time they encounter on a new dataset, they have to label the prior. <cit.> expresses geometrical primitives in an unified, decomposed quadric form and explicitly deals with the degenerative case due to a symmetric shape. However, the degenerative cases considered in <cit.> are limited to a few quadric types, so error can be induced when fitting arbitrary shapes to quadric. <cit.> uses a single neural network to predict poses as multi-hypotheses and optimizes them through a max-mixture<cit.> model. Since the symmetric object has ambiguous pose parameters, such as the rotation angle for an axis of symmetry, pose estimation should be performed by considering only the unambiguous elements. However, error can occur because <cit.> directly uses hypotheses containing even ambiguous parameters for pose estimation. We propose a robust SLAM system using existing well-developed 3d detection modules while extracting only available geometric elements from symmetric objects and using them as optimization constraints. § PROPOSED SYSTEM §.§ Symmetry types The key idea of the proposed system is to propose a criterion that can effectively classify general objects using only three symmetry types and to define different pose representations suitable for each symmetry type in order to fully utilize the geometry information available in the symmetric object. In general, objects can be asymmetric or symmetric. The asymmetric object can be inferred to have a consistent object pose in the 3d detection module, no matter which viewpoint it is observed from, but the symmetric object cannot. In addition, we classify symmetry as discrete and continuous types. Discrete symmetric objects refer to reflection symmetric objects that can have a finite number of poses as the observed viewpoints change, and continuous symmetric objects refer to objects with an infinite number of poses based on an axis of symmetry, such as a circular table. Objects which are classified into the following three types are represented in different ways to reflect all possible unambiguous pose parameters: * Asymmetry: All detection results of a asymmetric object can be used to optimize a unique pose since the unique pose can be determined when viewpoint changes. Accordingly, the pose can be represented by 6 degrees of freedom (DoF) which is commonly used. * Discrete symmetry: Objects with multiple planes of symmetry have as many poses supporting the same shape as the number of planes of symmetry. We express the pose assuming that the symmetrical planes of most discrete symmetric objects present have one intersection line. The intersection of symmetric planes is defined as the axis of symmetry, and the rotation angle based on the axis is defined as a symmetric angle. Accordingly, the position and the axis of symmetry are shared with the reflected poses of a discrete symmetric object, and only the symmetric angle can be expressed differently. In other words, the pose of a discrete symmetric object is defined as five shared parameters for position and axis of symmetry and unshared parameters for all the symmetry angles. * Continuous symmetry: For objects such as round tables, there is an infinite number of symmetry planes, so there is an infinite number of object poses that support the same shape. For continuous symmetric objects, it is assumed that planes of symmetry have a single intersection, as in the case of discrete symmetry. Therefore, we express the pose of continuous symmetric objects only by position and axis of symmetry after removing the symmetric angle by classifying it as an ambiguous parameter. §.§ Pipeline The entire pipeline is described in Fig. <ref>, and the tracking and object mapping modules are designed based on DSP-SLAM <cit.>. When a new keyframe is selected, the multi-hypothesis detection network uses an rgb-d image to detect objects, and the detected objects infer observable multiple pose hypotheses (Section <ref>). The categorization module determines the symmetry type of the detected object based on the distribution of multiple pose hypotheses. We extract the axis of symmetry for symmetric objects and cluster the poses with similar symmetry angles for discrete symmetry objects (Section <ref>). We associate the categorized detection with map objects using the class and pose except for ambiguous parameters. For discrete symmetric objects where a new symmetry angle is observed, we add a non-shared parameter (Section <ref>). The camera pose, map point, and map object are jointly optimized at the backend. The constraint between the camera pose and map object pose is formed differently for each map object type during optimization (Section <ref>). § CATEGORIZED DETECTION AND OBJECTS §.§ Multi-hypothesis 3d object detection We modify the 3d object detection module so that it can infer multiple pose hypotheses. Since the distribution of inferred multiple hypotheses influences the determination of the object's symmetry type, it should be modified so that the multi-hypothesis 3d object detection module can cover all the poses that the object can have. <cit.> extends the single-loss single-output system to have multiple outputs, calculating loss <cit.> using only the hypothesis that succeeded in the most accurate inference among multiple hypotheses in the training process. Unlike the method of using the average loss of multiple outputs, this can increase multi-hypothesis diversity because each hypothesis is randomly selected and learned individually. We also modified the 3d object detection module <cit.> in the same way as <cit.>, allowing a source for the object's symmetry type to be inherent in multiple hypotheses. §.§ Symmetry type categorization of detection As shown in Fig. <ref>, since the multi-hypothesis detection implies the ambiguity of the object's pose, we can classify the object's symmetry type and extract the type-specific pose parameters only from the detection result without prior information. Unlike the symmetric object, the multiple pose hypotheses of the asymmetric object are similar to single pose. In other words, the distribution of pose hypotheses of the asymmetric object is very close to unimodal, and the variance is much smaller than that of the symmetrical object. For discrete and continuous symmetry types, we perform an additional classification process because the normalized singular values of multiple hypotheses are large in both cases. As mentioned in Section <ref>, both types have certain axis of symmetry, and the axis of symmetry l is obtained as follows: l^*=l∈ℝ^3argmax[ω_o_1o_2,ω_o_1o_3,⋯,ω_o_1o_N]^T· l _2 , where ω_o_1o_i = ω_o_1o_i/ω_o_1o_i_2, ω_o_1o_i = log_so(3)(R_co_1^TR_co_i) ∈ℝ^3. N and ω are the number of hypotheses and rotation axis, respectively. And, symmetry angles are computed by θ_o_1o_i = ω_o_1o_i_2. After clustering the multiple hypotheses using the DBSCAN algorithm <cit.>, the variance between the representative θ of each cluster is compared. As illustrated in Fig. <ref>, compared to the continuous symmetric object which corresponds to a continuous set of θ, the variance among clusters of discrete symmetric object is very large. Representative θ values of rectangular table form two clusters with about 180 difference, while the round table has many similar representative θ clusters. Then, reliable parameters of pose can be extracted for each classified symmetry type. First, the asymmetric object can use 6 DoF from detection results, and the continuous symmetric object can use position and axis of symmetry. In discrete symmetric objects, parameters are position, axis of symmetry, and representative symmetry angles of the clusters. §.§ Data association of objects The categorized detection results are associated with the previously generated map objects. First, the detection results, which represent relative transformation between the camera and the object, are warped in world coordinate using tracked camera pose T_wc. Then, object matching is performed by comparing the unambiguous parameters of the detected object and map objects considering the symmetry type. Due to inaccurate detection or partial observation, the same object can be categorized by different symmetry types in different views. We address the misclassification by following association strategies. If there is a discrete or continuous symmetry type in the two comparison groups, the position and axis of symmetry (5 DoF) parameters are compared; otherwise, the distance between the 6 DoF parameters is computed. If the distance is small enough and the class is the same, matching between the objects is successful. After object matching is performed, the symmetric angles of the detected discrete symmetric object are associated with the nearest symmetric angle of the matched map object. The unmatched angles are added to the map object as a new symmetric angle. Discrete symmetric object can be occasionally classified into asymmetry type at a specific viewpoint, as can be seen from Fig. <ref> (a) and (c) of the the discrete case. Therefore, even if 6 DoF matching between asymmetry objects fails, if 5 DoF matching is successful, we change the map object to the discrete symmetry type to express the pose with position, an axis of symmetry, and symmetric angles. Object association using unambiguous parameters for each symmetry type alleviates mismatching caused by ambiguous parameters. Therefore, the proposed system can track objects for a long time, which acts as an important source in joint optimization. The detection result that failed to match is registered as a new map object after the shape reconstruction using deep-sdf <cit.> similar to DSP-SLAM. § JOINT OPTIMIZATION We perform joint optimization by modifying the existing SLAM optimization problem using the categorized map objects and associated detection results. C^*, O^*, P^* = C,O,Pargmin  E_reproj(C, P)+E_obj(C, O) , where C, O, and P refer to the camera and object pose and map point included in the optimized window size, respectively. E_reproj denotes the reprojection error, and E_obj denotes the pose error between the map object and the camera. The joint optimization is solved by the Levenberg-Marquardt method through g2o<cit.> solver. E_obj is designed only with unambiguous parameters in consideration of the symmetry type of map object, which can produce a more robust solution than existing methods that utilize all pose parameters with an ambiguous parameter as a constraint. §.§.§ Asymmetry The results of asymmetry map object and associated multiple hypotheses are not linked by multiple edges but by a single edge using a max-mixture model, which selects the hypothesis with the lowest error at each iteration of optimization, similar to <cit.>. e_asym(T_wc,T_wo) = min_j∈[1,N]log_se(3)(T_co^j· T_wo^-1· T_wc) , where T_wc and T_wo, which mean the pose of the camera and object on the world, are optimization variables, T_co^j represents the j-th hypothesis, and N is the total number of hypotheses. §.§.§ Discrete symmetry Discrete symmetric map objects have position and axis of symmetry as shared parameters and M symmetric angles as non-shared parameters. Each hypothesis is associated with one of symmetry angles of the matched map object, and edges are formed as many as the number of associated symmetric angles, m. Each edge is modeled with the max-mixture like the asymmetry case. e_disc(T_wc,T_wo_i) = min_j_i∈[1,N_i]log_SE(3)(T_co^j_i· T_wo_i^-1· T_wc) , where  T_wo_i = [ exp(θ_wo_i·ω_wo) t_wo; 0_1×3 1 ],   i ∈[1,m] . N_i refers to the number of hypotheses associated with the i-th symmetric angle, and T_wo_i means the i-th symmetric pose constructed by position and axis of symmetry which are shared parameters and the i-th symmetric angle. Furthermore, for unconstrained parameterization in optimization, the axis of symmetry is used by the following expression: ω_wo = f(ϕ_wo, ψ_wo), where ϕ_wo, ψ_wo and f(·) are polar angle, azimuth in spherical coordinates, and the transformation function from (ϕ, ψ) to ω, respectively. §.§.§ Continuous symmetry The continuous symmetric map object has only position and axis of symmetry as unambiguous parameters. The axis of symmetry (ω_co) extracted from the rotation part and individual position parts of multiple hypotheses are used to formulate the following: e_cts(T_wc,T_wo) = e_trans + γ· e_axis , where  e_trans = min_j∈[1,N] t_co^j - R_wc^T(t_wc-t_wo) _2 , e_axis = f^-1(R_wc·ω_co) - [ϕ_wo, ψ_wo]^T_2 . e_trans and e_axis are max-mixture based translation error and error related to axis of symmetry, respectively. γ is the constant weight for balancing two error terms. § EXPERIMENTAL RESULTS This section presents the performance of the proposed symmetry-aware object SLAM system compared with the baseline. Simulation and public datasets are used to evaluate the proposed system. §.§ Setup When a camera looks at the feature-rich scene, ego-motion can be estimated accurately by the feature-based SLAM backbone <cit.> in object-based SLAM systems. On the other hand, object-camera constraints are dominant estimation sources if the camera observes a featureless scene. Therefore, in order to effectively evaluate the proposed object-based SLAM system, we construct a simulation environment such that one side of the environment has rich feature points and the other side has a few feature points, as shown in Fig. <ref>. Then we obtain the simulation dataset using Unreal Engine and AirSim <cit.>. The camera moves surrounding a center object in the environment so that camera observes feature-rich and featureless scenes alternately for each specific region, as shown in Fig. <ref> (a) and (b). As shown in Fig. <ref>, the center object can be replaced with discrete and continuous symmetric objects in the simulation environment. These cases are called sim(disc) and sim(cts). In addition, we evaluate the proposed system in the general indoor scenes using the popular scanNet dataset <cit.>. For training of the 3D detection network used in our system, pre-training is performed using SUN RGB-D dataset <cit.>. After that, to reduce the domain gap between actual and simulation data, additional data are acquired in the simulation, and fine-tuning is performed. We only fine-tune the detection network for simulation dataset since ScanNet dataset only provide axis-aligned bounding box. Both pre-training and fine-tuning is done in the same way as <cit.>. The SUN RGB-D dataset assumes that the input point clouds are represented in the coordinates aligned with the direction of gravity, and expresses the object's orientation using the rotation angle with respect to the axis of gravity (i.e. yaw). However, ScanNet dataset has no gravity direction, so we calculated in advance the rotation matrix that aligns the y-axis of camera with the normal vector of the ground plane for each frame. An additional sensor such as an inertial measurement unit or ground detection module may help to change the preprocessing for online implementation. We used the number of hypotheses as 30, which was selected empirically to categorize symmetry types of detection well. We test using Intel i7-10700 (2.9GHz) and NVIDIA RTX 2060 GPU. DSP-SLAM using single hypothesis detection results is used as the first baseline system (SH), and the second baseline (MH) is the modified DSP-SLAM to integrate with key idea on <cit.> which uses multi-hypothesis detection with no consideration of symmetry types. §.§ Case study To understand how the proposed system enhances the overall performance, we test object tracking and pose estimation under the presence of symmetric objects with pose ambiguity, using the environment in Fig. <ref>. For fair comparison by isolating the other sources that affect the performance except the pose ambiguity, we construct a pose graph using edges from the camera to objects obtained from the proposed categorization and association module and true camera nodes and estimated the object pose by optimization. The same setup is employed to test the baseline algorithms. Fig. <ref> shows the result of object tracking and the reconstructed map object using the sim(disc) dataset. The proposed method continuously tracks the center object, and a single map object is reconstructed accordingly. On the other hand, the baseline algorithms (MH, SH) fail to track, and incorrectly recognize a single object as two or more map objects. The translation error of the estimated object is reported in Fig. <ref>. MH and SH show large error when establishing the object again after the tracking failure, whereas the proposed method maintains small error through successful object tracking. §.§ System evaluation The performance of the entire system was compared and evaluated with the baseline system using the simulation environment and ScanNet. First, Fig. <ref> shows the quantitative results compared with the baseline system using the simulation environment sim(disc). The baseline and camera trajectory are plotted on the map built by the proposed system. In the beginning, a feature-rich scene is observed as shown in Fig. <ref> (a), so all three systems are good at estimating pose. Such trend changes as the features that can be used for localization disappear, since the camera location must be estimated using only the tracked object. Based on the good object tracking performance, the proposed system also demonstrates good performance even in the featureless region using an unambiguous pose parameter that fits the symmetry type. However, both MH and SH systems fail to estimate the pose in the featureless region. The baseline algorithms associate the detection with the map object on the map using all 6 DoF parameters, and there are cases when none of the multiple hypotheses fits the previous detection result. The data association may fail due to such mismatch in yaw angle. Quantitative results for the simulation environment are shown in Table <ref>. For sim(cts), the baseline algorithms also had no failure in pose estimation, but we can see that the proposed algorithm has the highest performance. Fig. <ref> shows qualitative results on a ScanNet Scene0022_00. This sequence includes not only the symmetrical objects but also the objects that do not fully enter the camera field of view, so the uncertainty of detection is high. This is revealed in the result of SH. As seen in simulation setting, the baseline system fails data association and many objects are registered in same position of the map. However, the proposed system robustly recognizes as a single object and optimizes the pose even in these cases. The quantitative results are shown in table <ref>. We evaluate the system performance using root mean squared error (RMSE) error of each keyframe position. The proposed system exhibits similar or better path estimation performance in most sequences. § CONCLUSIONS Symmetric objects present in the scene can cause the performance degradation or even failure of SLAM, since their observation at different viewpoints can be identical and cause obscurity. We proposed a method for robustly optimizing the pose of cameras and objects even in the presence of symmetric objects. The proposed classification of objects into three categories depending on their symmetry characteristics was successfully applied to various objects. Under the proposed method, the objects in the same category can be associated with the same type of ambiguity, which contributes to the efficiency in data association. By extracting only the unambiguous parameters corresponding to each category and using them in data association and joint optimization of the camera and object pose, the proposed approach provides significant robustness to the SLAM performance. Proposed system showed better performance than baseline systems in environments with many symmetric objects. -8cm ./bibtex/IEEEtran
http://arxiv.org/abs/2303.07106v2
20230313134257
Design, Control, and Motion Strategy of TRADY: Tilted-Rotor-Equipped Aerial Robot With Autonomous In-flight Assembly and Disassembly Ability
[ "Junichiro Sugihara", "Takuzumi Nishio", "Keisuke Nagato", "Masayuki Nakao", "Moju Zhao" ]
cs.RO
[ "cs.RO" ]
Design, Control, and Motion Strategy of TRADY: Tilted-Rotor-Equipped Aerial Robot With Autonomous In-flight Assembly and Disassembly Ability Junichiro Sugihara, Takuzumi Nishio, Keisuke Nagato, Masayuki Nakao, and Moju Zhao Junichiro Sugihara, Keisuke Nagato, Masayuki Nakao, and Moju Zhao (corresponding author) are with the Department of Mechanical-Engineering, The University of Tokyo, Bunkyo-ku, Tokyo 113-8656, Japan (e-mail:j-sugihara@jsk.imi.i.u-tokyo.ac.jp; chou@jsk.imi.i.u-tokyo.ac.jp; nagato@hnl.t.u-tokyo.ac.jp; nakao@hnl.t.u-tokyo.ac.jp). Takuzumi Nishio is with the Department of Mechano-Infomatics, The University of Tokyo, Bunkyo-ku, Tokyo 113-8656, Japan (e-mail:nishio@jsk.imi.i.u-tokyo.ac.jp). March 30, 2023 ================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================== Various types of aerial robots have been demonstrated in prior works with the intention of enhancing their maneuverability or manipulation capabilities. However, the problem remains in earlier researches that it is difficult to achieve both mobility and manipulation capability. This issue arises due to the fact that aerial robots with high mobility possess insufficient rotors to execute manipulation tasks, while aerial robots with manipulation ability are too large to achieve high mobility. To tackle this problem, we introduce in this article a novel aerial robot unit named TRADY. TRADY is a tilted-rotor-equipped aerial robot with autonomous in-flight assembly and disassembly capability. It can be autonomously combined and separated from another TRADY unit in the air, which alters the degree of control freedom of the aircraft by switching the control model between the under-actuated and fully-actuated models. To implement this system, we begin by introducing a novel design of the docking mechanism and an optimized rotor configuration. Additionally, we present the configuration of the control system, which enables the switching of controllers between under-actuated and fully-actuated modes in the air. We also include the state transition method, which compensates for discrete changes during the system switchover process. Furthermore, we introduce a new motion strategy for assembly/disassembly motion that incorporates recovery behavior from hazardous conditions. Finally, we evaluate the performance of our proposed platform through experiments, which demonstrated that TRADY is capable of successfully executing aerial assembly/disassembly motions with a rate of approximately 90%. Furthermore, we confirmed that in the assembly state, TRADY can utilize full-pose tracking, and it can generate more than nine times the torque of a single unit. To the best of our knowledge, this work represents the first time that a robot system has been developed that can perform both assembly and disassembly while seamlessly transitioning between fully-actuated and under-actuated models. Aerial systems, mechanics and control, aerial assembly and disassembly, distributed control system. § INTRODUCTION In recent years, aerial robots have undergone significant development <cit.>, <cit.> and have proven to be useful for various practical applications. Compact aerial robots such as quadrotors with terrain-independent mobility have enabled various autonomous applications such as cinematography <cit.>, inspection <cit.>, disaster response <cit.>, and surveillance <cit.>. Furthermore, to enhance mobility, numerous designs that enable robots to navigate through narrow spaces have been proposed, such as quadrotors with morphing capabilities that allow their airframe to shrink <cit.>. On the other hand, there has been a growing demand for aerial robots to possess manipulation capabilities, which require larger controllable degrees of freedom (DoF) and available force and torque (wrench). As a solution, more intricate and sizable aerial robots have been developed, including multirotors equipped with over six tiltable rotors enabling omni-directional control <cit.>, and arm-manipulator-installed multirotors capable of interacting with the environment <cit.>.However, a significant issue in the conventional works is the inherent trade-off between mobility and manipulation capability. To clarify, High-mobility under-actuated aerial robots often lack the necessary controllable DoF and available wrench to achieve manipulation tasks, whereas fully-actuated robots with manipulation capability often lack compactness. To address this problem, some researchers have proposed a transformable multilink design <cit.> that enables robots to navigate narrow spaces and perform manipulation tasks using their entire body <cit.>. Nonetheless, these transformable aerial robots require a significant number of additional actuators, making them heavy, and even with transforming capability, it remains challenging to achieve the same maneuverability as a small quadrotor in a narrow space with three-dimensional complexity.In this article, we present a solution to the aforementioned trade-off problem by introducing TRADY, a novel aerial robot platform that can perform aerial assembly and disassembly motion, as depicted in figure:trady_main (A), while changing its controllable DoF and available wrench. In its unitary state, TRADY is a compact under-actuated quadrotor, however, in its assembly state, it becomes a fully-actuated octorotor, enabling it to execute aerial manipulation tasks as depicted in figure:trady_main (B). §.§ Related works TRADY is a type of modular aerial robot, and previous studies have developed several other modular aerial robots. In <cit.>, Naldi et al. introduce a single ducted-fan module, and in <cit.>, a tetrahedron-shaped quadrotor module consisting of four fractal single-rotor submodules is presented. Furthermore, in <cit.>, a modular quadrotor equipped with tilted rotors is proposed. These modular aerial robots can combine with one another and expand their degrees of freedom and wrench, however, <cit.> are currently not focused on self-assembly/disassembly. On the other hand, several aerial robots capable of self-assembly or self-disassembly have previously been developed. For instance, in <cit.>, <cit.>, a robot unit composed of wheels and rotors capable of docking on the ground and taking off afterwards is presented. Additionally, in <cit.>, a modular quadrotor with the capability of aerial self-assembly is proposed, followed by one with the ability of aerial self-disassembly proposed in <cit.>. However, the issue that remains is that the robot presented in <cit.>, <cit.> is restricted to assembly/disassembly on the ground, and mid-air assembly/disassembly are unfeasible, whereas <cit.>, <cit.> virtually specialize in either aerial assembly or aerial disassembly but not both. Futhermore, assembly or disassembly motion demonstrated in <cit.> are unaccompanied by the alternation of controllable DoF, implying that the robots are under the control of an under-actuated model in both the assembly and unitary states. The utilization instance of TRADY envisioned in this research comprises tasks illustrated in figure:trady_concept. To accomplish this, movement in a narrow space must be carried out in the unitary state, and during manipulation tasks, the units must assemble to extend the controllable DoF and wrench, then return to the unitary state afterwards. Therefore, the compatibility of aerial self-assembly and self-disassembly, and the consequent alteration of the controllable DoF, remain crucial unachieved issues that are necessary for realizing TRADY. In this study, we tackle this issue from the perspectives of design, control, and motion strategy. Concerning the design of the self-docking mechanism, various designs have been previously presented. For example, in <cit.>, autonomous boats equipped with hook-string docking mechanisms are introduced. In this system, the hooks of the male mechanism attach to the loop of string on the female mechanism, and the female side winches the loop of thread and the male mechanism together, thereby merging the modules. While this mechanism works effectively on the water, the coupling force is not sufficiently strong to be applicable to aerial systems. On the other hand, in <cit.>, to achieve aerial docking, a quadrotor is enclosed in a rectangular frame equipped with permanent magnets. While this mechanism can construct a highly rigid structure, it has the disadvantage of being unable to release the coupling once it has been established. On the contrary, a quadrotor unit that can undock through the torque generated by the unit itself is developed in <cit.>. However, to achieve undocking capability, the docking mechanism is significantly downsized in comparison to the one used in <cit.>, and the design is not suitable for aerial docking. Furthermore, as the docking can be released through the torque output of a unit, the strength of the mechanism becomes a bottleneck for available torque, making it arduous to execute tasks that necessitate high torque. As an alternative method for releasing the magnetic coupling, the utilization of elastic energy is proposed in <cit.>. The mechanism proposed in <cit.> shortens the internal spring of the mechanism using an actuator, and releases it to generate restoring force, thereby releasing the magnetic coupling. In the case of this mechanism, it is possible to release high rigidity coupling by using a spring with a high spring constant and a powerful actuator. However, pulling and detaching magnets in the translational direction is an inefficient, resulting in the mechanism becoming extremely large. Furthermore, with the docking mechanism that uses magnets, in addition to the method of detachment, attention should be paid to the magnetic interference from the external environment. When the structure exposes the magnet to the outside as in [1], [2], although normal flight is not a problem, magnetic interference from the surroundings becomes a significant obstacle in manipulation tasks and interaction with the external environment. Therefore, in this work, we introduce a novel high-rigidity docking mechanism, which consists of a powerful magnetic mechanism that can be switched on and off by a low-torque motor and a movable peg, thus enabling both aerial docking and undocking to be achieved. Furthermore, we ensure that the magnets are not exposed to the outside during flight through appropriate structural design. Regarding rotor configuration, in order to expand the controllable DoF and available wrench through assembly and change the control model from an under-actuated model to a fully-actuated model, it is necessary to use tilted rotors. As mentioned earlier, <cit.> has made it possible to achieve fully-actuated model control by combining four quadrotor units of different types with tilted rotors. In this case, the concept of the actuation ellipsoid is used to determine the appropriate rotor configuration. In this work, we propose a new rotor configuration optimization method that focuses not only on maximizing the performance in the assembly state, but also on achieving high-precision aerial self-assembly/disassembly motion. Additionally, in order to achieve simplicity in the system, TRADY acheive fully-actuated model by docking two unit quadrotors with the same rotor configuration. Subsequently, regarding the controller, TRADY utilizes distinct controllers for the assembly and unitary states. The aircraft in the assembly state is a typical fully-actuated multirotor, which can employ a conventional hexarotor control method based on thrust allocation matrices, as presented in <cit.>, <cit.>. By means of this method, TRADY in the assembly state is capable of controlling six DoF, which consist of forces and torques in all axes. On the other hand, TRADY in its unitary state is a tilted quadrotor that is controlled as a under-actuated model. In this case, the controllable DoF are four: the z-direction force and torque on all axes, but it is not possible to control the x and y-directional forces generated by the tilted rotors. Therefore, it is necessary to suppress the generation of these horizontal forces through some means. While in <cit.>, which also uses a tilted quadrotor as a unit machine, the horizontal forces are suppressed solely through design method, in this work, we focuses on suppressing the horizontal forces through both design and control method. Therefore, LQI control is adopted for unit control, explicitly minimizing the horizontal forces generated during flight. Another important point to consider in the control of TRADY is the switching between under-actuated and fully-actuated models during aerial assembly/disassembly motion. When the control model is discretely changed during flight, the control of the vehicle becomes unstable (e.g., the vehicle suddenly rising or falling) due to the influence of model errors. The elimination of this instability is crucial for achieving stable assembly/disassembly. Therefore, in this study, we introduce a novel method to eliminate this instability by applying our own transition processing during the control model switching. Finally, regarding motion strategy, several previous studies have presented strategies for self-assembly of robots. For instance, in <cit.>, a path planning method based on global optimization is employed to enable self-assembly of boats on water surfaces, while <cit.> utilizes vehicle guidance via gradient method for quadrotor self-assembly in mid-air. These strategy are efficacious in circumstances where the high positional accuracy of unit vehicles can be maintained during the assembly motion. Nonetheless, when it comes to the aerial assembly motion of unit vehicles that are furnished with tilted rotors, as employed in this study, the thrust of each unit interferes with one another, resulting in unstable position control as the two units approach. Consequently, in this study, we assume the existence of positional errors and suggests a motion strategy that iteratively approaches until the assembly is successfully achieved, while avoiding dangerous situations. This facilitates an autonomous and reliable assembly motion. Additionally, we extend the strategy to encompass self-disassembly, providing a comprehensive approach. To sum up, the main contribution of this work can be summarized as follows; * We propose the design of docking mechanisms that combines strong coupling and easy separation. * We present the optimized rotor configuration to achieve controllability with under-actuated model in the unitary state and with fully-actuated model in the assembly state. Moreover, this rotor configuration also takes into account the stability improvement of aerial assembly/disassembly motion. * We develop a control system that allows for switching between control models and includes transition processing to compensate for control instability during model switching. * We introduce the motion strategy that enables autonomous and stable aerial assembly/disassembly motion even in situations where position control is unstable. Although we focus on the evaluation with two units, our methodology can be easily applied to more units by installing both male and female docking mechanisms in a single unit. Furthermore, to the best of our knowledge, this is the first time to achieve the both self-assembly and self-dessembly with the same robot platform in an autonomous manner, and also achieved the manipulation task by switching between under-actuated and fully-actuated models. §.§ Notation From this section, nonbold lowercase symbols (e.g., m) represent scalars, nonbold uppercase symbols (e.g., R) represent sets or linear spaces, and bold symbols (e.g., u, Q) represent vectors or matrices. Superscripts (e.g, ^{CoG}p) represent the frame in which the vector or matrics is expressed, and subscripts represent the target frame or an axis, e.g., ^{ W}r_{ CoG } represents a vector point from { W} to { CoG} w.r.t. { W}, whereas u_x denotes the x component of the vector u. §.§ Organization The remainder of this paper is organized as follows. The mechanical design including the design of docking mechanisms is presented in sec:mech_design, and the modeling of our robot and optimized rotor configuration is introduced in sec:rotor_config. Next, the flight control and model switching method are presented in sec:control, followed by motion strategy in sec:motion_strategy. We then show the experimental result of trajectory following flights, aerial assembly and disassembly, and object manipulation tasks in sec:experiment before concluding in sec:conclusion. § MECHANICAL DESIGN In this section, we present the mechanical design of the proposed robot, TRADY. Initially, we provide an overview of the entire robot design and subsequently expound upon the design of the docking mechanisms. §.§ Entire Robot Design In this study, the minimum unit comprising TRADY is designed as a quadrotor unit. Each unit is equipped with a common rotor configuration, as well as either a male-side or female-side the mechanism at the same position. Therefore, the overall structure of the device is depicted in figure:whole_design. §.§ Docking Mechanism The prerequisites for the design of a docking mechanism are twofold: firstly, it should be capable of accomplishing both docking and undocking operations in the air, and secondly, it should possess sufficient rigidity to execute high-load tasks. Therefore, we propose a methodology of coupling with a permanent magnet and movable pegs. §.§.§ Female side As shown in figure:female_mech, the main components of the female mechanism are a permanent magnet equipped with a magnetic switching mechanism and a mechanism called a drogue, which compensates for positioning errors. The on-off switching of the magnetic force is realized by the principle illustrated in the cut model in figure:female_mech. In this mechanism, it is possible to interrupt the magnetic force by rotating one of the two permanent magnets 180deg using a servo motor. Since the two magnets do not directly touch each other, the force that hinders the rotation of the magnet is only friction with the housing, and rotation is easily possible with a low-torque servo motor. Through the use of this magnet, restraint in the translational direction of the docking mechanism is achieved.Furthermore, the drogue attached to the tip of the female mechanism is a mechanism adopted in autonomous aerial refueling systems for fighter aircraft such as <cit.>, <cit.>, which compensates for control errors of the size corresponding to the diameter of the mechanism. In this study, the radius of the drogue was set to 5cm in order to absorb errors within ±2.5cm. Additionally, the gradient inside the drogue was empirically determined to be approximately 35deg. The drogue not only compensates for position errors, but also has two additional functions. One is to improve rigidity by increasing the contact area, and the other is to prevent the influence of external magnetic forces by covering the magnets. §.§.§ Male side As shown in figure:male_mech, the male mechanism is composed of an steel plate for magnetic attraction and movable pegs. The movement of the peg is achieved using a slider-crank mechanism powered by a servo motor, and during docking, the peg is inserted into the receptor of the female mechanism to provide confinement in the bending direction. The tip of the mechanism is designed to closely adhere to the drogue of the female mechanism. The overall size of the docking mechanism is determined based on the clearance that should be maintained between the rotors in the assembly state. § MODELING AND ROTOR CONFIGURATION In this section, we introduce the kinematics and dynamics model of our robot in the first place, followed by the thrust allocation. Then, we present the method of optimization of rotor configuration. §.§ Modeling The kinematics model of TRADY is depicted in figure:multirotor_model(A) and each quantities are difined as shown in table:multirotorparam. Since this model can be applied to multirotors with any number of rotors, the model of TRADY is represented by figure:multirotor_model with n = 4 in the unitary state, and with n = 8 in the assembly state.Based on this kinematics model, the wrench-force ^{CoG}f and torque ^{CoG}τ ) can be written as ^{CoG}f = ∑_i=1^nλ_i^{CoG}u_i, ^{CoG}τ = ∑_i=1^nλ_i^{CoG}p_i×^{CoG}u_i+σ^{CoG}f, where {CoG} is the frame that have the origin at the center-of-mass of the body. From (<ref>) and (<ref>), the translational and rotational dynamics of a multirotor unit are given by the Newton-Euler equation as followings: M^{ W}r̈_{ CoG } = ^{ W}R_{ CoG }^{CoG}f+ ([ 0; 0; -Mg ]), ^{CoG}I^{CoG}ω̇ = ^{CoG}τ+σ^{CoG}f - ^{CoG}ω×^{CoG}I^{CoG}ω, where { W} frame represent the world coordinate system. Then, using (<ref>) and (<ref>), allocation from the thrust force λ to the resultant wrench can be given by following: ([ ^{CoG}f; ^{CoG}τ ]) = ([ Q_tran; Q_rot ]) λ = Qλ, where Q_tran = ( ^{CoG}u_1,^{CoG}u_2,⋯,^{CoG}u_n), Q_rot = (^{CoG}v_1,^{CoG}v_2,⋯,^{CoG}v_n), ^{CoG}v_i = ^{CoG}p_i×^{CoG}u_i. Note that the second term in (<ref>) is omitted for the remainder of the analysis because it is one order of magnitude smaller than the first term in general. §.§ Thrust Allocation §.§.§ In the Assembly State In the assembly state, TRADY is fully-actuated, and the allocation matrics Q is full-rank. Therefore, we can gain MP pseudo-inverse matrics ^#Q. Given a desired wrench, the target thrust can be computed by following: λ = ^#Q([ ^{CoG}f; ^{CoG}τ ]). §.§.§ In the Unitary State In the unitary state, Q∈ R^6× 4 is rank deficient, and we need to adopt under-actuated model. As the conventional method, the control targets for under-actuated model are f_z, τ_x, τ_y, and τ_z. Applying the control method illustrated in sec:control, we can achieve the hovering of a quadrotor unit with these four inputs. In the case of a quadrotor with non-tilted rotors, because it does not produce f_x and f_y, desired thrusts are easily calcurated as following: λ = ^#(^quadQ) ^t[ f_z τ_x τ_y τ_z ], where ^quadQ = ( [ Q_tran,z; Q_rot ]) ∈ R^4× 4 , and Q_tran, z∈ R^1 × 4 is the third row vector of Q_tran.However, TRADY unit is a tilted quadrotor that produces translation forces f_x, f_y and these are uncontrollable with (<ref>). Therefore, assuming the existence of the static thrust λ_s that enables hovering while suppressing the generation of f_x and f_y, we introduce a method to apply (<ref>) to the thrust allocation of tilted quadrotor by utilizing λ_s. In <cit.>, Zhao et al. use a tilted coodinate system in order to obtain λ_s and we apply this idea to our work. Now, we introduce a new coodinate system {C} that has the origin at the center-of-mass of body as shown in figure:multirotor_model(B). Furthermore, we define {C} to fulfill the following conditions: Q_tran'λ_s = -mg, Q_rot'λ_s = 0, where Q_tran', Q_rot' are allocation matrices defined in {C}. (<ref>), (<ref>) indicate that the direction of the resultant force due to λ_s coincides with the z-axis of {C}. In other word, by controlling the robot's attitude so that {C} is horizontal, it becomes possible to hover the robot without generating excess forces in the horizontal direction. In this case, by using Q_tran' and Q_rot', thrust allocation can be achieved through (<ref>), similar to that of a non-tilt quadrotor. Therefore, we focus on deriving Q_tran', Q_rot', and {C}.Since both {C} and {CoG} have origins at the center-of-mass, from (<ref>), following is also satisfied: Q_rotλ_s = 0. Additionally, regarding translation, following is valid from (<ref>): F_z = mg, where F_z = Q_transλ_s. Then, we difine the rotation matrics R_C that satisfies: R_CF_z =^t[ 0 0 mg ]. Integrating (<ref>), (<ref>), and (<ref>) we can gain follows: R_C( [ Q_tran; Q_rot ]) λ_s = ^t[ 0 0 mg 0 0 0 ] . Comparing (<ref>) and (<ref>) with (<ref>), our discussion results in followings: R_CQ_tran=Q_tran' , R_CQ_rot=Q_rot' . Because (<ref>), (<ref>) mean that R_C is the rotation matrics that maps {CoG} to {C}, the conversion from {CoG} to {C} is easily calcurated with R_C. Furthermore, (<ref>) to (<ref>) suggest that if there exists a Q that satisfies (<ref>) and (<ref>) for a given λ_s, it is possible to hover tilted quadrotor using that λ_s. §.§ Optimized Rotor Configuration The TRADY rotor configuration must meet three prerequisites. Firstly, it must enable fully-actuated model control in the assembly state. Secondly, it should allow for under-actuated model control in the unitary state. Finally, it must attain the necessary flight properties required for aerial assembly/disassembly motion. Therefore, we propose a methodology to optimize the rotor configuration that satidsfies these conditions. §.§.§ Fully-actuated Model Controllability Initially, we propose a technique for achieving fully-actuated model control when TRADY is in the assembly state. As described in Equation 1, the full rank of matrix Q is equivalent to fully-actuated model control, as Q can map L to an arbitrary wrench in real space if it is full rank. However, each rotor has a limit of thrust force, which can lead to instability of control due to weak resultant force or torque in certain directions. Thus, rather than directly employing algebraic methods to make Q full rank, we seek to maximize the available force and torque region to ensure translational and rotational controllability in all axes. To accomplish this, a concept of feasible control force convex polyhedron 𝒱_ℱ, and torque convex polyhedron 𝒱_𝒯 were introduced by <cit.>. These are defined as follows: 𝒱_ℱ(U):={^{CoG}f∈ R^3| 0 ≤λ_i≤λ_max}, 𝒱_𝒯(U):= {^{CoG}τ∈R^3| 0≤λ_i≤λ_max} , where the set of rotor direction vectors U is defined as U = [ u_1 ⋯ u_8; ]. In addition, ^{CoG}f, ^{CoG}τ are defined in (<ref>), (<ref>) and maximum thrust for each rotor in TRADY is denoted by λ_max, while the minimum thrust is established at 0, as we utilize unidirectional rotors.Then, we define the values for the guaranteed minimum control force, denoted as f_min, and the corresponding torque, represented by τ_min, in accordance with the subsequent equations are being satisfied: ^{CoG}f - m g≤ f_min ⇒ ^{CoG}f∈𝒱_ℱ, ^{CoG}τ≤τ_min ⇒ ^{CoG}τ∈𝒱_𝒯. Note that our robot is controled under the premise that the roll and pitch angles are proximate to zero. As such, we posit that the gravity force is horizontal to the CoG frame, and we account for this force as an offset when defining the guaranteed control force.Therefore, by maximizing these f_min and τ_min, the guaranteed force and torque regions can be maximized. Thus, we initially explicate the methodology for computing f_min. As an example of feasible control force convex polyhedron which is depicted in figure:convex, f_min is equal to the radius of the inscribed sphere of this polyhedron, and the same is true for torque. Thereby, f_min is calculated by exploiting the distance d^f_ij(U), which is the length from the origin to a plane of polyhedron along its normal vector h^f_ij. The calculation of d^f_ij(U) can be performed as following. d_i j^f(U) =|∑_k=1^Nmax(0, λ_max ^th^f_ij^{CoG}u_k) - ^th^f_ijm g|, where h^f_ij = ^{CoG}u_i×^{CoG}u_j/|^{CoG}u_i×^{CoG}u_j| . Moreover, as f_min corresponds to the radius of the inscribed sphere, we may ascertain f_min in the following manner: f_min=min _i, j d_i j^f . Note that, if f_min > 0, the robot can fly.Similarly, τ_min can be acquired by calculating d_i j^τ in the following manner. d_i j^τ(U)=|∑_k=1^Nmax(0, λ_max ^th^τ_ij^{CoG}v_k)|, τ_min=min _i, j d_i j^τ, where h^τ_ij = ^{CoG}v_i×^{CoG}v_j/|^{CoG}v_i×^{CoG}v_j| . To sum up, the objective function to be maximized in this optimization of TRADY's rotor configuration is formulated as follows. S(U) = w_1f_min + w_2τ_min, where w_1 and w_2 are the positive weights to balance between force and torque. Additionally, the constraints can be expressed as follows: ∗ 1: f_min > 0, ∗ 2: τ_min > 0. Although our primary focus is on the assembled aircraft consisting of two quadrotor units, the maximization of S(U) within the constraints described in (<ref>) and (<ref>) ensures the attainment of fully-actuated model control in aircraft composed of an arbitrary number of units. §.§.§ Under-actuated Model Controllability Subsequently, we present the constraints for (<ref>) to enable TRADY to achieve stable flight in the unitary state. Firstly, as previously noted in sec:introduction, the TRADY is composed of two quadrotor units, each possessing an identical rotor configuration. Consequently, the whole structure can be illustrated as figure:unit_config(A), with a constraint expressed as follows: u_1 = u_5, u_2 = u_6, u_3 = u_7, u_4 = u_8 . Additionally, as noted above, the prerequisite for stable flight of the units is that both (<ref>) and (<ref>) are satisfied. Despite the presence of an infinite number of combinations for {C} and λ_s, we assume that λ_s = λ_s ^t[ 1 1 1 1; ], to ensure even distribution of workload across each rotor. Consequently, an additional constraint can be formulated as follows. ∗ 3: λ_sQ_trans ^t[ 1 1 1 1; ] = mg, ∗ 4: λ_sQ_rot ^t[ 1 1 1 1; ] = 0 . §.§.§ Flight Characteristics for Aerial Assembly/Disassembly Next, we consider the flight characteristics required for aerial assembly/disassembly. Generally, quadrotors obtain translational propulsion by inclining their airframe. However, this inclination impedes parallel contact between two units during assembly motion. The coupling mechanism proposed in this study has a small contact area, which renders this non-parallel relationship a hindrance to the assembly process.However, in the instance of the TRADY unit, its target coordinate system is {C}, which is inclined with respect to {CoG}. Consequently, the airframe inclines during hovering, and conversely, it assumes a horizontal orientation during movement in a specified direction. Hence, we establish a novel constraint for the optimization to regulate the tilted angle of {C} in such a way that the airframe assumes a horizontal orientation when it accelerates along the positive x-axis direction in figure:unit_config(B).Assuming that the inclination angle during hovering is -γ as shown in figure:unit_config(C), the force exerted by the unit in the x-direction when it is in a horizontal state can be written as mgtanγ. Then the desired value of γ is calculated as follows: γ = -tan^-1(^desa/g), where ^desa is the target acceleration in the x-direction. Consequently, we introduce the following constraint condition for the rotation matrix R_C, to ensure that {C} tilts by -γ around the y-axis: ∗ 5: R_c = [ [ cos(-γ) 0 sin(-γ); 0 1 0; -sin(-γ) 0 cos(-γ); ]] . To sum up, the optimization problem for the rotor configuration can be summarized as follows: Umaximize S(U) subject to ∗ 1∼∗ 5 §.§.§ Solver for Optimization Problem Finally, in order to solve the designed optimization problem, it is necessary to choose an algorithm, but it is not always guaranteed that a solution that satisfies all the set constraints exists. Therefore, we use the global optimization algorithm ISRES <cit.> that can find the closest possible solution even if a perfect solution is not found. The optimized U obtained as a result of solving the optimization problem using the parameters shown in table:op_param and the guaranteed minimum force and torque in the unitary and assembly states are presented in table:op_result. Here, each u is represented by spherical coordinate parameters α and β as shown in figure:unit_config(B). Furthermore, the outcomes are rounded off to two significant digits. The obtained outcome reveals that the optimized rotor angles exhibit a symmetrical pattern. This occurrence can be attributed to the constraints established in (<ref>) and (<ref>), as these equations embody force and torque offsets. In addition to this, it can be seen that both the minimum guaranteed force and torque become more than twice as high in the assembly state when using fully-actuated model compared to the unitary state. § CONTROL Firstly, we outline the methodology for flight control, which incorporates fully-actuated model control for the unitary state and fully-actuated model control for the assembly state. Next, we propose a system switching strategy to be executed during the docking or undocking process. §.§ Fully-actuated Flight Control §.§.§ Position Control For position control, a general PID controller is adopted. Thus, from (<ref>), (<ref>), the desired force and torque can be derived as following: f^des = m ^{ W}R_{ CoG }^-1(K_pe_r +K_i∫e_rdt +K_dė_̇ṙ), where e_r is a position error defined as e_r = ^{ W }r^des_{ CoG } - ^{ W }r_{ CoG }, and K_p, K_i, K_d are gains for controller. Additionally, { C } is used instead of { CoG } in the unitary state.In the assembly state, as shown in figure:a_fc, the obtained f^des from (<ref>) is allocated to the desired thrust by Q_trans. §.§.§ Attitude Control Next, we explain attitude control. In the case of a fully-actuated model, it is possible to apply traditional PID control for attitude control. Here, by using (<ref>), the desired torque can be obtained as follows: τ^des = ^{CoG}I(K_pe_α +K_i∫e_αdt + K_dė_̇α̇) + ^{CoG}ω× ^{CoG}I ^{CoG}ω, where e_α is an attitude error defined as e_α = ^{ W }α^des_{CoG} - ^{ W }α_{CoG} and K_p, K_i, K_d are gains for controller. Then, the desired torque τ^des obtained from attitude control is allocated into the desired thrust for each rotor using the allocation matrix Q_rot as shown in figure:a_fc. §.§ Under-actuated Flight Control §.§.§ Position Control The position control for the underactuated model is developed using the methodology presented in <cit.>, which involves determining the target force via conventional PID feedback loop and subsequently converting it to target roll and pitch angles. The target forces f^des_x and f^des_y can be obtained using (<ref>), followed by determining the target roll θ and pitch ϕ as outlined below: ^{ W}θ^des_{ C } = atan^-1(-f_y, √(f^2_x+f^2_z)), ^{ W}ϕ^des_{ C } = atan^-1(f^2_x, f^2_z). These target angles are achieved by attitude controller.Additionally, regarding the position control in z-direction, collctive thrust force f^des_z is calculated in the following manner: f^des_z = ^t(^{ W}R_{ C }b)f^des, where b is a unit vector ^t[[ 0 0 1; ]].Then, using λ_s defined in (<ref>) and (<ref>), the target thrust for z-directional control is calculated as follows: λ^des_z = f^des_z/mgλ_s. §.§.§ Attitude Control In attitude control, to suppresse the uncontrollable horizontal forces due to the tilted rotors, we adopt LQI control<cit.> which is a type of optimal control that derives control inputs that minimize the cost function. Therefore, by designing the cost function appropriately, various requirements can be met in addition to convergence speed. The state equation of posture control is described as follows: ẋ = Ax+ Bλ+D( ^{ C }I^-1 ^{ C}ω× ^{ C }I ^{ C}ω), y = Cx, where x = ^t[[ e_x ė_̇ẋ e_y ė_̇ẏ e_z ė_̇ż ∫e_x ∫e_y ∫e_z ]], e = α^des - α, ė = α̇^des - α̇, B = ^t[[ 0_4×1 B_1 0_4×1 B_2 0_4×1 B_3 0_4×3; ]], [ [ B_1 B_2 B_3; ]] = ^t(^{ C }I^-1Q_rot'). Note that the target roll and pitch angle is ^{ W}θ_{ C }, ^{ W}ϕ_{ C } obtained from (<ref>) and (<ref>). In regards to the cost function, this study designs a function with the objective of improving convergence, suppressing the control input, and suppressing translational forces. In this case, the cost function is given as follows: J = ∫_0^∞( ^txMx + ^tλNλ)dt, where M and N are diagonal weight matrices. The first term in (<ref>) corresponds to the control output's norm, and minimizing this norm can enhance the convergence. Moreover, concerning the second term in (<ref>), the method of defining N as follows has been proposed in <cit.>: N = W_1 + Q_trans^T 'W_2Q_trans', where W_1 and W_2 are also diagonal weight matrices. Then, the first term of (<ref>) creates a quadratic form ^tλNλ when substituted into (<ref>), corresponding to the norm of control input. Therefore, by minimizing this term, the control input can be suppressed. Furthermore, when the second term is substituted into (<ref>), the following equation is derived. ^tλ ^tQ_trans'Q_trans'λ = ^tff = f^2. As seen from (<ref>), the norm of translational force is represented by the second term of (<ref>). Therefore, by employing the control input λ that minimizes the cost function defined in (<ref>), stable attitude control of a unit equipped with tilted rotors can be achieved. By solving the algebraic Riccati equations derived from (<ref>) and (<ref>), we obtain the feedback gain K. Therefore, the desired λ is calculated as follows: λ^des_rot = Kx+ ^#Q_rot' ^{ C}ω× ^{ C}I ^{ C}ω . Finally, in combination with the z axis position control, the final output in the unitary state is ultimately calculated as follows: λ^des = λ^des_z + λ^des_rot . §.§ System Switching We present a methodology for system switching that is executed during assembling and disassembling actions. §.§.§ Overall Control System To begin with, the overall control system is designed, as depicted in figure:whole_system. The “Motion Planner”, “Estimator”, and “Robot” sections adopt common processes in both the assembly state and the unitary state. Conversely, the “Switching Section” serves as a partition that alternates between the assembly and unitary states. During the assembly state, the entire system is controlled by a distributed control system, while each unit controls its respective rotors based on a common robot model without communicating with one another. Therefore, the overall structure of the system remains unchanged between the assembly state and the unitary state, with only the contents of the “Switching Section” being switched. §.§.§ Transition Process Next, we explain the transition process that should be performed when switching systems. The problem when switching the system is the model error related to the inertia values and rotor performance of the robot. In normal flight control of TRADY, model errors are compensated for by the integral term of PID and LQI. In addition, there is no offset thrust based on default values in the gravity direction, and it is all compensated for by the integral term. Model error compensation by integral value is gradually performed while gradually increasing the rotor thrusts during takeoff, so it is generally completed until hovering.As an example, we consider the system switching during the assembly action. When switching the system, most control values are reset because the controller is switched. However, as mentioned earlier, gravity compensation is performed by the integral term, so only the integral terms are carried over in order to continue the flight. However, since this integral term compensates for the model error of the robot in the unitary state, the model error in the assembly state is not compensated for. Model errors that suddenly occur during flight, unlike during takeoff, cause discrete increases or decreases in rotor thrusts, which have a significant negative effect on control stability. To address this issue, a method of gradually transitioning rotor thrusts while compensating for the model error of the assembly state model was developed. Although it is impossible to predict each rotor thrust after model error compensation, the total weight of the system does not change before and after system switching, thereby the total thrust force acting in the gravity direction after model error compensation can be said to be the same as in the unitary state. Furthermore, since among each rotor thrust, the proportion that works in the direction of gravity does not change, consequently, the total thrust of all rotors can be said to be equal before and after switching. Therefore, the influence of sudden model errors can be suppressed by scaling the rotor thrusts output from the controller based on the total thrust in the unitary state. However, it is necessary to reflect the influence of the control output in the assembly state, thereby the control output is scaled using the value obtained by superimposing the total thrust in these two states.Here, the total thrust in the unitary state is obtained using the total thrust immediately before the system switch, and the total thrust in the assembly state is obtained using the real-time control output. Then, rotor thrusts during the transition is scaled as follows: λ^des_trans = S_trans/ S_assemλ^des_assem, S_trans = W(t)S_assem+ (1- W(t)) S_unit, where S_assem is the total thrust in the assembly state defined as S_assem = ∑_i=1^nλ^des_assem, i and S_unit is that in the unitary state. Note that S_assem is a variable but S_unit is a constant because S_unit competed by the thrust at the moment of switching. Additionally, W(t) is the weight function used in the superimposing and it is desirable for it to smoothly converge to 1. Therefore, W(t) is defined as follows: W(t) = 1-1/at+1, where a is a constant and t is a variable representing time. Then, W(t) satisfies follows: W(0) = 0, lim_t →∞W(t) → 1 . Therefore, in (<ref>), initially the influence of S_unit is dominant, but gradually S_assem becomes dominant and ultimately λ_trans becomes indistinguishable from the normal output of the assembly state controller. Thus, as a result, even after the system switch, the rotor thrust transitions smoothly. The variable a in (<ref>) determines the convergence rate of the function, and in this work, it was empirically set to a = 0.9. In this case, W(t) attains a value of 0.99 when t = 120. During actual implementation, W(t) is refreshed at each control cycle with a frequency of 0.025s. Consequently, W(t) achieves 0.99 after approximately 3s of real time have elapsed.To sum up, by utilizing the aforementioned methodology, it is possible to address the discrete thrust changes caused by model errors during system switching. This transition process occurs outside the controller, as illustrated in figure:a_fc and figure:u_fc, and can be regarded as a kind of disturbance to the feedback loop. However, if this disturbance itself converges sufficiently quickly, the overall system stability is ultimately dependent on the stability of controllers. In the case of our method, the tuning of a in (<ref>) ensures the convergence rate of the transition process, while the stability of the PID controller is achieved through the tuning of its gains, and the stability of the LQI controller is guaranteed by (<ref>). Therefore, the proposed transition process has no impact on the stability of the feedback loop. § MOTION STRATEGY In this section, we introduce the motion strategy for executing assembly/disassembly motion in mid-air. Initially, we propose the overarching strategy, followed by an specific explication of each constituent. §.§ Overall Strategy As explained in Section. <ref>, in aerial assembly/disassembly motions, the two units come into extreme proximity, causing unstable flight. This makes high-precision position control difficult. Therefore, a motion strategy is required that ensures the certainty of the motion under multiple conditions, and executes it only if these conditions are met. Then, in this study, we divide the target action into several stages and represent them as an Finite State Machine (FSM) as shown in figure:state_machine. In this FSM, conditions are set to transition between states, and when two units fulfill them, the motion transitions to the next state. By repeating this process, it becomes possible to autonomously perform aerial assembly/disassembly motion while avoiding hazardous conditions. §.§ Assembly Motion Now, we explain each state in the FSM, focusing on the assembly motion. §.§.§ Standby State This state is the initial state of the FSM, where both units are guided towards their respective standby positions and yaw angles. The female unit maintains its position and yaw angle at the start of assembly, while the male unit is guided to a position and yaw angle ψ that satisfies the following relationship: ^{ F }r_{ M } = ^t[ [ d^st 0 0 ]] , ^{ F }ψ_{ M } = -π where{ F } represents the { C } frame of the female unit, while { M } represent that of the male unit. Additionally, d^st is the desired distance between two units' CoG. Note that the direction of each axis is the same as that shown in figure:unit_config.Here, we define the following condition #1 with respect to the errors in r_y, r_z, and ψ: # 1: ( [ ^{ F }r_y{ M }; ^{ F }r_z{ M }; ^{ F }ψ_{ M }; ]) ≤( [ e^# 1_y; e^# 1_z; e^# 1_ψ; ]) where e^# 1_y,e^# 1_z,e^# 1_ψ are tolerable errors. Condition # 1 is used as a criterion to determine if the positional relationship between the two units is safe. If the relationship between the female unit and the male unit satisfies # 1, the state transitions to the “Approach” state. §.§.§ Approach State At this state, the male unit moves towards the female unit, while the female unit maintains its position and angle. During the approach phase, if condition # 1 is no longer met, the approach motion is interrupted and the system transitions to the “Standby” state. By virtue of this process, it becomes possible to instantaneously recover from a hazardous positional state between the two units and continue with the assembly motion unimpeded.Here, we define the following condition # 2 with respect to the errors in r_x, r_y, r_z, and ψ: # 2: ( [ ^{ F }r_x{ M }; ^{ F }r_y{ M }; ^{ F }r_z{ M }; ^{ F }ψ_{ M }; ]) ≤( [ e^# 2_x; e^# 2_y; e^# 2_z; e^# 2_ψ; ]) where e^# 2_x,e^# 2_y,e^# 2_z,e^# 1_ψ are tolerable errors. Condition # 2 is used as a criterion to determine if the two units are in a position where they can docking. If the condition # 2 is satisfied, the state transitions to the “Assembly” state. §.§.§ Assembly State In this state, initially, the docking mechanism is activated by turning on the magnet and inserting the pegs, and subsequently, the system is transitioned into the assembly mode. During the aforementioned movements, if condition # 2 is no longer met, the movement is halted and the state transitions to the “Approach” state. §.§.§ Transition State In this state, the process of transition presented in Section. <ref> is executed. §.§ Disassembly Motion In the case of aerial disassembly, the system transitions from “Hovering” to “Transition,” and then proceeds to “Disassembly.” During “Disassembly,” the coupling mechanism is released, allowing the two units to separate. Unlike in assembly, positional control of the bodies is not critical during disassembly, and therefore, there are no conditions that must be satisfied for the state transitions. § EXPERIMENT In this section, we first describe the robot platform utilized in each experiment. Next, we present the experimental results, which include the evaluation of flight stability in each state, aearil assembly and disassembly motion based on proposed control method and motion strategy, and object manipulation in the assembly state. §.§ Robot Platform §.§.§ Hardware Based on the design proposed in sec:mech_design and sec:rotor_config, we introduce the hardware configuration illustrated in figure:hardware_config. The frame of the body is made of a 5mm CFRP plate, while the other parts are mainly made of PLA material. In determining the size of the entire body, we first determined the size of the docking mechanism based on the rigidity required for the coupling portion and then selected the minimum body size that can accommodate the docking mechanism. The rotors are composed of 5 inch propellers (GEMFAN Hulkie 5055S-3) and brushless motors (ARRIS S2205), driven by ESC (T-Motor F45A). Each rotor is tilted based on the optimized U in sec:rotor_config. With this configuration, each rotor exerts a thrust of approximately 1N-8N at a voltage of 15V. Furthermore, an on-board PC (Khadas VIM4) and a flight controller called Spinal, which uses an STM32 microcontroller, are installed on the body. The housing of the docking mechanism is made of PLA, and a servo motor (KONDO KRS-3302) is installed on both the male and female sides. In addition, Arduino nano is used to control the servo motor. In addition, a 2200mAh four-cell LiPo battery is used as the power source. However, in some experiments, power is supplied from a bground-based stabilizing power source instead of a battery to enable emergency stop. Finally, table:hard_prop shows the characteristics of the robot. §.§.§ Software Next, we introduce the communication system for proposed robot TRADY as shwon in figure:software_config. Firstly, the external PC executes motion planning including the strategy for the assembly/disassembly motion presented in sec:motion_strategy, and it outputs position attitude commands. Subsequently, these commands are transmitted to the onboard PC through a Wi-Fi network. Furthermore, the external motion capture system transmits the positional state of the robot to the onboard PC. The onboard PC consists of a robot model calculation, position estimator by Kalman filter, and position controller. Afterward, the onboard PC transmits commands to Arduino and Spinal with UART communication. Spinal also receives self-attitude information from the IMU sensor and estimates the attitude of the robot with a Kalman filter. Target PWM is output from the attitude controller based on the estimated attitude values and commands from the onboard PC. Moreover, Arduino receives commands from the onboard PC and sends angle commands to the servo motors of the coupling mechanism. §.§ Flight stability We first conduct a circular trajectory tracking flight experiment in order to verify the flight stability of both the unitary state and the assembly state. In this experiment, a circular trajectory with a radius of 0.5m at an altitude of 1m was adopted, and a robot circles this obit twice in one minute. The result is shown in figure:circle_track and table:circle_track. Figure 1 visualizes the tracking error, while table:circle_track shows the Root Mean Squared Error (RMSE) from the trajectory for each state. From these results, it is found that both the under-actuated model control in the unitary state and the fully-actuated model control in the assembly state are possible. The control accuracy is inferior in the unitary state compared to the assembly state, which is due to not only the under-actuated model control but also the large moment of inertia of the body despite its weight. However, the positional error within this range can be dealt with by the drogue on the female-side docking mechanism and the proposed motion strategy, thus not posing significant issues. §.§ In-flight assembly and disassembly §.§.§ Reliability of Aerial Assembly/Disassembly To conduct an airborne coalescence experiment, the parameters in (<ref>) and (<ref>) must first be determined. The parameters e^#1_y, e^#1_z, e^#1_ψ in (<ref>) are the criteria for determining the dangerous state, and therefore, smaller values of these parameters will result in more reliable merging, but will also increase the time required to complete the merging. Since the parameters e^#2_x, e^#2_y, e^#2_z, e^#2_ψ in (<ref>) are the criteria for docking certainty, there is also a tradeoff between certainty and time required to adjust these parameters. In this study, these values were adjusted through experiments on actual equipment, and the final values were determined as shown in table:hash_cond.After determining the parameters, we conducted 15 experiments for both aerial assembly and disassembly. The results indicated a success rate of 86.7% (13 successful attempts) for assembly behavior and a 100% success rate (15 successful attempts) for disassembly behavior. In addition to this, the time required for the merging behavior ranged from 3s to 15s, and there was a large variation. In two failed assembly experiments, the docking mechanism became stuck in a part of the airframe, making it impossible to transit from the “Approach” state to the “Standby” state, necessitating an emergency stop of the robot. As a solution to this issue, covering the entire unit body with a spherical guard would allow avoidance of contact between the docking mechanism and the airframe. §.§.§ Stability of System Switching Next, to evaluate the flight stability during the system switchover, we conducted in-flight assembly and disassembly experiments with and without the thrust transition method proposed in Section. subsec:transition. First, for the aerial assembly, the results with the transition process are shown in figure:assembly_trans, and the results without the proposed thurst transition process are shown in figure:assembly_notrans. In the event of an increase in rotor thrust during the system switch, the forces in the x and y directions are offset; however, significant effects are apparent in the control of the z direction. Therefore, both figure:assembly_trans and figure:assembly_notrans include plots of rotor thrust displacement and z-directional position error. Concerning the case of transition processing, it can be observed from figure:assembly_trans that stable aerial assembly and thrust transitions are achieved. As shown in figure:assembly_trans(B) and (C), the total rotor thrust remains constant before and after the system switch, and the subsequent ascent of robot is limited to approximately 0.065m. Additionally, the control is rapidly stabilized following the switchover. Note that, despite the transition process, there are still discrete changes in the thrust of each rotor. However, these changes are due to alterations in the allocation of thrust to each rotor and not to model errors, and they have a negligible adverse effect on control performance. On the contrary, regarding the experiment without transition processing, figure:assembly_notrans(B) shows that the target rotor thrust changed abruptly due to model errors that occur during the system switchover. The total rotor thrust increases by about 5N before and after the switchover, and for some rotors the target thrust greatly exceeds the upper thrust limit. As a result, the robot rose about 0.39m at a stretch immediately after assembly as show in figure:assembly_notrans(C), and unstable control continued after that. These results indicate the efficacy of our proposed method for switching systems in aerial assembly motion.Next, regarding aerial disassembly, figure:disassembly_trans illustrates the experimental result of aerial disassembly with proposed transition process. Moreover, figure:disassembly_notrans illustrates the variation in rotor thrust before and after mid-air disassembly when the transition process was not applied. From these results, it was found that in aerial disassembly, it is possible to safely switch the system with or without transition processing. This is likely due to the fact that in the assembly state, decentralized control is performed by two controllers, resulting in model errors equivalent to those of two aircraft. In contrast, in the unitary state, only model errors equivalent to those of one aircraft are generated. As a result, in the unitary state, the effect of system switching on thrust is presumed to be small. §.§ Peg Insertion Next, we conducted an experiment to verify the aerial object manipulation ability in the assembly state. First, we conducted an experiment to insert a diameter of 6mm peg into a diameter of 25mm pipe as an analogy to drilling and Pic-and-Place tasks. Due to the requirement of high position accuracy and independent control of translation and rotation for this task, the fully-actuated model control is necessary. Note that in this study, we focus on the control performance of the robot, and therefore, the task is performed by manual operation, not by automatic control based on motion planning. The experimental results are shown in figure:peg.From these results, it was demonstrated that the robot can be maneuvered with an error of approximately ±1cm. Furthermore, as shown in figure:peg(B),(C), the pitch angle of the robot was kept within approximately ± 1.5 degrees during movement and hovering, demonstrating translational control can be achieved while suppressing the impact on the attitude. §.§ Valve Opening Finally, to demonstrate the expansion of achievable torque through assembly of units, we conducted a valve opening experiment. An industrial gate valve was used for the experiment, and end effectors for valve operation was attached to the robot. These end effectors are capable of passive expansion and contraction, and do not hinder takeoff and landing. The results of the experiment are presented in figure:peg. From these results, it was demonstrated that proposed robot TRADY is capable of stable valve opening operations in the air. figure:peg(B) shows that a maximum torque of 2.4Nm is required during task execution (actually, about 2.2Nm of torque is required to open this valve). Here, it can be seen that by assembling units, the torque performance is improved by approximately nine times with respect to the yaw direction torque that can be exerted in unit state, which is a maximum of 0.28Nm. This is due to the fact that the size of the body has increased by assembling units and that torque realization using the horizontal component of rotor thrusts is possible due to the fully-actuated model control. § CONCLUSION In this study, we have developed the configuration of the quadrotor unit named TRADY that possesses the ability to engage in aerial self-assembly and self-disassembly. A noteworthy achievement of this work is that the robot can perform both assembly and disassembly while seamlessly transitioning between fully-actuated and under-actuated models. Building upon the proposed design, control methodology, and motion strategy, we conducted empirical experiments that demonstrated the robot's ability to perform stable assembly/disassembly movements, as well as execute various aerial manipulation tasks. During the assembly/disassembly experiment, we established that the proposed robot can successfully complete assembly/disassembly movements at a rate of 90%, while also observing that the proposed thrust transition method can suppress instability during switching. Additionally, in the task execution experiment, we determined that the robot in the assembly state can exercise independent control over translation and rotation, while also generating nine times the torque compared to the unitary state.The pivotal concern that remains in this study is that TRADY, while in the assembly state, is fully-actuated but not omni-directional, which restricts its ability to hover at a significantly tilted posture. As a future prospect, we intend to design a new docking mechanism equipped with joints that will enable the robot to alter rotor directions after assembly. This will expand the robot's controllability in a more significant manner. Furthermore, expanding the system by utilizing three or more units remains a future challenge. In cases involving three or more units, multiple combinations are possible, allowing for the selection of appropriate units based on the task at hand. IEEEtran 10 url@samestyle Floreano2015 D. Floreano and R. J. Wood, “Science, technology and the future of small autonomous drones,” Nature, vol. 521, pp. 460–466, 2015. kumar2012 V. Kumar and N. Michael, “Opportunities and challenges with autonomous micro aerial vehicles,” The International Journal of Robotics Research, vol. 31, no. 11, pp. 1279–1291, 2012. Bonatti2020 R. Bonatti, Y. Zhang, S. Choudhury, W. Wang, and S. Scherer, “Autonomous drone cinematographer: Using artistic principles to create smooth, safe, occlusion-free trajectories for aerial filming,” in Proceedings of the 2018 international symposium on experimental robotics.1em plus 0.5em minus 0.4emSpringer, 2020, pp. 119–129. Sewer F. Chataigner, “Arsi: an aerial robot for sewer inspection.” Advances in Robotics Research: From Lab to Market. Springer, Cham, 2020, pp. 249–274, 2020. Michael2012 N. Michael, S. Shen, K. Mohta, Y. Mulgaonkar, V. Kumar, K. Nagatani, Y. Okada, S. Kiribayashi, K. Otake, K. Yoshida, K. Ohno, E. Takeuchi, and S. Tadokoro, “Collaborative mapping of an earthquake-damaged building via ground and aerial robots,” Journal of Field Robotics, vol. 29, no. 5, pp. 832–841, 2012. Doitsidis2012 L. Doitsidis, S. Weiss, A. Renzaglia, M. W. Achtelik, E. Kosmatopoulos, R. Siegwart, and D. Scaramuzza, “Optimal surveillance coverage for teams of micro aerial vehicles in gps-denied environments using onboard vision,” Autonomous Robots, vol. 33, pp. 173–188, 2012. figure_8 Y. Bai and S. Gururajan, “Evaluation of a baseline controller for autonomous “figure-8” flights of a morphing geometry quadcopter: Flight performance,” Drones, 2019. morphing_quad D. Falanga, K. Kleber, S. Mintchev, D. Floreano, and D. Scaramuzza, “The foldable drone: A morphing quadrotor that can squeeze and fly,” IEEE Robotics and Automation Letters, vol. 4, no. 2, pp. 209–216, 2019. origami D. Yang, S. Mishra, D. M. Aukes, and W. Zhang, “Design, planning, and control of an origami-inspired foldable quadrotor,” in 2019 American Control Conference (ACC), 2019, pp. 2551–2556. n_zhao N. Zhao, Y. Luo, H. Deng, and Y. Shen, “The deformable quad-rotor: Design, kinematics and dynamics characterization, and flight performance validation,” in 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2017, pp. 2391–2396. Bucki N. Bucki, J. Tang, and M. W. Mueller, “Design and control of a midair-reconfigurable quadcopter using unactuated hinges,” IEEE Transactions on Robotics, vol. 39, no. 1, pp. 539–557, 2023. Voliro “The voliro omniorientational hexacopter: An agile and maneuverable tiltable-rotor aerial vehicle,” IEEE Robotics and Automation Magazine, vol. 25, pp. 34–44, 12 2018. khamseh2018 H. B. Khamseh, F. Janabi-Sharifi, and A. Abdessameud, “Aerial manipulation―a literature survey,” Robotics and Autonomous Systems, vol. 107, pp. 221–235, 2018. Mellinger2011 D. Mellinger, Q. Lindsey, M. Shomin, and V. Kumar, “Design, modeling, estimation and control for aerial grasping and manipulation,” in 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2011, pp. 2668–2673. Heredia2014 G. Heredia, A. Jimenez-Cano, I. Sanchez, D. Llorente, V. Vega, J. Braga, J. Acosta, and A. Ollero, “Control of a multirotor outdoor aerial manipulator,” in 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014, pp. 3417–3422. hydrus M. Zhao, K. Kawasaki, K. Okada, and M. Inaba, “Transformable multirotor with two-dimensional multilinks: modeling, control, and motion planning for aerial transformation,” Advanced Robotics, vol. 30, no. 13, pp. 825–845, 2016. dragon M. Zhao, F. Shi, T. Anzai, K. Okada, and M. Inaba, “Online motion planning for deforming maneuvering and manipulation by multilinked aerial robot based on differential kinematics,” IEEE Robotics and Automation Letters, vol. 5, no. 2, pp. 1602–1609, 2020. Lasdra H. Yang, S. Park, J. Lee, J. Ahn, D. Son, and D. Lee, “Lasdra: Large-size aerial skeleton system with distributed rotor actuation,” in 2018 IEEE International Conference on Robotics and Automation (ICRA), 2018, pp. 7017–7023. Zhao2022 M. Zhao, K. Okada, and M. Inaba, “Versatile articulated aerial robot dragon: Aerial manipulation and grasping by vectorable thrust control,” International Journal of Robotics Research, 2022. Naldi2015 R. Naldi, F. Forte, A. Serrani, and L. Marconi, “Modeling and control of a class of modular aerial robots combining under actuated and fully actuated behavior,” IEEE Transactions on Control Systems Technology, vol. 23, no. 5, pp. 1869–1885, 2015. Granger K. Garanger, J. Epps, and E. Feron, “Modeling and experimental validation of a fractal tetrahedron uas assembly,” in 2020 IEEE Aerospace Conference, 2020, pp. 1–11. Xu2021 J. Xu, D. S. D'Antonio, and D. Saldana, “H-modquad: Modular multi-rotors with 4, 5, and 6 controllable dof,” vol. 2021-May.1em plus 0.5em minus 0.4emInstitute of Electrical and Electronics Engineers Inc., 2021, pp. 190–196. Flightarray1 R. Oung, A. Ramezani, and R. D'Andrea, “Feasibility of a distributed flight array,” in Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference, 2009, pp. 3038–3044. Flightarray2 R. Oung, F. Bourgault, M. Donovan, and R. D'Andrea, “The distributed flight array,” in 2010 IEEE International Conference on Robotics and Automation, 2010, pp. 601–607. Saldana2018 D. Saldana, B. Gabrich, G. Li, M. Yim, and V. Kumar, “Modquad: The flying modular structure that self-assembles in midair.”1em plus 0.5em minus 0.4emInstitute of Electrical and Electronics Engineers Inc., 9 2018, pp. 691–698. moddessemble D. Saldana, P. M. Gupta, and V. Kumar, “Design and control of aerial modules for inflight self-disassembly,” IEEE Robotics and Automation Letters, vol. 4, pp. 3402–3409, 10 2019. Hara2014 I. O'Hara, J. Paulos, J. Davey, N. Eckenstein, N. Doshi, T. Tosun, J. Greco, J. Seo, M. Turpin, V. Kumar, and M. Yim, “Self-assembly of a swarm of autonomous boats into floating structures,” in 2014 IEEE International Conference on Robotics and Automation (ICRA), 2014, pp. 1234–1240. Yanagimura K. Yanagimura, K. Ohno, Y. Okada, E. Takeuchi, and S. Tadokoro, “Hovering of mav by using magnetic adhesion and winch mechanisms,” in 2014 IEEE International Conference on Robotics and Automation (ICRA), 2014, pp. 6250–6257. Ryll2016 M. Ryll, D. Bicego, and A. Franchi, “Modeling and control of fast-hex: A fully-actuated by synchronized-tilting hexarotor,” in 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).1em plus 0.5em minus 0.4emIEEE, 2016, pp. 1689–1694. Park2016 S. Park, J. Her, J. Kim, and D. Lee, “Design, modeling and control of omni-directional aerial robot,” vol. 2016-November.1em plus 0.5em minus 0.4emInstitute of Electrical and Electronics Engineers Inc., 11 2016, pp. 1570–1575. Tandale M. D. Tandale, R. Bowers, and J. Valasek, “Trajectory tracking controller for vision-based probe and drogue autonomous aerial refueling,” Journal of Guidance, Control, and Dynamics, vol. 29, no. 4, pp. 846–857, 2006. FRAVOLINI2004611 M. L. Fravolini, A. Ficola, G. Campa, M. R. Napolitano, and B. Seanor, “Modeling and control issues for autonomous aerial refueling for uavs using a probe^^e2^^80^^93drogue refueling system,” Aerospace Science and Technology, vol. 8, no. 7, pp. 611–618, 2004. [Online]. Available: <https://www.sciencedirect.com/science/article/pii/S1270963804000744> singularity M. Zhao, T. Anzai, K. Okada, K. Kawasaki, and M. Inaba, “Singularity-free aerial deformation by two-dimensional multilinked aerial robot with 1-dof p vectorable propeller,” IEEE Robotics and Automation Letters, vol. 6, pp. 1367–1374, 4 2021. Convex P. Bosscher, A. Riechel, and I. Ebert-Uphoff, “Wrench-feasible workspace generation for cable-driven robots,” IEEE Transactions on Robotics, vol. 22, no. 5, pp. 890–902, 2006. Isres N. Documentation, “Nlopt algorithms,” <https://nlopt.readthedocs.io/en/latest/NLopt_Algorithms/#isres-improved-stochastic-ranking-evolution-strategy>. Lee2010 T. Lee, M. Leok, and N. H. McClamroch, “Geometric tracking control of a quadrotor uav on se(3),” in 49th IEEE Conference on Decision and Control (CDC), 2010, pp. 5420–5425. LQI P. Young and J. Willems, “An approach to the linear multivariable servomechanism problem,” International Journal of Control, vol. 15, 06 1972.
http://arxiv.org/abs/2303.07080v1
20230313130533
Bag of Tricks with Quantized Convolutional Neural Networks for image classification
[ "Jie Hu", "Mengze Zeng", "Enhua Wu" ]
cs.CV
[ "cs.CV" ]
Evolution of many-body systems under ancilla quantum measurements Dmitry G. Polyakov March 30, 2023 ================================================================= Deep neural networks have been proven effective in a wide range of tasks. However, their high computational and memory costs make them impractical to deploy on resource-constrained devices. To address this issue, quantization schemes have been proposed to reduce the memory footprint and improve inference speed. While numerous quantization methods have been proposed, they lack systematic analysis for their effectiveness. To bridge this gap, we collect and improve existing quantization methods and propose a gold guideline for post-training quantization. We evaluate the effectiveness of our proposed method with two popular models, ResNet50 and MobileNetV2, on the ImageNet dataset. By following our guidelines, no accuracy degradation occurs even after directly quantizing the model to 8-bits without additional training. A quantization-aware training based on the guidelines can further improve the accuracy in lower-bits quantization. Moreover, we have integrated a multi-stage fine-tuning strategy that works harmoniously with existing pruning techniques to reduce cost even further. Remarkably, our results reveal that a quantized MobileNetV2 with 30% sparsity actually surpasses the performance of the equivalent full-precision model, underscoring the effectiveness and resilience of our proposed scheme. Model Quantization, Acceleration, Convolutional Neural Networks, Image Classification § INTRODUCTION Since the introduction of AlexNet <cit.>, there has been an exponential increase in the number of exceptional convolutional neural networks proposed, resulting in promising outcomes for a variety of visual tasks <cit.>. Despite the remarkable results, deploying CNN models on embedded or mobile devices proves challenging as it poses an immense burden on computation and memory storage. To address this issue, a significant amount of research has been dedicated to reducing associated costs, thereby making CNN models more practical for real-world applications. Broadly speaking, this line of research can be categorized into three distinct areas: efficient structure design, network pruning, and network quantization. Efficient structural design is a challenge in research, with introduction of the separated convolution <cit.> proposed as an effective technique. This method factorizes the standard convolution into a depthwise and pointwise convolution, reducing computation. Successful examples of its use in efficient networks include MobileNets <cit.> and ShuffleNets <cit.>. These networks are widely used on resource-constrained devices and have shown promise in practical applications. Besides that, various pruning strategies <cit.> have also been proposed to reduce both the computational and storage burdens. However, these methods often incur accuracy degradation, making them less attractive for practical applications. As such, the focus has shifted towards developing efficient structural design methods that can provide high accuracy without compromising on computational efficiency. Quantization is an incredibly efficient method for deploying models. Its effectiveness has been demonstrated in recent work <cit.> and has made it increasingly popular in the industry due to its hardware-friendly properties, which can significantly reduce computational and memory costs. However, despite its advantages, there exists a significant accuracy gap between a full-precision model and a quantized counterpart. This gap is especially pronounced in low-bitwidth quantization situations (e.g. 4-bits). Nevertheless, researchers are actively working on closing this gap and making quantization even more effective. This paper presents a systematic exploration of the effects of each quantization factor on convolutional neural networks, forming a gold guideline for post-training quantization. Additionally, our proposed multi-stage fine-tuning strategy enables quantization to work in conjunction with existing pruning strategies. Exhaustive experiments with ResNet-50 and MobileNetV2, quantized using different bitwidths on ImageNet, showcase the effectiveness of our proposed method. § QUANTIZATION SCHEME In this section, we have collected, reviewed and improved upon existing methods for obtaining accurate quantized neural networks. We then conducted experiments to examine the effectiveness of these methods using two representative models, ResNet50 <cit.> and MobileNetV2 <cit.>, on the ImageNet dataset <cit.>. The bitwidth of weights and activations is set to 8, unless stated otherwise in the experiments. The ImageNet classification task is widely recognized as a challenging benchmark for testing the effectiveness of quantization algorithms. This dataset consists of 1.28M training images and 50K validation images. During the full-precision training, we utilized the random-size cropping strategy <cit.>, which is then followed by random flipping and mean channel subtraction. Our mini-batch size is set to 256, and we use a momentum SGD optimizer. For ResNet50, the initial learning rate is set to 0.1, and we decay it by a factor of 10 at the 30th, 60th, and 90th epoch, respectively, for a total of 100 epochs. For MobileNetV2, the initial learning rate is also 0.1, and we decay it by a factor of 10 at the 90th, 180th and 270th epoch, for a total of 300 epochs. §.§ Post-training Quantization Determining the optimal quantization scale. One of the main challenges in conducting efficient quantization is determining the optimal quantization scale. Choosing a large scale for a given bitwidth allows for wider representation which can avoid data overflow, but also suffers from more distribution errors. Conversely, selecting a smaller scale can reduce the quantization error in most cases, but it may lead to data overflow due to a narrow data range, resulting in numerical calculation errors. To tackle this, NVIDIA's TensorRT <cit.> employs a post-training quantization approach that sweep quantization scales by minimizing the Kullback-Leibler (KL) divergence between featuremaps distribution before and after quantization. This approach has shown excellent results in quantizing popular CNN models such as ResNet and MobileNet without the need for additional fine-tuning. In the context of mathematical statistics, the KL-divergence is a measure of the difference between two probability distributions. Therefore, it can be used to determine the appropriate quantization scale by minimizing the KL-divergence between real values and their quantized counterparts. However, we have found through experimentation that directly using the scale corresponding to the minimal KL-divergence often results in inferior performance. Instead, we have discovered that the optimal scale that yields superior results is typically larger than the scale with the minimal KL-divergence. Herein, we propose the introduction of a tolerance coefficient T (T≥1) to improve the performance of quantization in CNNs. Rather than selecting the scale with minimal KL-divergence, we sweep a range of scale candidates and choose the maximum value whose corresponding KL-divergence is less than T times the minimal KL-divergence. Table <ref> presents the results of our method. For simplicity, we set a global tolerance parameter, T, for all layers in the network. A value of 1.0 for T corresponds to using the conventional KL-divergence algorithm for featuremap quantization, which selects the quantization scale with minimal KL-divergence and serves as a baseline for comparison. As T increases, we observe significant performance improvement for both ResNet50 and MobileNetV2. However, if T is set to a very high value, it degenerates into the naive symmetric MinMax quantization, which simply selects the maximum value of a tensor as the quantization threshold. We found that setting T to 1.3 yields a significant improvement over most models. Granularity of quantization. In general, using a single quantization scale for the entire tensor often yields satisfactory results. However, a recent study by Jacob et al. <cit.> has shown that leveraging separate scales for each kernel within the convolutional weights can yield excellent performance, without adding to the computational complexity when deploying the model on hardware. In the literature, weight quantization in convolutional layers is classified into two types: layer-wise and channel-wise quantization. While only layer-wise quantization is allowed for activations, channel-wise quantization can be applied to convolutional weights. Table <ref> presents a comparison of layer-wise and channel-wise quantization for 8-bits and 7-bits, respectively. The results show that channel-wise quantization consistently outperforms layer-wise quantization in all cases, which is to be expected as it offers greater flexibility with less distribution error. Additionally, the performance gap becomes more pronounced as the bitwidth decreases. For instance, in 8-bits quantization, MobileNetV2 achieves a top-1 accuracy of 71.45% with channel-wise quantization, which outperforms the layer-wise variant by 0.54%. However, the gap widens to 2.48% in 7-bits quantization. These results demonstrate the superiority of channel-wise quantization for weights in neural networks. Unsigned quantization: ReLU activation is commonly employed in modern architectures to combat the issue of gradient vanishing. In ReLU, negative activations are clipped to zero. When quantizing the featuremap after ReLU, unsigned quantization can be applied to improve the representation of positive values by discarding the negative ones. Essentially, this approach is equivalent to adding an additional bit to the quantization of positive values, which effectively doubles the range of representation. To assess the effectiveness of unsigned quantization, we compared its results with signed quantization. As shown in Table <ref>, we observed that the type of quantization had a significant impact on efficient networks. With the use of unsigned quantization, MobileNetV2 achieved a top-1 accuracy of 71.94%, which is equal to the accuracy of full-precision training. On the other hand, the variant with signed quantization only achieved a top-1 accuracy of 71.28%. Therefore, the inclusion of unsigned quantization for positive activations is crucial to achieve better accuracy at no extra cost. Quantization Placement Typically, quantization follows convolutional layers, with or without activation layers. In residual-like networks that have shortcut connections via element-wise summation, it is common to quantize both the output activations of the residual branch and the features after summation. However, we have observed that performing quantization at the end of the residual branch can significantly degrade performance. This is because the quantization scale of the two input features needs to be consistent in the addition case. We consider this a hard constraint that can cause significant accuracy degradation. Therefore, we prefer to keep floating-point arithmetic (e.g., half-precision) in element-wise summation and use it in all of our experiments. Accumulation in INT16. To avoid data overflow in the accumulation process of convolution, it is common practice to use the INT32 data type for storing intermediate accumulation results, even though weights and activations are quantized to 8-bits or fewer bitwidth. However, to further reduce the latency and memory footprint, we propose using the INT16 data type for accumulation when the summation of the bitwidth of weights and activations is 14 or less. In our settings, we quantize the weights of convolutions to 6 bits and the activations to 8 bits, which meets this requirement. Table <ref> presents the results. We find that the accuracy is almost retained when replaced with INT16 accumulation in quantized MobileNetV2, which validates the efficacy of using INT16 for accumulation. Guideline for Post-training quantization. In summary, to improve accuracy for post-training quantization, we propose the following guidelines: * Use an improved KL-divergence algorithm with a tolerance coefficient to determine the scales of activations, and apply MinMax quantization to determine the scales of weights. * Use channel-wise quantization for weights, which is superior to layer-wise quantization, especially for efficient convolutions. * Employ unsigned quantization on positive activations, such as the output of ReLU. * Eliminate quantization for the inputs of addition in a network whenever possible, as this can result in significant gains with only a slight increase in computation. The results of post-training quantization are shown in Table <ref>. For comparison, we used the commercial, closed-source inference library TensorRT and report the average results of 8 experiment runs that used different calibration data. By following the guidelines outlined above, we were able to achieve full-precision accuracy levels in both ResNet50 and MobileNetV2 when quantized to 8 bits. In fact, our approach outperformed TensorRT by a small margin. §.§ Quantization-Aware Training Batch Normalization folding. Batch Normalization (BN) <cit.> is a crucial module that enhances the stability of training and facilitates optimization of deeper neural networks with minimal weight initialization requirements. During training, a BN operation is supposed to be a linear operation that can be absorbed into the previous convolutional layer. To enable quantization-aware training, we need to implement BN folding to determine the optimal scale during forward pass. The gradients are then back-propagated in an unfolding manner, allowing us to separately update the previous convolutional weights as well as the scales and shifts of BN. The parameter folding strategy is formulated as below: Ŵ = γ * W√(δ^2+ϵ), B̂ = β - γ * μ√(δ^2+ϵ), S_Ŵ = γ * S_W√(δ^2+ϵ) Where W as the weights of the previous convolution layer, Ŵ and B̂ as the combined weights and biases. μ, σ^2, γ and β are the mean, variance, scale and shift value of BN, respectively. S_W and S_Ŵ are the quantization scale vector of convolutional weights before and after combination. It's worth noting that S_Ŵ only needs to be executed once after training. Quantization-Aware Training. While quantization of the weights and activations in a lower precision, such as 4-bits, the post-training quantization can not maintain the accuracy with a tolerance loss. In this situation, we fine-tune the quantized model to further improve the accuracy by enhancing the fitness and robustness of weights for quantization. We first quantize a well-trained full-precision model according to the post-training guideline. Then, we fine-tune it with a modified training procedure that adapts the model to quantization. We disable aggressive random-size cropping and use weaker random cropping augmentation. The models are fine-tuned for 20 epochs with a fixed quantization scale for weights, improving training convergence. The initial learning rate is 5e-4, decayed by 5 at the 10th epoch, achieving comparable performance. Table <ref> shows the comparison results on MobileNetV2. It is challenging to achieve quantization with lower precision, but our method achieves the best performance in 4-bits, 5-bits, and 6-bits quantization, surpassing other methods. Integration with pruning. We now explore the integration of quantization with network pruning strategies that aim to accelerate inference and reduce memory footprint as well. We utilize a simple non-structured pruning approach that zeroes out the “unimportant" weights with relatively small absolute values, as the design of the sparsity strategy is not our main focus. To incorporate pruning with quantization, we propose a pipeline that consists of the following steps: Sparsity → Full-precision Fine-tuning → Post-Training Quantization → Quantization-Aware Training. Specifically, we first apply the pruning strategy to a well-trained full-precision model M_1, which maintains its sparsity throughout the entire pipeline. Following the pruning step, we fine-tune the model with a small learning rate, which allows for minor adjustments to the remaining parameters and generates another sparse full-precision model M_2. The next step involves post-training quantization, followed by quantization-aware training, as outlined above. This results in two successive quantized models, namely M_3 and M_4. We conducted experiments on the efficient MobilNetV2, and the results are shown in Table <ref>. We first trained a full-precision model with a top-1 accuracy of 72.91%, then pruned the model with 0%, 10%, 20%, and 30% sparsity ratios. Interestingly, after the first fine-tuning, we observed that all pruned models outperformed the full-precision baseline, including the model with no pruning (Sparsity=0). This may be attributed to the weakening of data augmentation during fine-tuning, as in quantization-aware training. After quantization-aware training (i.e., the second fine-tuning), we obtained a quantized model with a top-1 accuracy of 73.35% without sparsity, the best performance for an 8-bits MobileNetV2 to date. Additionally, all quantized models with different prune ratios performed better than the full-precision counterpart. These results demonstrate that the quantization scheme can work well with network pruning strategies. § CONCLUSION In this work, we first systematically refine and improve the effective methods for post-training quantization and establish a gold guideline in practice. Following this guideline, the models in 8-bits quantization can reach the accuracy of full-precision counterparts without the need for additional training. Additionally, we propose a simple and efficient quantization-aware training strategy that improves accuracy even further in lower precision settings. Lastly, we demonstrate that quantization can work in conjunction with network pruning strategies and propose a multi-stage fine-tuning pipeline to chain them together. These contributions pave the way for more efficient and accurate deep neural network models in resource-constrained environments. IEEEbib § DETAILS FOR DETERMINING ACTIVATION QUANTIZATION SCALE Through our experimentation, we have found that the optimal scale for superior results is often greater than the scale corresponding to the minimum KL-divergence as depicted in Fig. <ref>. Based on this observation, we have enhanced the standard KL divergence algorithm proposed in  <cit.>, which was introduced earlier in Sec. <ref>. A detailed description of our improved algorithm is provided in Algo. <ref>. § ILLUSTRATION FOR QUANTIZATION PLACEMENT As mentioned before, we prefer to utilize floating-point arithmetic (such as half-precision) for element-wise summation. An example of a quantized bottleneck block in ResNet is illustrated in Fig. <ref>. § ELABORATION ON ACCUMULATION IN INT16 In later Sec. <ref>, we have briefly mentioned the accumulation process. Here, we aim to provide more details about this process. Figure <ref> illustrates the accumulation process of a quantized convolution, where A, W and O denote the floating-point input activations, weights and output activations of a convolution layer. A quantized convolution operation is performed wherein A and W are initially quantized using quantization scales S_A and S_W to INT8 and INT6 representations, respectively, denoted by A_int and W_int. Conventionally, INT32 is used to store the accumulation to avoid the possibility of data overflow. However, our experiments have revealed that the more memory-efficient INT16 data type suffices to perform this task. To recover the floating-point result, one can simply multiply the accumulation in INT16 with the product of the quantization scales of the activation and weights utilized for their respective quantization.
http://arxiv.org/abs/2303.06672v1
20230312142601
Superconductivity studied by solving ab initio low-energy effective Hamiltonians for carrier doped CaCuO$_2$, Bi$_2$Sr$_2$CuO$_6$, Bi$_2$Sr$_2$CaCu$_2$O$_8$, and HgBa$_2$CuO$_4$
[ "Michael Thobias Schmid", "Jean-Baptiste Morée", "Youhei Yamaji", "Masatoshi Imada" ]
cond-mat.supr-con
[ "cond-mat.supr-con", "cond-mat.str-el" ]
^1 Waseda Research Institute for Science and Engineering, Waseda University, 3-4-1, Okubo, Shinjuku, Tokyo 169-8555, Japan ^2 Center for Green Research on Energy and Environmental Materials, National Institute for Materials Science, Namiki, Tsukuba-shi, Ibaraki, 305-0044, Japan ^3 Toyota Physical and Chemical Research Institute, 41-1, Yokomichi, Nagakute, Aichi 480-1192, Japan ^4 Department of Engineering and Applied Sciences, Sophia University, 7-1 Kioi-cho, Chiyoda, Tokyo 102-8554, Japan Understanding the materials dependence together with the universal controlling parameter of superconductivity (SC) in copper oxide superconductors is one of the major challenges in condensed matter physics. Here, we numerically analyze SC by using ab initio low-energy effective Hamiltonians consisting of the antibonding combination of Cu 3d_x^2-y^2 and O 2p_σ orbitals without adjustable parameters. We have performed the state-of-the-art variational Monte Carlo calculations for the four carrier doped cuprates with diverse experimental optimal SC critical temperature T_c^ opt: CaCuO_2 (T_c^ opt∼ 110 K), Bi_2Sr_2CuO_6 (T_c^ opt∼ 10-40 K), Bi_2Sr_2CaCu_2O_8 (T_c^ opt∼ 85-100 K), and HgBa_2CuO_4 (T_c^ opt∼ 90 K). Materials and hole doping concentration (δ) dependencies of the SC order parameter F_ SC and the competition with spin/charge order show essential and quantitative agreements with the available experiments on the four materials in the following points: (1) In a wide range 0.05 ≤δ≤ 0.25, the ground state is commonly the SC state, which is severely competing with the charge/spin stripe and antiferromagnetic states. (2) F_ SC shows amplitude consistent with the superfluid density measured in the muon spin resonance (μSR) and its dome structure found in δ dependence shows consistency with that of the SC gap in the tunneling and photoemission measurements. Based on the confirmed materials dependence, we further find insights into the universal SC mechanism: (I) F_ SC increases with the ratio U/|t_1|, indicating that U/|t_1| is the principal component controlling the strength of the SC. Here, U and t_1 are the onsite Coulomb repulsion and the nearest neighbor hopping, respectively, in the ab initio Hamiltonians. (II) A universal scaling T_c^ opt∼ 0.16 | t_1 | F_ SC holds. (III) SC is enhanced and optimized if U is increased beyond the real available materials, and it is further enhanced when the offsite interaction is reduced. The present findings provide useful clues for the design of new SC materials with even higher T_c^ opt. Superconductivity studied by solving ab initio low-energy effective Hamiltonians for carrier doped CaCuO_2, Bi_2Sr_2CuO_6, Bi_2Sr_2CaCu_2O_8, and HgBa_2CuO_4 Michael Thobias Schmid^1 0000-0003-2724-0621, Jean-Baptiste Morée^1 0000-0002-0710-9880, Youhei Yamaji^2 0000-0002-4055-8792, and Masatoshi Imada^1,3,4 0000-0002-5511-2056 March 30, 2023 ==================================================================================================================================================================================== § INTRODUCTION The mechanism and origin of the large superconducting (SC) gap, high superfluid density, and high critical temperatures T_c observed in high-T_c superconductors, such as copper oxides, remain a central challenge in condensed matter physics. In these copper oxides, the d-wave SC state is severely competing with other orders, such as spin and charge stripes or antiferromagnetic states, and the observed T_c widely ranges from above 130 K to below 10 K. Understanding and reproducing these diverse phenomena without relying on adjustable parameters is hence desirable, especially when clarifying their origin. When ab initio calculations are able to reproduce systematic materials dependence quantitatively by solely relying on their crystal structures, it provides us with valuable insight into the universal mechanism behind and into the principal components for the enhancement of SC beyond existing materials. Many studies have suggested severe competitions of the SC with charge/spin stripe and antiferromagnetic states theoretically based on simplified Hubbard-like or t-J Hamiltonians as models of the cuprate superconductors <cit.>. A positive correlation between U and T_c or SC tendency was also pointed out by taking U as an adjustable parameter in the Hubbard type Hamiltonians <cit.>. However, ab initio studies without adjustable parameters are few and it is not clear whether the diversity of the materials dependence can be accounted for. There still exists a limited number of ab initio studies: The phase diagram including the SC phase was reproduced by solving the ab initio Hamiltonian for a particular case of Hg compound <cit.>. Ab initio Hamiltonians were derived by Nilsson et al. for several cuprate compounds, which reported an empirical observation without solving the Hamiltonians that the experimental optimal T_c is generally higher for larger U/|t| in their parameters <cit.>. The relation of the charge transfer energy to T_c was also pointed out <cit.>. Aside from the cuprates, there exist some ab initio studies on strong-coupling superconducting materials such as the iron-based superconductors <cit.>, fullerene <cit.>, and nickelates <cit.> to discuss the superconducting properties. However, to the authors' knowledge, there exist no systematic studies on the SC properties by solving solely ab initio Hamiltonians without adjustable parameters with the help of accurate many-body solvers to reveal the origin of the diverse materials dependence, especially for the challenging cuprates. Unless reproducing the materials dependent properties quantitatively, the universal mechanism would not be able to be identified either. In this paper we show properties of typical cuprate superconductors calculated by solving the ab initio Hamiltonians of four families of materials, namely carrier doped CaCuO_2, HgBa_2CuO_4 (abbreviated as Hg1201 hereafter), Bi_2Sr_2CuO_6 (Bi2201 hereafter), and Bi_2Sr_2CaCu_2O_8 (Bi2212 hereafter) <cit.>, by applying a state-of-the-art quantum many-body solver based on the variational Monte Carlo (VMC) algorithm <cit.>, including the combination with neural network <cit.> elaborated from earlier variational algorithms <cit.>. It is experimentally known that the optimum critical temperature T_c ^ opt is realized at around δ=0.1-0.15 <cit.> for doped CaCuO_2 (T_c^ opt∼ 110K) and Hg1201 (T_c^ opt∼ 90K), and at around δ=0.15-0.25 <cit.> for doped Bi2212 (T_c^ opt∼ 85-100K) and Bi2201 (T_c^ opt∼ 10-40K). We elucidate that similarity and diversity among the four families, especially the amplitude of the SC order parameters and T_c^ opt in the experiments are accounted for by using the present ab initio results, which provides us with insights into the materials dependence and the universal mechanism: The dominance of the SC for all the four families are successfully demonstrated. In addition, the δ dependence of F_ SC has a dome structure with the peak at δ∼ 0.05-0.1 consistently with the experimental indications. On the other hand, the dome peak of T_c appears at larger δ>0.1 in the experiment. This shift from the dome peak of F_ SC is understood from the decreasing renormalization factor with decreasing doping, which does not affect F_ SC but T_c. Although T_c^ opt has a variety among these four families, we show universally that (I) the higher SC order parameter F_ SC at the optimal doping basically results from a larger ratio U/|t_1|, where U is the onsite repulsive Coulomb interaction and t_1 is the nearest neighbor hopping in our ab initio parameters of single-band effective Hamiltonian for the antibonding orbital of strongly hybridized Cu 3d_x^2-y^2 and O 2p_σ orbitals. Furthermore, we show that (II) T_c^ opt is determined by the scaling T_c^ opt∼ 0.16 | t_1 | F_ SC. The δ dependence of the local energy suggests a universal superconducting mechanism: Though the bare interaction is strongly repulsive, the Mottness converts it to the strong effective attraction required for the Cooper pairing. Despite monotonic increase of F_ SC with U/|t_1| within the existing materials, we further show that (III) larger U/|t_1| beyond the ab initio values makes the peak of F_ SC followed by the reduction. We find that F_ SC can be roughly 30% enhanced than the ab initio case when U is 20% increased beyond the ab initio value by preserving the transfer and other offsite interaction parameters. We also show that F_ SC is further enhanced to as much as the double of the existing material by the additional reduction of the offsite Coulomb interaction. These searches beyond the ab initio parameters for the existing materials offer a guide for future experimental materials design. This paper is organized as follows. Sec. <ref> presents the methods and computational details: First, the effective Hamiltonians studied in this paper are summarized in Sec. <ref>. Then, we give the numerical methods in Sec. <ref> and define the physical quantities in Sec. <ref>. We present in Sec. <ref> the results for each of the four families of compounds. Based on the obtained ab initio results, in Sec. <ref>, we further explore the direction to enhance and optimize the SC order parameter by controlling the effective interaction parameters beyond the ab initio values, to gain insights into the future materials design. In Sec. <ref>, we discuss our analyses. Summary and conclusion are given in Sec. <ref>. § METHODS §.§ Ab initio effective Hamiltonian Within this paper, we solve the ab initio single-band effective Hamiltonians for CaCuO_2, Hg1201, Bi2201, and Bi2212 as derived in Ref. moree2022, where the transfer and interaction parameters are derived at values close to the experimental optimum hole concentration (at 10% doping for CaCuO_2 and Hg1201 and at 20% for the two Bi compounds). This choice is appropriate in this paper, because properties at optimum hole concentration are the central subject. The effective Hamiltonians have the form ℋ = ℋ_ kin + ℋ_U + ℋ_V with ℋ_ kin = ∑_i, j, σ t_ij c^†_iσ c^†_jσ, ℋ_U = ∑_i U n_i ↑ n_i ↓, ℋ_V = 1/2∑_i ≠ j V_ij n_i n_j. Here i,j are the unit cell indices of the maximally localized Wannier function <cit.> and c^†_iσ (c^†_iσ) is the corresponding creation (annihilation) operator of an electron of spin σ at the site i. The number operator is given by n_i = ∑_σ n_iσ and n_iσ=c^†_iσ c^†_iσ. Hopping amplitudes t_ij in the kinetic energy ℋ_ kin depends on the relative coordinate vector r_i - r_j by assuming the translational invariance of the crystal structure. The direct effective Coulomb interaction given by ℋ_U is scaled by the onsite interaction U, and intersite interaction ℋ_V is the sum over the combination of the site i and j, which is proportional to V_ij. Leading values for all of the four materials are listed in Table <ref>. For longer ranged part of t_ij and V_ij, see Sec. S1 in Supplemental Material (SM). Note that the Hamiltonian parameters for Hg1201 in Ref. moree2022, which we employ, are improved from Ref. hirayama2019. It results in slightly different physical quantities on the quantitative level in the present solution in comparison to Ref. ohgoe2020. We note that the effective Hamiltonian parameters in Eq. (<ref>) are restricted to a single CuO_2 layer. However, in the case of multilayer cuprates CaCuO_2 and Bi2212, the distance between CuO_2 layers is comparable to the cell parameter along x direction, so that interlayer coupling parameters (given in Table <ref> in Appendix for Bi2212) also exist in the effective Hamiltonian <cit.>, and its amplitude V_n^l ≲ 0.6 eV is comparable to that of the intralayer offsite interaction V_n ≲ 0.9 eV. This interlayer coupling is ignored in Eq. (<ref>), but potentially play a role in the SC properties. This role is actually examined in Sec. <ref> in the case of Bi2212, which ensures that the SC order parameter F_ SC^∞ (defined later in Sec. <ref>) and physical quantities are essentially not affected by the interlayer coupling within the present case of CaCuO_2 and Bi2212 as we discuss in Sec <ref>. Thus, we restrict to Eq. (<ref>) even in the case of CaCuO_2 and Bi2212. We employ this “single-layer approximation" for all the four materials throughout this paper unless otherwise noted. §.§ Numerical Methods We solve the Hamiltonian in Eq. (<ref>) by applying the many-variable variational Monte Carlo method (mVMC) <cit.> with a trial wavefunction of the form |ψ⟩ = 𝒫^G𝒫^J𝒫^dh|ϕ^pair⟩. Here we consider the Gutzwiller factor 𝒫^G = exp(- g ∑_i n_i↑ n_i ↓) <cit.>, the Jastrow correlation factor P^J = exp( ∑_i<jα_ij n_in_j) <cit.>, the doublon-holon correlation factor 𝒫^dh = exp[-∑_m=0^4∑_ℓ = 1,2α^(ℓ)_m∑_iξ^(ℓ)_i(m)] <cit.>, and a generalized pairing wavefunction of the form |ϕ⟩^pair = (∑_iσ, j σ^' f_iσ,j σ^' c^†_iσ c^†_jσ^')^N_e/2|0⟩. The variational parameters are g, α_ij, α^(ℓ)_m, and f_iσ,j σ^'. We also supplement the mVMC with the restricted Boltzmann machine (RBM) <cit.> and the first-order Lanczos step to improve the wavefunction and also to take the zero limit of the variance extrapolation to improve the estimate by following the variance extrapolation method <cit.> and by using the simple mVMC, mVMC +Lanczos, and mVMC+RBM results (see Appendices <ref>, <ref>, and Ref. ido2022 for the detailed procedure. Competing states with spin/charge order or strong fluctuations can be studied by imposing the mean-field order at the initial trial wavefunction <cit.>. The correlated metallic state without any symmetry breaking can also be studied by using the ground state wave function of the noninteracting system as an initial state. These initial states are then relaxed to lower the energy by optimizing the variational parameters. If the competing states exist, the optimization leads to multiple locally stable solutions. The true ground state is determined by comparing the total energy after taking the variance extrapolation descibed in Appendix <ref> and if possible after careful size extrapolation to see the thermodynamic limit. The computational details are the following. For all numerical solutions of finite-size lattices subsequently presented in this paper, we assumed the antiperiodic-periodic boundary condition on a N= L × L square lattice of length L, where N is the number of sites on the single-layer system by ignoring the interlayer coupling except for Bi2212. For Bi2212, we examine the two-layer system to examine the effect of interlayer coupling, because a unit cell of Bi2212 contains two layers and the interlayer coupling could play roles in the SC. Within a layer, hoppings and interactions were taken into account up to t_9 and V_9, i.e., up to the 2D distance R = (3,3) in the unit of the Cu-Cu distance, while contributions smaller than 0.001 eV were ignored. Unless explicitly mentioned this is applied throughout the whole paper. We concentrate solely on hole doped cases, where the hole doping is given via δ = 1 - N_e/N and N_e is the number of electrons in the system. §.§ Physical Quantities The physical quantities discussed in this paper are defined as follows: The total energy per site E/N = ⟨ℋ|/⟩N is calculated after the variance extrapolation as it is summarized in Appendix <ref>. To see whether the state has spin/charge order, we compute the spin structure factor S_s( q) = 1/N∑_i,j⟨ S_i · S_j |⟩e^i q ( r_i - r_j). and the charge structure factor S_c( q) = 1/N∑_i,j⟨ n_i n_j |⟩e^i q ( r_i - r_j), where S_i=(S_i^x,S_i^y,S_i^z)=∑_σ, σ' c_iσ^†σ_σσ' c_iσ' /2 is the spin-1/2 operator and σ_σσ' is the Pauli matrix (=(σ^x_σσ',σ^y_σσ',σ^z_σσ')). The long-range order is determined whether S_s( q)/N or S_c( q)/N remains after taking the limit N→∞. The SC long-range order is measured by the d-wave SC correlation function P_d( r) = 1/2N∑_ r_i⟨Δ^†_d( r_i) Δ^†_d( r_i + r) + h.c.|.⟩ Here Δ^†_d( r_i) describes the order parameter of the form Δ^†_ d( r_i) = 1/√(2)∑_ r f_d( r) (c_ r_i ↑ c_ r_i + r ↓ + c_ r_i ↓ c_ r_i + r ↑), where the d_x^2 -y^2-wave symmetry is included via the form factor f_d( r) = δ_r_y,0 ( δ_r_x,1 + δ_r_x,-1) - δ_r_x,0 ( δ_r_y,1 + δ_r_y,-1). Then, we deduce P_d( r) over the long range part, as P̅_d(L) = 1/M∑_√(2) L/4 < | r | P_d( r), where r = (r_x, r_y) includes all sites within the square ( -L/2, L/2]^2 and M is the number of lattice points satisfying √(2) L/4 < | r | < √(2) L/2. We define the SC order parameter in the thermodynamic limit, F_ SC^∞ by F_ SC^∞ = lim_L→∞ F_ SC(L) = √(P̅_d^∞), F_ SC(L) ≡ √(P̅_d(L)) P̅_d^∞ = lim_L→∞P̅_d(L). § AB INITIO RESULTS In this section we present our calculated ab initio results on the four families of compounds. We first analyze the results for doped CaCuO_2 in detail and then compare it with the result of doped Hg1201. Doped Bi2201 and Bi2212 suffer from the experimental uncertainty of the apical oxygen position due to the supermodulation of the crystal structure. Since it generates a variance of the Hamiltonian parameters if one assumes the translational symmetry of the Hamiltonian parameters, we show the properties by indicating this range. All of the four materials show dominance of the d-wave SC in the doping concentration dependence and the calculated results reproduce the experimental materials dependence of the strength of SC, which makes it possible to extract the universal properties and systematic trends as well. §.§ Doped CaCuO_2 Here, we present the results of our calculation for the doped CaCuO_2 in the following order: (1) δ dependence of SC properties; especially, P̅^∞_d and the d-wave SC order parameter F^∞_ SC. (See the definitions in Sec. <ref>.) (2) Competition between the SC state and other competing states including stripe states. §.§.§ Properties of superconducting phase First, we discuss the r dependence of the pairing correlation P_d(r) for L× L lattice and its long-ranged part P̅_d(L): Fig. <ref> shows P_d(r) and P̅_d(L) for several choices of square-lattices with the linear size L from 24 to 36 and hole doping δ from 0.028 (2.8 %) to 0.247 (24.7 %). For each value of δ, we observe that P̅_d does not significantly depend on L, suggesting the existence of a strong SC long-range order in the thermodynamic limit in this ground-state candidate. This is indeed confirmed by a size extrapolation, i.e., plot of P̅_d(L) as a function of 1/L to estimate P̅_d^∞ in the limit L →∞ via linear regression, as shown in the insets of Fig. <ref>, panels (a) to (h). The linear 1/L scaling was employed in Ref. ohgoe2020 and is expected to work because of Dirac-type linear dispersion for the quasiparticle excitation of the d-wave superconductor at the nodal points. After taking the size extrapolation to the thermodynamic limit, we show the δ dependence of the order parameter F_ SC^∞ calculated from Eq.(<ref>) and P̅_d^∞ = lim_L→∞P̅_d(L) in Fig. <ref> and the numerical values in Table <ref>. This shows a rapid increase of F_ SC^∞ from 0 at δ=0 up to δ∼ 0.05 as a function of δ followed by a plateau around 0.05≤δ≤ 0.1 and monotonic decrease with further increasing δ above around 0.1 in the thermodynamic limit. The dome structure ubiquitously observed for T_c in the cuprates is qualitatively similar to the δ dependence in F_ SC^∞, but the peak for F_ SC^∞ is located at somewhat lower δ∼ 0.05 than the case of experimental T_c, where the optimum δ is observed to be δ∼ 0.12 <cit.>. However, the monotonic decrease of F_ SC^∞ with increasing δ for δ≥ 0.1 is consistent with the universal trend of δ dependence of the SC gap identified from the angle-resolved photoemission spectra (ARPES) and the scanning tunnelling microscope (STM) of the cuprates in general <cit.>, though the SC gap in the experimental estimate contains an ambiguity associated with the contribution from the pseudogap. In the mean-field picture, the SC gap is the product of the order parameter F_ SC^∞ and the effective attractive interaction. If we consider the experimentally observed maximum gap ∼ 50 meV <cit.> and F_ SC^∞∼ 0.13, the characteristic scale of attractive interaction is as large as ∼ 0.4 eV. This imposes a constraint on theories for the SC mechanism. The sharp increase of F_ SC^∞ between δ=0 and 0.05 and the subsequent dome structure are similar to the earlier study by a VMC and a cluster dynamical mean field study <cit.> for the Hubbard model, where rapidly increasing F_ SC from 0 at δ=0 already reaches F_ SC∼ 0.1 at δ=0.03 in the present notation. In case of the Hubbard model, however, it was argued that the ground state is actually not SC but stripe-ordered states <cit.>. §.§.§ Competition of SC, stripe, and antiferromagnetic states Now, we analyze the competition between the SC and other states. The energies of the SC state and other states at L=24 are given in Fig. <ref>. We see that the SC state has the lowest energy in the region from δ=0.05 to δ=0.25, indicating that the SC phase is dominant in the ground state of doped CaCuO_2. The SC ground state, however, is severely competing with the C4S8, and C3S3-like stripe states, and AF-type state within the energy difference of 5-10 meV. Here, CmSn denotes the charge/spin ordered stripe state with the periodicity of m lattice spacing for the charge modulation and the period n for the spin order. Real space charge/spin configurations and spin/charge structure factors are explicitly illustrated in Sec. S2 of SM for the AF-like, C3S3-like and C4S8 states. Figures <ref> and <ref> in Appendix <ref> show size dependence of spin and charge structure factors. Although the demanding computation cost does not allow larger system calculation, the available size dependence supports that the AF states up to δ=0.16 and the C4S8 stripe state at finite doping around δ∼ 0.12 do have the long-range order as one can see in Figs. <ref> (a) and <ref>, respectively. However, although the initial trial states are ordered mean-field states, long-ranged order seems absent or is very weak after the optimization in VMC for the C3S3 stripe states and seems replaced by well developed short-ranged correlations at δ 0. This is the reason why we add “-like" for the case of C3S3. The AF and stripe states are in any case excited states of the SC ground states at δ≥ 0.05. §.§ Doped Hg1201 Compared with CaCuO_2 Now, we present our results in the case of Hg1201, and compare it to CaCuO_2. In this comparison, we find (i) the positive correlation between F_ SC^∞ and U/|t_1|, (ii) the relation T_c ^ opt∼ 0.16 |t_1|F_ SC^∞ from the comparison with the experimental T_c. Pairing correlation for Hg1201 Hamiltonian and the size extrapolation are shown in Fig. <ref> for δ=0.146, indicating the existence of the SC long-range order. The size of the order parameter is F_ SC^∞∼ 0.09 as compared with ∼ 0.116 for doped CaCuO_2 at δ∼ 0.12, respectively, which are both close to each optimal concentration. The difference in F_ SC^∞ between Ca and Hg compounds can be compared with the difference in U/|t_1|=8.10 for CaCuO_2 and 7.35 for Hg1201. As we discuss later, F_ SC^∞ rapidly increases with U/|t_1| if we monitor the effect of U/|t_1| beyond the ab initio value around U/|t_1|=7-8. Therefore, F_ SC^∞ amplifies the increase in U/|t_1| while effects of other parameters are minor: Namely, F_ SC^∞ should have a functional form F_ SC^∞(U/t_1,V_i/t_1,t_i/t_1) with 1≤ i ≤ 9 in general, but V_i/t_1 and t_i/t_1 dependencies are weak. The difference of F_ SC^∞ in these two compounds is then ascribed to the difference in U/|t_1|. The materials dependent F_ SC^∞ may also be compared with the difference in T_c ^ opt∼ 110K and 90 K for CaCuO_2 and Hg1201, respectively, because T_c may be proportional to the order parameter F_ SC^∞. Since T_c has the dimension of energy and should also be scaled by the overall characteristic energy scale t_1, T_c may be proportional to |t_1|F_ SC^∞. In fact, the ratio of T_c ^ opt/|t_1|F_ SC^∞ as a non-dimensional quantity is ∼ 0.16(1) at the optimal doping δ∼ 0.12 for CaCuO_2 and ∼ 0.16(2) at the optimal point δ∼0.15 for Hg1201 as we show in Table <ref>, supporting the hypothesis that T_c ^ opt is universally given from the relation T_c ^ opt∼ 0.16 |t_1|F_ SC^∞ at the optimal doping. In the Uemura plot <cit.>, it was observed from the μSR measurement that T_c ^ opt is proportional to the ratio between the superfluid density n_s, here interpreted as F_ SC^∞/√(2), and the effective mass m^*. Since the mass enhancement from the bare band mass m_0, namely m^*/m_0 at the optimal hole density may be similar in the cuprates, T_c ^ opt is indeed expected to be roughly proportional to |t_1|F_ SC^∞ according to the Uemura plot, because the inverse band mass is essentially determined by the dominant transfer t_1. In addition, n_s estimated from the relaxation rate σ∼ 2 μ s^-1 from the μSR measurement for the cuprates with T_c∼ 80-100 K corresponds to n_sm_0/m^* ∼ 4× 10^21 cm^-3. If we cut out the volume including one Cu atom with the c axis length ∼ 6 Å as in <cit.> irrespective of the unit cell volume to compare with F_ SC^∞ defined as the value per Cu atom, this corresponds to F_ SC^∞∼ 0.10 by considering the definition F_ SC^∞=√(2)n_s and m^*/m_0∼ 5 assumed in Ref. Uemura1989. Then it is also quantitatively consistent with the present result of F_ SC^∞∼ 0.10 at the optimum doping. These indicate that our results indeed capture the realistic situation more or less quantitatively. We will show in Sec. <ref> that F_ SC^∞ also agrees with the estimate from the angle resolved photoemission spectra (ARPES) in case of Bi2212 and Bi2201. §.§ Doped Bi2201 and Bi2212 In this subsection, we discuss ab initio results for Bi2212 and Bi2201 and compare them each other. Unfortunately, in these two compounds, an uncertainty exists in the experimental crystal parameters that causes the uncertainty in the effective Hamiltonian parameters as well. Especially, the distance d^z_ Oap between an apical oxygen and the nearest Cu atom is not fully precisely determined and the available experimental data have considerable variations <cit.>. This uncertainty is also related to the structural distortion and long-period modulation of the CuO_2 plane arising from the effect from the BiO layer <cit.> as we discuss in Sec. <ref>. Recent ab initio studies have clarified that this uncertainty leads to possible variety of effective Hamiltonian parameters, especially owing to the variation of the apical oxygen position <cit.>. In principle, the structural optimization in ab initio calculations is desired to predict the stable atomic position. However, such an optimization in strongly correlated electron systems is at the moment not necessarily accurate enough and we leave this task for future studies. Instead, in this paper, we admit a range of Hamiltonian parameters and discuss the consequence. As analyzed in Ref. moree2022, the apical oxygen position sensitively affects the effective Hamiltonian parameters, primarily the value of U. For Bi2212, the value U∼ 4.2 eV in Table <ref> is intermediate and the uncertainty range is between 4.0 and 4.7 eV for U by considering that d^z_ Oap may range from 2.25 Å to 2.45 Å. On the other hand, the value U∼ 4.4 eV for Bi2201 in Table <ref> is the upper bound and the uncertainty ranges from U∼ 4.4 eV to 3.5 eV by considering that d^z_ Oap may range from d^z_ Oap= 2.6 Å to 2.45 Å. We first present in Secs. <ref> and <ref> the results obtained from the parameters shown in Table <ref>, namely U=4.2 eV for Bi2212 and U=4.4 eV for Bi2201 and then discuss in Sec. <ref> the possible range of SC properties originating from this uncertainty later. §.§.§ Bi2212 We begin with the results for Bi2212. Fig. <ref> shows P_d(r) and P̅_d(L) at δ = 0.167 for L from 16 to 36 by switching off the interlayer transfers and interactions. Namely we first show the results obtained by solving the single-layer Hamiltonian despite the actual two-layer unit cell of Bi2212. Similarly to CaCuO_2, we identify a SC ground state with large P̅_d and it does not change significantly by increasing L, where the size extrapolation gives P̅_d^∞∼ 0.0151 as shown in the inset of Fig. <ref>, which corresponds to a SC order parameter F_SC^∞∼ 0.12. This relatively strong value of F_SC^∞ is understandable, because the U/|t_1| ratio has a value of U/|t_1| ∼ 9.4, which is the strongest among all four considered compounds. Again the enhanced F_SC^∞ originates from the larger U/|t_1| in accordance with the observation in the comparison of Hg1201 and CaCuO_2 in Sec. <ref>. This large F_SC^∞ is also consistent with the high T_c (up to ∼ 100 K) <cit.>. We will discuss more involved aspect in Sec. <ref>. The competition with other phases are seen in δ dependence of the total energy shown in Fig.<ref> in Appendix <ref>. Similarly to CaCuO_2, the SC state is the ground state in most of the doping concentration, while it is severely competing with spin/charge ordered states. Now, we extend the calculation by switching on the interlayer terms and solve the two-layer Hamiltonian obtained in Ref. moree2022 to examine the effects of interlayer coupling. For the calculations we take two identical layers (in terms of intralayer parameters for t_ij, V_i, and U where i and j are intralayer combination), coupled by the interlayer terms listed in Table <ref>. The interlayer contributions are restricted to the leading interlayer hopping term of size t_0^l= -0.098 eV and nearest- and next nearest neighbor interlayer interaction of size V_0^l = 0.643 eV and V_1^l = 0.463 eV. See Ref. <cit.> for more details. A comparison between the single- and two-layer cases of P_d(r) for L = 16 and δ = 0.167 is shown in Fig. <ref>. We see that the long-range average of P_d( r) in the two-layer case is close to that of P_d( r) in the single layer case, which demonstrates that P_d( r) is not significantly affected by the interlayer Coulomb interaction and hopping parameters. Indeed, for the single layer we found a long range average of the SC correlation function of P̅_d^single = 0.0225, while for the two-layer compound the average is P̅_d^two = 0.0213. The corresponding values of the SC order parameter are F_SC^single,∞=0.150 and F_SC^two,∞=0.146, which differ by only ∼ 2.8%. The essentially same behavior between the single- and two-layer cases may not depend on the system size in accordance with the result of a two-layer Hubbard model at the optimum doping <cit.>. This similarity may be attributed to (i) the relatively small leading interlayer hopping parameter of t_0^l = -0.098 eV and also (ii) the robustness of the SC solution against the interlayer Coulomb interaction parameter, because the pairing occurs essentially only within a layer. §.§.§ Bi2201 In the case of Bi2201, we again solve the single-layer Hamiltonian. The competition with other phases are seen in δ dependence of the total energy shown in Fig.<ref> in Appendix <ref>. Fig. <ref> shows P_d(r) and its extrapolation to the thermodynamic limit, which suggests the stable long-ranged SC order. Again, the obtained value F_ SC^∞∼ 0.10 is consistent with the rule that larger U/|t_1| leads to larger F_ SC^∞ because U/|t_1| is the second largest among the four materials in the estimate shown in Table <ref>. The smaller U/|t_1| relative to Bi2212 leads to weaker SC. However, on a more quantitative aspect, we need to be careful about the uncertainty of the Hamiltonian parameter. We will discuss this issue below. §.§.§ Effect of structural uncertainty on possible variation of SC properties Since we have the uncertainty of the Hamiltonian parameters particularly for the interaction as we discussed above, we here monitor the effects of modifying the effective interactions for Bi2212 and Bi2201, which well represent the effect of variant apical oxygen position as shown in Appendix C of Ref. <cit.>. Namely, Table <ref> with preserved transfer parameters fixed at each ab initio value, together with interaction scaling represents most of the effect of the apical oxygen shift and we scale the Hamiltonian (<ref>) such that ℋ(α,ξ) = H_kin + α H_U + ξ H_V, where α=ξ=1 represents the ab initio case given in Table <ref>, α scales the onsite Coulomb interaction term H_U, and ξ scales the remaining offsite interactions V_i. Since the apical oxygen shift alters the interaction parameters in the way α∼ξ <cit.>, we examine the dependence on α=ξ below. Figures <ref> (a) and (b) show the size scaling and α=ξ dependence of P_d^∞ for Bi2212 and Bi2201 at δ=0.167, which is close to the experimental optimum doping. Further details are given in Sec.IV of SM. Figure <ref> (c) shows the corresponding α=ξ dependence of the SC order parameter F_ SC^∞. For Bi2212, by taking the realistic uncertainty range 4.0 eV ≤ U ≤ 4.7 eV (corresponding to 0.95≤α = ξ≤ 1.1) obtained from 2.25 Å ≤ d_ Op^z ≤ 2.45 Å, we find the range of 0.011 ≲ P_d^∞≲ 0.015, namely 0.10 ≲ F_ SC^∞≲ 0.12. On the other hand, the uncertainty for Bi2201 obtained from 2.45 Å ≤ d_ Op^z ≤ 2.6 Å leads to 3.5 eV ≤ U ≤ 4.4 eV (corresponding to 0.8≤α = ξ≤ 1.0), which results in 0.00017 ≲ P_d^∞≲ 0.0094 (0.013 ≲ F_ SC^∞≲ 0.10). The lower bound for Bi2201 causes a fatal damage to the SC order. Table <ref> summarizes the size-extrapolated P̅_d^∞ and corresponding F_SC^∞ for the two Bi compounds when we use the Hamiltonian parameters listed in Table <ref> and when admit uncertainty range of the interaction parameters for Bi2212 and Bi2201. The scaling Eq.(<ref>) proposed for CaCuO_2 and Hg1201 are also valid in the Bi compounds and the experimental T_c^ opt is within the inferred range. We conclude that its materials dependence is well captured for the four studied materials (see also Fig. <ref> in Sec. <ref>). We realize that the fragility and diversity of T_c ^ opt experimentally observed in the range 10<T_c ^ opt<40 K for Bi2201 is accounted for by the range of actual apical oxygen position. This range may be caused by the type of dopant atoms, impurities, and the spatial inhomogeneity caused by the supermodulation, which may depend on samples and the amplitude of the modulation. In fact, it was observed that the d_ Op^z periodically varies as much as 6% in accordance with the supermodulation for Bi2212 and a comparable modulation may exist for Bi2201 as well, which can be the origin of the experimental uncertainty <cit.>. The basic origin of this diversity and relatively low T_c among the four families of compounds is attributed to relatively small U/|t_1| in the lower uncertainty range, at which the SC order becomes sensitively damaged by a slight decrease of U/|t_1|. We discuss more general aspects of the interaction dependence in Sec. <ref>. Even when we admit the uncertainty range, the general trend about the weaker SC of Bi2201 than those of Bi2212 are well explained by this ab initio results. It can also safely be addressed that Bi2212 has one of the strongest SC and T_c ^ opt among the four families comparably to CaCuO_2. § RESULTS BEYOND AB INITIO: INTERACTION DEPENDENCE OF SUPERCONDUCTING ORDER We now study SC properties beyond the ab initio results. Ab initio results in the last section successfully reproduce the experimental trend and have revealed that U/|t_1| is the principally important Hamiltonian parameter to control the SC order parameter. Therefore, it is intriguing to examine the optimum Hamiltonian parameters to maximize the order parameter and hence the optimum T_c beyond the existing materials for the purpose of materials design to seek for higher T_c superconductors. We present U/| t_1| dependence of F_ SC as well as dependence on offsite interaction when tuning the interaction parameters artificially away from the ab initio value while keeping transfer parameters fixed at ab initio values. We here take an example of CaCuO_2 Hamiltonian at δ=0.167 and monitor the effect of α and ξ dependencies defined in Eq. (<ref>). We examine three types of scaling to go beyond the ab initio Hamiltonian: (i) Scale only the onsite Coulomb interaction by α with fixed ξ = 1.0 (ℋ(α, 1.0)), (ii) Scale the full interaction part equally by using α = ξ (namely, ℋ(α, α)), and (iii) Fix α = 1.2 and scale the intersite Coulomb interaction uniformly via ξ by employing ℋ(1.2, ξ), by considering the fact that (ii) shows the maximum SC order at α=ξ=1.2. For the cases (i) and (ii) we chose scaling values α ranging from 0.6 up to 4.0 while for the third case the range from 0.0 to 2.0 is chosen. Since the size dependence is not appreciable, we study L=24 lattice. The SC order parameter F_ SC are shown in Fig. <ref> (a) at δ = 0.167 hole doping. The results show that the SC order parameter can be enhanced with the amount of around 30% from the ab initio value when the interaction parameter is tuned to α∼ 1.2 for (i) and around 20% at α=ξ∼ 1.2 for (ii), which may allow T_c ^ opt as much as ∼ 130–140 K, when compared to the ab initio results for CaCuO_2. In the tuning (iii), we find that the order parameter further increases up to F_ SC^∞∼ 0.22 by decreasing ξ, which is twice as large as the ab initio case. However, we keep in mind that onsite and offsite interactions cannot independently be controlled in the usual experimental conditions. The present result offers a guide to enhance the SC in designing artificial structure and metamaterials including surface and interface, where quicker screening of the offsite interaction is desirable by keeping the onsite interaction at the optimal value (in this case α=1.2). Another limitation to be considered is the competition with the stripe and AF order. As far as we restrict the onsite interaction within the ab initio range, the SC energy is always lower than that of the stripe state as one sees in Fig. <ref> (b). Here, we show the competition with the C4S8 because it is established that the most severe competitor is the C4S8 state. However, the decreasing of energy difference, such as at (α=1.2, ξ=0), where the difference is ≤ 2 meV, may result in the thermal destruction of the SC order. For ξ≥ 0.2 the SC is still a stable ground state, while at small ξ, F_ SC becomes nearly the twice of the ab initio value for the doped CaCuO_2. The order parameter decreases when U/|t_1| is too large as we see in Fig. <ref> (a). This reduction was already pointed out on the level of the Hubbard model <cit.>. Although the asymptotic behavior in the limit U/|t_1|→∞ is not clear, the reduction itself may be easily understood from the suppression of charge fluctuation with increasing U/|t_1|, which also suppresses the quantum entanglement caused by the suppression of both spin singlet fluctuation and dynamical exciton generation as was reported in the literature <cit.>. It was pointed out that the enhanced quantum entanglement can be achieved by the fractionalization of electrons <cit.>, which may be maximaized at the optimum U/|t_1|. § DISCUSSION By assuming the same ratio T_c /(|t_1| F_ SC^∞) ∼ 0.16 with CaCuO_2 and Hg1201, we can infer the range of T_c arising from the uncertainty of the apical oxygen position and resultant uncertainty of U/|t_1| listed in Table <ref>. The range of inferred T_c listed in Table <ref> for Bi2212 is consistent with the experimentally observed range of T_c ^ opt each other within the error bars. This suggests that the sample dependence of T_c ^ opt may be accounted for by the sample dependence of the apical oxygen position. We note that the order parameter F_ SC^∞∼ 0.10 obtained here for Bi2212 and Bi2201 also shows consistency with the result obtained by using the machine learning of the angle-resolved photoemission spectroscopy data for Bi2212 and Bi2201, respectively, at the optimum doping <cit.>, which gave ⟨ c_k↑c_-k↓⟩∼ 0.065 at the antinodal point for Bi2212 and the momentum averaged value ∼ 0.063 for Bi2201 at the optimum doping. These are translated commonly to F_ SC^∞∼ 0.09 in the present definition of F_ SC^∞ because of the relation F_ SC^∞=√(2)⟨ c_k↑c_-k↓⟩. In the case of Bi2201, the estimated 0.16 |t_1| F_ SC^∞ is also listed in Table <ref>. The comparison with the sample dependence of experimental T_c suggests that the true apical oxygen position is distributed near the lower bound d^z_ Op∼ 2.45Å, if it is spatially uniform. Alternatively if the supermodulation exists, the lower bound of d^z_ Op in the modulation may be close to 2.45 Å, because it governs the SC order as the bottleneck. It is desired to test this inference by precise and simultaneous measurements of the relation between T_c and d_ Oap^z for Bi2212 and Bi2201. The order parameter F_ SC^∞ increases with decreasing hole doping for δ>0.05 as we find in Fig. <ref>, which follows the same trend as the SC gap as we discussed, but is slightly different from the dome structure known for T_c in the cuprates, where the peak of the dome is located at higher δ. Complete and quantitative understanding of this different trend is not the scope of this paper and is left for future studies. However, the origin of this difference can be inferred to be attributed to the increasing damping and incoherence of electrons in the underdoped region toward the metal-insulator transition as was analyzed before <cit.>, which is represented as the enhanced self-energy of the normal electrons toward the Mott insulator. In Appendix <ref>, we show a qualitative difference of the momentum distribution between the optimal and underdoped hole concentrations, which suggests a signature of the increased damping at lower carrier concentration within the present ab initio study. The δ dependence of the energy decomposed to the kinetic, onsite and offsite interaction energies are analyzed in Appendix <ref>. It should be noted that the onsite interaction energy E_U=⟨ℋ_U ⟩ has a convex curvature as a function of δ, which contributes to the effective attraction of electrons despite the original strong repulsion U. The local effective attraction may cause the Cooper pairing as well as the stripe formation. It was pointed out that the convex curve of the local energy generates bistable excitations, one in the underdoped side and the other in the overdoped side, inducing the electron fractionalization and the enhanced quantum entanglement through the quantum tunnelng of the two excitations <cit.>. The importance of the apical oxygen position has been pointed out from various viewpoints <cit.>. In this paper, we have elucidated the crucial role of controlling U in general in the single-band description, which quantitatively explain the variation of T_c^ opt and its uncertainty in the Bi compounds. In addition, the modulation of the SC gap with the modulation of the apical oxygen position in Bi2212 has indicated that the longer d_ Oap^z induces the smaller SC gap <cit.>. This is consistent with the trend of F_ SC^∞, which decreases when α is increased in the realistic range as shown in Fig. <ref>. This indicates that Bi2212 is located already slightly above the peak in the α dependence of F_ SC^∞, which corresponds to α=1.2 for doped CaCuO_2 shown in Fig. <ref>. The present observation is also in accordance with the effect observed by laser irradiation aiming at the displacement of the apical oxygen position <cit.>. The control of d_ Oap^z if possible in a spatially uniform fashion may help to optimize the SC in which the disturbance and pair breaking by the randomness caused by the inhomogeneous supermodulation in the case of the Bi compounds could be avoided. § SUMMARY AND CONCLUSIONS We have studied the superconductivity in the ab initio Hamiltonians for CaCuO_2, Hg1201, Bi2201, and Bi2212 derived by using the experimental crystal structure in Ref. moree2022 without adjustable parameters . The dominance of SC order against severely competing stripe states and antiferromagnetic state in a wide range of hole concentration are shown in the solutions for the ground state of all four materials obtained from the variational Monte Carlo calculations, which agrees with the experimental results. The SC order parameter F_ SC^∞ at the optimal doping shows consistency with the superfluid density measured in the muon spin resonance and the machine learning analysis of the ARPES data for Bi2212 and Bi2201. F_ SC^∞ decreases with increasing doping for the doping concentration δ>0.05, showing a similarity to the SC gap reported in the STM and ARPES measurements. On the other hand, F_ SC^∞ quickly decreases to zero toward δ=0 for δ<0.05 forming a dome structure which has a similarity to experimental T_c, but the dome peak appears at slightly lower δ for the calculated F_ SC^∞. This may be attributed to the reduced renormalization factor suggested by the broadened momentum distribution. From the comparison of the four materials, we have revealed that U/|t_1| is a crucial parameter to control the strength of the SC order; larger U/|t_1| materials show larger SC order parameter F_SC^∞ in the realistic materials. This explains that T_c and the SC gap at the optimum doping is larger for CaCuO_2 than Hg1201, where T_c ^ opt is well scaled by | t_1 | F_ SC^∞ as T_c ^ opt∼ 0.16 | t_1 | F_SC^∞. Though the experimental uncertainty in the crystal structure prohibits a quantitative comparison, F_ SC^∞ is also larger for Bi2212 than Bi2201 at least qualitatively, in agreement with the experimental indications. When we apply the same scaling T_c^ opt∼ 0.16 | t_1 | F_ SC^∞ to the two Bi compounds with the calculated order parameter, it also well explains the experimental sample dependence of T_c. The strong dependence of F_ SC^∞ on U/|t_1| for real materials are summarized in Fig. <ref>: In the range of 7.0≤ U/|t_1|≤ 8.0, F_ SC^∞ sharply increases and the calculated sensitive materials dependence of F_ SC^∞ is well captured within this range. The good scaling of T_c^ opt by 0.16 |t_1| F_SC^∞ is also summarized in Fig. <ref>, which indicates that the detailed difference of U/|t_1| within the range of 7<U/|t_1|<9 in the ab initio parameters reproduces the diverse materials dependence of T_c^ opt. Since the larger variance for the theoretical prediction on Bi2201 is ascribed to the experimental uncertainty of the apical oxygen, it is desired to precisely determine the apical oxygen position in the experiments. Based on the successful reproduction of the materials dependent properties, the underlying superconducting mechanism is identified by the effective local attraction emerging from the Mottness, which converts the original strong repulsion to the attraction. The SC order parameter has the maximum above the ab initio values of U/|t_1| at 20% larger value of U/|t_1| with the enhancement of 20-30 %. If one can control onsite and offsite interaction independently, further optimization of the SC order parameter as much as the factor two larger value beyond the available compounds synthesized so far without falling into other competing states can be achieved as the theoretical maximum value in the present mechanism. By increasing |t_1| as well as the whole parameter values uniformly, T_c^ opt should obviously increase accordingly. These offer a clue for the materials design in the future. § ACKNOWLEDGEMENTS This work was supported by MEXT as “Program for Promoting Researches on the Supercomputer Fugaku" (Basic Science for Emergence and Functionality in Quantum Matter–Innovative Strongly-Correlated Electron Science by Integration of “Fugaku" and Frontier Experiments–, JPMXP1020200104) and used computational resources of supercomputer Fugaku provided by the RIKEN Center for Computational Science (Project ID: hp200132, hp210163, and hp220166). Part of the computation was done using the facilities of the Supercomputer Center, the Institute for Solid State Physics, the University of Tokyo. We also acknowledge the financial support of JSPS Kakenhi Grant No. 16H06345 and No. 22H0115500. § LANCZOS METHOD AND RESTRICTED BOLTZMANN MACHINE PROCEDURE §.§ Lanczos method To further improve the accuracy of the VMC calculations or the variance extrapolation of the competing ground state candidates, we apply the Lanczos method <cit.>. To do so the optimized mVMC wavefunction |Ψ⟩ is extended by |ψ_n⟩ = ( 1 + ∑_n = 1^M α_n ℋ^n ) |Ψ⟩. The factor in front of |Ψ⟩ can be regarded as an additional projection operator with variational parameters α_n, which–when chosen appropriately–further reduce the energy. Although one could systematically improve the wavefunction by increasing M, the computational cost increases exponentially with M, too. Hence we employ the Lanczos method only up to the first step (n=1) within this work. §.§ Restricted Boltzmann machine procedure To further improve the mVMC wavefunction we apply a restricted Boltzmann machine as a variational wavefunction |Ψ⟩, as firstly suggested in Ref. carleo2017. Here we follow the notations given in Refs. <cit.>. The variational wavefunction including RBM takes the following form |Φ⟩ = 𝒫^G𝒫^J𝒫^dh𝒩|ϕ^pair⟩, where 𝒩 is the additional RBM correlator. The RBM correlator 𝒩 = ∏_k 2 cosh( b_k + ∑_i W_ikσ_i) ×e^∑_i a_i σ_i introduces the additional variational parameters h_i (hidden layer), a_i (visible layer), and W_ik (network). In practice we apply the additional RBM projection after the wavefunction was already optimized via mVMC, i.e., the variational parameters of the optimized wavefuction |ϕ⟩ = 𝒫^G𝒫^J𝒫^dh|ϕ^pair⟩ are kept fix during the RBM procedure. The accuracy of the wavefunction depends on the number of hidden and visible parameters (N_h, N_v) <cit.>. Hence we can define a hidden variable density as α_ RBM = N_h/N_v as measure for the accuracy. Note that the number of RBM variational parameters increases with α, too. Within this work the RBM procedure was applied with α_ RBM = 4. § VARIANCE EXTRAPOLATION PROCEDURE The total energy per site E/N=⟨ℋ|/⟩N is calculated after the variance extrapolation. The true ground state as a function of the variance (δ E)^2 = (⟨ℋ^2|-⟩⟨ℋ|^⟩2)/⟨ℋ|^⟩2, is obtained by taking the limit δ E→ 0, because the true eigenstate satisfies δ E=0 <cit.>. If several different states such as SC, spin- and charge-ordered as well as normal metallic states are competing, the ground state is determined from the lowest energy state after the variance extrapolation. In practice, the variance extrapolation is a linear regression of the energies per site E/N (e.g. obtained from combinations of mVMC, Lanczos, or RBM) over the variance δ E for a specific state, to approximate the zero variance value of the energy. As an example the variance extrapolation for δ = 0.167 in CaCuO_2 is shown in Fig. <ref>. From the inset we confirm the lowest energy of the SC state with severely competing AF and stripe states very close to it (the difference is around 5 meV). However, the overlap of the error bars is small and in comparison to AF, C4S8 and C3S3 states, the SC state definitely has lower energy. § THERMODYNAMIC LIMIT OF THE TRIAL WAVEFUNCTION AFTER OPTIMIZATION FOR CACUO_2 Here we discuss the stability of the AF, C3S3, and C4S8 state in the thermodynamic limit for CaCuO_2. To do so, each state is stabilized on different lattice sizes and the spin- and charge structure factors (S_s( q) and S_c( q)) are calculated. We plot S_s( q) as a function of 1/L or 1/L^2 depending on the cases of the presence or absence, respectively, of the AF order by following the convention and perform a linear extrapolation. The result is shown in Fig. <ref>, where in (a) the peak height of the spin structure factor follows a linear trend with a nonzero offset, indicating a stable long-ranged AF order. In panel (b), the peak of the spin structure is scaled to zero in the thermodynamic limit, which indicates the absence of the long-ranged AF order in the SC state at this doping. We did not find the coexistence of the SC and AF order at other doping, either. The size scaling of the charge-stripe states is shown in Fig. <ref>. Although the plot of the size dependence is not sufficient due to very demanding computational cost for larger sizes, the trend suggests that only the C4S8 state shows a clear long-ranged order of spin and charge at around δ=0.125 in the thermodynamic limit. The C3S3 state seems to collapse to a paramagnetic state at the chosen doping of δ = 0.207, at which C3S3 has relative stability. Hence we use the labeling “C3S3-like" instead of C3S3 in the main text. We do not go into details of the size dependence for the stripe-like states, because they are in any case excited states. § ANALYSIS OF Δ DEPENDENCE OF ENERGY In Fig. <ref> the total energy per site E_ tot and the onsite Coulomb part E_U (see panel (a), (c) respectively) are shown for doped CaCuO_2. Each energy contribution is subtracted by a linear function F(δ) = b_0 + b_1 δ for better visibility, where b_0 and b_1 are listed in Table <ref> (see gray lines in (a), (c)) and are shown in (b), (d). The subtracted energies are fitted by a quadratic function 𝒫(δ) = c_0 + c_1 δ + c_2 δ^2 to examine the curvature. Explicit values of the parameters are given in Table <ref>. The result shows that the total energy is concave as a function of δ of course, which is required from the thermodynamic stability, while only E_U exhibits convex behavior with c_2<0. Because the effective particle interaction is given by the δ^2 term, we find that the local quantity E_U is the origin of the attraction while the nonlocal energies contribute to c_2>0 in the total energy ensuring the thermodynamic stability. This supports the idea that the local strong correlation (repulsion) called Mottness turns to originate the effective attraction of the electrons, which is the underlying mechanism of both of the Cooper pairing and charge segregation such as the stripes. The attraction is understood from the following Mottness: The local energy is retained high in the Mott insulator because of U. However, if the carrier is doped, this is released by acquiring the itinerancy in a nonlinear fashion as a function of δ which yields c_2<0 and the attraction. § INTERLAYER CONTRIBUTIONS FOR BI2212 The effective interlayer Hamiltonian parameters for Bi2212 are shown in Table <ref>, where V^l_n is the interlayer Coulomb interaction, and t^l_n the interlayer hoppings. As defined in Ref. moree2022, the notation n=0 represents the interaction or hopping between interlayer nearest-neighbor Cu atoms (located one above the other), and n ≥ 1 represents the interaction or hopping between a Cu atom and its (n+1)^ th interlayer nearest-neighbor (located above or below its intralayer n^ th nearest-neighbor). § DOPING DEPENDENCE OF ENERGY FOR BI2201 AND BI2212 The energy per site as a function of δ and the competition of SC, stripe and AF states is shown in Fig. <ref> for Bi2212 and Fig. <ref> for Bi2201. § ANALYSIS ON MOMENTUM DISTRIBUTION We show calculated momentum distribution defined by n( k)=1/2N∑_i,j,σe^ik( r_i- r_j)⟨ c_i σ^†c_j σ⟩, because the jump or singularity of n( k) at the Fermi level characteristic of metals measures the incoherence of the carrier. Here we show n( k) for the case of doped CaCuO_2 in Fig. <ref> for the cases of δ = 0.028 ((a),(f)), 0.045 ((b),(g)), 0.101 ((c),(h)), 0.125 ((d),(i)), and δ=0.167 ((e),(j)) in the SC state on the L=24 square lattice. Although F_ SC^∞ is similar between δ=0.028 (or 0.045) and δ=0.101 (or 0.125), n( k) shows substantially more smooth and rounded shape for δ=0.028 and 0.04 than δ=0.101 and 0.125, demonstrating that the effect of the larger normal damping at smaller δ is responsible for this rounded behavior. The substantial increase in the damping with decreasing doping may be responsible for the suppression of T_c in the underdoped region irrespective of the high F_ SC^∞. More quantitative studies will be presented elsewhere. In SM Fig. S7, we show the case of δ=0.028 and δ=0.167 on the L=36 square lattice to ensure that the size dependence is weak. apsrev4-2 64 fxundefined [1] ifx#1 fnum [1] #1firstoftwo secondoftwo fx [1] #1firstoftwo secondoftwo noop [0]secondoftwo ref[1]@startlink#1@href href[1]#1@endlink anitize@url [0]` 12`$12`&12`#12`1̂2`_12`%12 startlink[1] endlink[0] rl [1]href #1 @bib@innerbibempty [Corboz et al.(2014)Corboz, Rice, and Troyer]PhysRevLett.113.046402 author author P. Corboz, author T. M. Rice, and author M. Troyer, https://doi.org/10.1103/PhysRevLett.113.046402 journal journal Phys. Rev. Lett. volume 113, pages 046402 (year 2014)NoStop [Hu et al.(2012)Hu, Becca, and Sorella]PhysRevB.85.081110 author author W.-J. Hu, author F. Becca, and author S. Sorella, https://doi.org/10.1103/PhysRevB.85.081110 journal journal Phys. Rev. B volume 85, pages 081110(R) (year 2012)NoStop [Zhao et al.(2017)Zhao, Ido, Morita, and Imada]zhao2017 author author H.-H. Zhao, author K. Ido, author S. Morita, and author M. Imada, https://doi.org/10.1103/PhysRevB.96.085103 journal journal Phys. Rev. B volume 96, pages 085103 (year 2017)NoStop [Zheng et al.(2017)Zheng, Chung, Corboz, Ehlers, Qin, Noack, Shi, White, Zhang, and Chan]doi:10.1126/science.aam7127 author author B.-X. Zheng, author C.-M. Chung, author P. Corboz, author G. Ehlers, author M.-P. Qin, author R. M. Noack, author H. Shi, author S. R. White, author S. Zhang, and author G. K.-L. Chan, https://doi.org/10.1126/science.aam7127 journal journal Science volume 358, pages 1155 (year 2017)NoStop [Darmawan et al.(2018)Darmawan, Nomura, Yamaji, and Imada]darmawan2018 author author A. S. Darmawan, author Y. Nomura, author Y. Yamaji, and author M. Imada, https://doi.org/10.1103/PhysRevB.98.205132 journal journal Phys. Rev. B volume 98, pages 205132 (year 2018)NoStop [Ido et al.(2018)Ido, Ohgoe, and Imada]ido2018 author author K. Ido, author T. Ohgoe, and author M. Imada, https://doi.org/10.1103/PhysRevB.97.045138 journal journal Phys. Rev. B volume 97, pages 045138 (year 2018)NoStop [Xiao et al.(2023)Xiao, He, Georges, and Zhang]PhysRevX.13.011007 author author B. Xiao, author Y.-Y. He, author A. Georges, and author S. Zhang, https://doi.org/10.1103/PhysRevX.13.011007 journal journal Phys. Rev. X volume 13, pages 011007 (year 2023)NoStop [Marino et al.(2022)Marino, Becca, and Tocchio]10.21468/SciPostPhys.12.6.180 author author V. Marino, author F. Becca, and author L. F. Tocchio, https://doi.org/10.21468/SciPostPhys.12.6.180 journal journal SciPost Phys. volume 12, pages 180 (year 2022)NoStop [Yokoyama et al.(2013)Yokoyama, Ogata, Tanaka, Kobayashi, and Tsuchiura]yokoyama2013 author author H. Yokoyama, author M. Ogata, author Y. Tanaka, author K. Kobayashi, and author H. Tsuchiura, https://doi.org/10.7566/JPSJ.82.014707 journal journal J. Phys. Soc. Jpn. volume 82, pages 014707 (year 2013)NoStop [Ohgoe et al.(2020)Ohgoe, Hirayama, Misawa, Ido, Yamaji, and Imada]ohgoe2020 author author T. Ohgoe, author M. Hirayama, author T. Misawa, author K. Ido, author Y. Yamaji, and author M. Imada, https://doi.org/10.1103/PhysRevB.101.045124 journal journal Phys. Rev. B volume 101, pages 045124 (year 2020)NoStop [Nilsson et al.(2019)Nilsson, Karlsson, and Aryasetiawan]PhysRevB.99.075135 author author F. Nilsson, author K. Karlsson, and author F. Aryasetiawan, https://doi.org/10.1103/PhysRevB.99.075135 journal journal Phys. Rev. B volume 99, pages 075135 (year 2019)NoStop [Morée et al.(2022)Morée, Hirayama, Schmid, Yamaji, and Imada]moree2022 author author J.-B. Morée, author M. Hirayama, author M. T. Schmid, author Y. Yamaji, and author M. Imada, https://doi.org/10.1103/PhysRevB.106.235150 journal journal Phys. Rev. B volume 106, pages 235150 (year 2022)NoStop [Weber et al.(2012)Weber, Yee, Haule, and Kotliar]Weber_2012 author author C. Weber, author C. Yee, author K. Haule, and author G. Kotliar, https://doi.org/10.1209/0295-5075/100/37001 journal journal Europhysics Letters volume 100, pages 37001 (year 2012)NoStop [Watanabe et al.(2021)Watanabe, Shirakawa, Seki, Sakakibara, Kotani, Ikeda, and Yunoki]PhysRevResearch.3.033157 author author H. Watanabe, author T. Shirakawa, author K. Seki, author H. Sakakibara, author T. Kotani, author H. Ikeda, and author S. Yunoki, https://doi.org/10.1103/PhysRevResearch.3.033157 journal journal Phys. Rev. Res. volume 3, pages 033157 (year 2021)NoStop [Misawa and Imada(2014)]Misawa2014-ym author author T. Misawa and author M. Imada, https://doi.org/https://doi.org/10.1038/ncomms6738 journal journal Nature Communications volume 5, pages 5738 (year 2014)NoStop [Nomura et al.(2015)Nomura, Sakai, Capone, and Arita]Nomura15Ful author author Y. Nomura, author S. Sakai, author M. Capone, and author R. Arita, https://doi.org/10.1126/sciadv.1500568 journal journal Science Advances volume 1, pages e1500568 (year 2015)NoStop [Kitatani et al.(2020)Kitatani, Si, Janson, Arita, Zhong, and Held]Kitatani2020-ra author author M. Kitatani, author L. Si, author O. Janson, author R. Arita, author Z. Zhong, and author K. Held, https://doi.org/https://doi.org/10.1038/s41535-020-00260-y journal journal npj Quantum Mat. volume 5, pages 59 (year 2020)NoStop [Misawa et al.(2019)Misawa, Morita, Yoshimi, Kawamura, Motoyama, Ido, Ohgoe, Imada, and Kato]misawa2019 author author T. Misawa, author S. Morita, author K. Yoshimi, author M. Kawamura, author Y. Motoyama, author K. Ido, author T. Ohgoe, author M. Imada, and author T. Kato, https://doi.org/https://doi.org/10.1016/j.cpc.2018.08.014 journal journal Computer Physics Communications volume 235, pages 447 (year 2019)NoStop [Tahara and Imada(2008)]tahara2008 author author D. Tahara and author M. Imada, https://doi.org/10.1143/JPSJ.77.114701 journal journal J. Phys. Soc. Jpn. volume 77, pages 114701 (year 2008)NoStop [Nomura et al.(2017)Nomura, Darmawan, Yamaji, and Imada]nomura2017 author author Y. Nomura, author A. S. Darmawan, author Y. Yamaji, and author M. Imada, https://doi.org/10.1103/PhysRevB.96.205152 journal journal Phys. Rev. B volume 96, pages 205152 (year 2017)NoStop [Nomura and Imada(2021)]nomura2021 author author Y. Nomura and author M. Imada, https://doi.org/10.1103/PhysRevX.11.031034 journal journal Phys. Rev. X volume 11, pages 031034 (year 2021)NoStop [Yokoyama and Shiba(1987)]YokoyamaShiba1987 author author H. Yokoyama and author H. Shiba, https://doi.org/10.1143/JPSJ.56.1490 journal journal Journal of the Physical Society of Japan volume 56, pages 1490 (year 1987)NoStop [Gros et al.(1987)Gros, Joynt, and Rice]GrossJoyntRice1987 author author C. Gros, author R. Joynt, and author T. M. Rice, https://doi.org/10.1103/PhysRevB.36.381 journal journal Phys. Rev. B volume 36, pages 381 (year 1987)NoStop [Gros(1988)]Gross1988 author author C. Gros, https://doi.org/10.1103/PhysRevB.38.931 journal journal Phys. Rev. B volume 38, pages 931 (year 1988)NoStop [Capriotti et al.(2001)Capriotti, Becca, Parola, and Sorella]Capriotti2001 author author L. Capriotti, author F. Becca, author A. Parola, and author S. Sorella, https://doi.org/10.1103/PhysRevLett.87.097201 journal journal Phys. Rev. Lett. volume 87, pages 097201 (year 2001)NoStop [Azuma et al.(1992)Azuma, Hiroi, Takano, Bando, and Takeda]Azuma1992 author author M. Azuma, author Z. Hiroi, author M. Takano, author Y. Bando, and author Y. Takeda, https://doi.org/https://doi.org/10.1038/356775a0 journal journal Nature volume 356, pages 775 (year 1992)NoStop [Yamamoto et al.(2000)Yamamoto, Hu, and Tajima]yamamoto2000 author author A. Yamamoto, author W.-Z. Hu, and author S. Tajima, https://doi.org/10.1103/PhysRevB.63.024504 journal journal Phys. Rev. B volume 63, pages 024504 (year 2000)NoStop [Fukase et al.(1990)Fukase, Koike, Goto, Nomoto, Iwabuchi, and Hanaguri]fukase1990ultrasonic author author T. Fukase, author Y. Koike, author T. Goto, author T. Nomoto, author Y. Iwabuchi, and author T. Hanaguri, https://apps.dtic.mil/sti/pdfs/ADA335967.pdf#page=121 journal journal Science & Technology , pages 113 (year 1990)NoStop [Minghu et al.(1992)Minghu, Zhuan, Hongbin, Xingbin, Gangjin, Xuanjia, Qirui, Yuming, Qidong, Jian, and Liezhao]fang1992 author author F. Minghu, author X. Zhuan, author W. Hongbin, author Z. Xingbin, author H. Gangjin, author Z. Xuanjia, author Z. Qirui, author W. Yuming, author W. Qidong, author S. Jian, and author C. Liezhao, http://cpl.iphy.ac.cn/Y1992/V9/I3/159?utm_source=TrendMD utm_medium=cpc utm_campaign=Chinese_Physics_Letters_TrendMD_0 journal journal Chinese Physics Letters volume 9, eid 159-161 (year 1992)NoStop [Hobou et al.(2009)Hobou, Ishida, Fujita, Ishikado, Kojima, Eisaki, and Uchida]Hobou2009 author author H. Hobou, author S. Ishida, author K. Fujita, author M. Ishikado, author K. M. Kojima, author H. Eisaki, and author S. Uchida, https://doi.org/10.1103/PhysRevB.79.064507 journal journal Phys. Rev. B volume 79, pages 064507 (year 2009)NoStop [Marzari and Vanderbilt(1997)]marzari1997maximally author author N. Marzari and author D. Vanderbilt, https://doi.org/10.1103/PhysRevB.56.12847 journal journal Phys. Rev. B volume 56, pages 12847 (year 1997)NoStop [Souza et al.(2001)Souza, Marzari, and Vanderbilt]souza2001maximally author author I. Souza, author N. Marzari, and author D. Vanderbilt, https://doi.org/10.1103/PhysRevB.65.035109 journal journal Phys. Rev. B volume 65, pages 035109 (year 2001)NoStop [Hirayama et al.(2019)Hirayama, Misawa, Ohgoe, Yamaji, and Imada]hirayama2019 author author M. Hirayama, author T. Misawa, author T. Ohgoe, author Y. Yamaji, and author M. Imada, https://doi.org/10.1103/PhysRevB.99.245155 journal journal Phys. Rev. B volume 99, pages 245155 (year 2019)NoStop [Gutzwiller(1963)]gutzwiller1963 author author M. C. Gutzwiller, https://doi.org/10.1103/PhysRevLett.10.159 journal journal Phys. Rev. Lett. volume 10, pages 159 (year 1963)NoStop [Jastrow(1955)]jastrow1955 author author R. Jastrow, https://doi.org/10.1103/PhysRev.98.1479 journal journal Phys. Rev. volume 98, pages 1479 (year 1955)NoStop [Capello et al.(2005)Capello, Becca, Fabrizio, Sorella, and Tosatti]capello2005 author author M. Capello, author F. Becca, author M. Fabrizio, author S. Sorella, and author E. Tosatti, https://doi.org/10.1103/PhysRevLett.94.026406 journal journal Phys. Rev. Lett. volume 94, pages 026406 (year 2005)NoStop [Yokoyama and Shiba(1990)]yokoyama1990 author author H. Yokoyama and author H. Shiba, https://doi.org/10.1143/JPSJ.59.3669 journal journal J. Phys. Soc. Jpn. volume 59, pages 3669 (year 1990)NoStop [Imada and Kashima(2000)]imada2000 author author M. Imada and author T. Kashima, https://doi.org/10.1143/JPSJ.69.2723 journal journal J. Phys. Soc. Jpn. volume 69, pages 2723 (year 2000)NoStop [Kashima and Imada(2001)]kashima2001 author author T. Kashima and author M. Imada, https://doi.org/10.1143/JPSJ.70.2287 journal journal J. Phys. Soc. Jpn. volume 70, pages 2287 (year 2001)NoStop [Sorella(2001)]sorella2001 author author S. Sorella, https://doi.org/10.1103/PhysRevB.64.024512 journal journal Phys. Rev. B volume 64, pages 024512 (year 2001)NoStop [Ido et al.(2022)Ido, Yoshimi, Misawa, and Imada]ido2022 author author K. Ido, author K. Yoshimi, author T. Misawa, and author M. Imada, https://doi.org/10.1038/s41535-022-00452-8 journal journal npj Quantum Materials volume 7, pages 48 (year 2022)NoStop [Hiroi et al.(1993)Hiroi, Azuma, Takano, and Takeda]hiroi1993 author author Z. Hiroi, author M. Azuma, author M. Takano, and author Y. Takeda, https://doi.org/https://doi.org/10.1016/0921-4534(93)90200-A journal journal Physica C: Superconductivity volume 208, pages 286 (year 1993)NoStop [Tanaka et al.(2006)Tanaka, Lee, Lu, Fujimor, Fujii, Risdiana, Terasaki, Scalapino, Devereaux, Hussain, and Shen]Tanaka2006 author author K. Tanaka, author W. S. Lee, author D. H. Lu, author A. Fujimor, author T. Fujii, author Risdiana, author I. Terasaki, author D. J. Scalapino, author T. P. Devereaux, author Z. Hussain, and author Z.-X. Shen, https://doi.org/10.1126/science.1133411 journal journal Science volume 314, pages 1910 (year 2006)NoStop [Alldredge et al.(2008)Alldredge, Lee, McElroy, Wang, Fujita, Kohsaka, Taylor, Eisaki, Uchida, Hirschfeld, and Davis]Alldredge2008 author author J. Alldredge, author J. Lee, author K. McElroy, author M. Wang, author K. Fujita, author Y. Kohsaka, author C. Taylor, author H. Eisaki, author S. Uchida, author P. Hirschfeld, and author J. Davis, https://doi.org/https://doi.org/10.1038/nphys917 journal journal Nat. Phys. volume 4, pages 319 (year 2008)NoStop [Sakai et al.(2018)Sakai, Civelli, and Imada]Sakai2018 author author S. Sakai, author M. Civelli, and author M. Imada, https://doi.org/10.1103/PhysRevB.98.195109 journal journal Phys. Rev. B volume 98, pages 195109 (year 2018)NoStop [Uemura et al.(1989)Uemura, Luke, Sternlieb, Brewer, Carolan, Hardy, Kadono, Kempton, Kiefl, Kreitzman, Mulhern, Riseman, Williams, Yang, Uchida, Takagi, Gopalakrishnan, Sleight, Subramanian, Chien, Cieplak, Xiao, Lee, Statt, Stronach, Kossler, and Yu]Uemura1989 author author Y. J. Uemura, author G. M. Luke, author B. J. Sternlieb, author J. H. Brewer, author J. F. Carolan, author W. N. Hardy, author R. Kadono, author J. R. Kempton, author R. F. Kiefl, author S. R. Kreitzman, author P. Mulhern, author T. M. Riseman, author D. L. Williams, author B. X. Yang, author S. Uchida, author H. Takagi, author J. Gopalakrishnan, author A. W. Sleight, author M. A. Subramanian, author C. L. Chien, author M. Z. Cieplak, author G. Xiao, author V. Y. Lee, author B. W. Statt, author C. E. Stronach, author W. J. Kossler, and author X. H. Yu, https://doi.org/10.1103/PhysRevLett.62.2317 journal journal Phys. Rev. Lett. volume 62, pages 2317 (year 1989)NoStop [Torrance et al.(1988)Torrance, Tokura, LaPlaca, Huang, Savoy, and Nazzal]Torrance1988 author author J. Torrance, author Y. Tokura, author S. LaPlaca, author T. Huang, author R. Savoy, and author A. Nazzal, https://doi.org/https://doi.org/10.1016/0038-1098(88)90987-8 journal journal Solid State Communications volume 66, pages 703 (year 1988), note 25th Aniversary YearNoStop [Torardi et al.(1988)Torardi, Subramanian, Calabrese, Gopalakrishnan, McCarron, Morrissey, Askew, Flippen, Chowdhry, and Sleight]Torardi1988 author author C. C. Torardi, author M. A. Subramanian, author J. C. Calabrese, author J. Gopalakrishnan, author E. M. McCarron, author K. J. Morrissey, author T. R. Askew, author R. B. Flippen, author U. Chowdhry, and author A. W. Sleight, https://doi.org/10.1103/PhysRevB.38.225 journal journal Phys. Rev. B volume 38, pages 225 (year 1988)NoStop [Ito et al.(1998)Ito, Vlaicu, Mukoyama, Sato, Yoshikado, Julien, Chong, Ikeda, Takano, and Sherman]Ito1998 author author Y. Ito, author A.-M. Vlaicu, author T. Mukoyama, author S. Sato, author S. Yoshikado, author C. Julien, author I. Chong, author Y. Ikeda, author M. Takano, and author E. Y. Sherman, https://doi.org/10.1103/PhysRevB.58.2851 journal journal Phys. Rev. B volume 58, pages 2851 (year 1998)NoStop [Schlögl et al.(1993)Schlögl, Neumeier, Diederichs, Allgeier, and Schilling]Schloegl1993 author author A. Schlögl, author J. Neumeier, author J. Diederichs, author C. Allgeier, and author J. Schilling, https://doi.org/https://doi.org/10.1016/0921-4534(93)90084-4 journal journal Physica C: Superconductivity volume 216, pages 417 (year 1993)NoStop [Beskrovnyi et al.(1990)Beskrovnyi, Dlouhá, Jirák, and Vratislav]Beskrovnyi1990 author author A. Beskrovnyi, author M. Dlouhá, author Z. Jirák, and author S. Vratislav, https://doi.org/https://doi.org/10.1016/0921-4534(90)90450-S journal journal Physica C: Superconductivity volume 171, pages 19 (year 1990)NoStop [di Cicco and Berrettoni(1993)]Cicco1993 author author A. di Cicco and author M. Berrettoni, https://doi.org/https://doi.org/10.1016/0375-9601(93)90936-T journal journal Physics Letters A volume 176, pages 375 (year 1993)NoStop [Yamamoto et al.(1990)Yamamoto, Onoda, Takayama-Muromachi, Izumi, Ishigaki, and Asano]yamamoto1990 author author A. Yamamoto, author M. Onoda, author E. Takayama-Muromachi, author F. Izumi, author T. Ishigaki, and author H. Asano, https://doi.org/10.1103/PhysRevB.42.4228 journal journal Phys. Rev. B volume 42, pages 4228 (year 1990)NoStop [Slezak et al.(2008)Slezak, Lee, Wang, McElroy, Fujita, Andersen, Hirschfeld, Eisaki, Uchida, and Davis]slezak2008 author author J. A. Slezak, author J. Lee, author M. Wang, author K. McElroy, author K. Fujita, author B. M. Andersen, author P. J. Hirschfeld, author H. Eisaki, author S. Uchida, and author J. C. Davis, https://doi.org/10.1073/pnas.0706795105 journal journal Proceedings of the National Academy of Sciences volume 105, pages 3203 (year 2008)NoStop [Iwano and Yamaji(2022)]iwano2022 author author A. Iwano and author Y. Yamaji, https://doi.org/10.7566/JPSJ.91.094702 journal journal J. Phys. Soc. Jpn. volume 91, pages 094702 (year 2022)NoStop [Imada and Suzuki(2019)]imada_suzuki2019 author author M. Imada and author T. J. Suzuki, https://doi.org/10.7566/JPSJ.88.024701 journal journal J. Phys. Soc. Jpn. volume 88, pages 024701 (year 2019)NoStop [Imada(2021)]imada_review2021 author author M. Imada, https://doi.org/10.7566/JPSJ.90.111009 journal journal J. Phys. Soc. Jpn. volume 90, pages 111009 (year 2021)NoStop [Yamaji et al.(2021)Yamaji, Yoshida, Fujimori, and Imada]PhysRevResearch.3.043099 author author Y. Yamaji, author T. Yoshida, author A. Fujimori, and author M. Imada, https://doi.org/10.1103/PhysRevResearch.3.043099 journal journal Phys. Rev. Res. volume 3, pages 043099 (year 2021)NoStop [Pavarini et al.(2001)Pavarini, Dasgupta, Saha-Dasgupta, Jepsen, and Andersen]pavarini2001 author author E. Pavarini, author I. Dasgupta, author T. Saha-Dasgupta, author O. Jepsen, and author O. K. Andersen, https://doi.org/10.1103/PhysRevLett.87.047003 journal journal Phys. Rev. Lett. volume 87, pages 047003 (year 2001)NoStop [Mori et al.(2008)Mori, Khaliullin, Tohyama, and Maekawa]mori2008 author author M. Mori, author G. Khaliullin, author T. Tohyama, and author S. Maekawa, https://doi.org/10.1103/PhysRevLett.101.247003 journal journal Phys. Rev. Lett. volume 101, pages 247003 (year 2008)NoStop [Weber et al.(2010)Weber, Haule, and Kotliar]weber2010 author author C. Weber, author K. Haule, and author G. Kotliar, https://doi.org/10.1103/PhysRevB.82.125107 journal journal Phys. Rev. B volume 82, pages 125107 (year 2010)NoStop [Sakakibara et al.(2010)Sakakibara, Usui, Kuroki, Arita, and Aoki]sakakibara2010 author author H. Sakakibara, author H. Usui, author K. Kuroki, author R. Arita, and author H. Aoki, https://doi.org/10.1103/PhysRevLett.105.057003 journal journal Phys. Rev. Lett. volume 105, pages 057003 (year 2010)NoStop [Hu et al.(2014)Hu, Kaiser, Nicoletti, Hunt, Gierz, Hoffmann, Le Tacon, Loew, Keimer, and Cavalleri]hu2014 author author W. Hu, author S. Kaiser, author D. Nicoletti, author C. R. Hunt, author I. Gierz, author M. C. Hoffmann, author M. Le Tacon, author T. Loew, author B. Keimer, and author A. Cavalleri, https://doi.org/10.1038/nmat3963 journal journal Nature Mater. volume 13, pages 705 (year 2014)NoStop [Carleo and Troyer(2017)]carleo2017 author author G. Carleo and author M. Troyer, https://doi.org/10.1126/science.aag2302 journal journal Science volume 355, pages 602 (year 2017)NoStop Supplementary Material S1. Full ab initio Hamiltonians In Table <ref> we present the full single band ab initio Hamiltonian for all four compounds as derived in Ref. moree2022. 5mm S2. Correlation functions of the CmSn states in CaCuO_2 Here we discuss the real space spin- and charge-configuration of the CmSn stripe states. For this purpose, we calculate the following correlation functions S_z( r) = ( n_ r, ↑ - n_ r, ↓)/2, n( r) = (n_ r, ↑ + n_ r, ↓)/2, which are single-particle quantities. Here the vector r represents the two-dimensional lattice site coordinate r = (r_x, r_y), S_z( r) the spin configuration of each lattice site, and n( r) the corresponding charge configuration. Further we consider S_s( q), S_c( q), and n( k), as defined in equations (2), (3), and (A1) in the main text. Although the translational symmetry breaking does not occur in a finite-size systems in the true ground state, practically, ordered states are realized in a sufficiently large systems in the VMC results if the order is expected in the thermodynamic limit. 5mm 1. C4S8 Starting with the C4S8 state, the spin- and charge structure factor is shown in Fig. <ref>. To confirm the charge order of period four, we expect to see peaks in the charge structure factor. In panel (b), indeed, there are peaks at q_CDW = ( π/2, 0) and ( 3π/2, 0), confirming the charge order. Similarly we find peaks in the spin structure factor (see panel (a)) at q_SDW = ( 3π/4, π) and ( 5π/4, π) corresponding to a spin order of period eight. In (c) the corresponding momentum distribution is also shown. The C4S8 stripe sate can also be identified in the real space resolved quantities S_z( r) and n( r), when no additional momentum projections in mVMC are done. In Fig. <ref> S_z( r) (a) and n( r) (b) are shown for the same case as a heatmap. The charge and spin stripes run along the r_y direction, while periodically alternating in the r_x direction with period four (charge) or eight (spin). 5mm 2. C3S3 Using the same analysis as above the C3S3 state with charge period three and spin period three can be identified. The spin- and charge structure factors, depicted in Fig. <ref> (a) or (b), show peaks at q_CDW = ( 2 π/3, 0) and ( 4 π/3, 0) for the charge structure factor, and q_SDW = ( 2π/3, π) and ( 4π/3, π) for the spin structure factor. In (c) the corresponding momentum distribution is also shown. Fig. <ref> (a) or (b) shows the real space configuration of spin and charge with the period of three in r_x direction. Compared to the C4S8 state, the C3S3 state realized here has significantly smaller peaks at q_CDW in S_c( q). As shown in Appendix C of the main text, this may already indicate, that in the thermodynamic limit, this stripe state will fall into a paramagnetic state. 5mm S3. AF state for CaCuO_2 away from half filling For the AF state at δ = 0.167 hole doping on a L = 24 square lattice for CaCuO_2, the spin- and charge structure factor, and momentum distribution is shown in Fig. <ref>. In (a) the strong peak at q = (π, π) in S_s( q) indicates a strong antiferromagnetic correlations, corresponding to the well known checkerboard spin configuration pattern. For the charge structure factor on the other hand (shown in (b)), there are no sharp peaks. Over the full range, the function is smooth, resulting in a charge homogeneous state. The momentum distribution n( k) is shown in (c), suggesting non Fermi liquid behaviour. 5mm S4. Uncertainty of the apical oxygen position in Bi2212 and Bi2201 SC correlations P_d(r) as a function of distance r for several choices of the scaling factor α=ξ with the Hamiltonian ℋ(α,α) are presented in Fig. <ref> for Bi2212 and Bi2201. 5mm S5. Momentum distributions of CaCuO_2 We show n(k) for the case of doped CaCuO_2 at L=36 lattice in Fig. <ref> for δ = 0.028 (a),(c) and δ = 0.167 (b),(d) for the SC state. apsrev4-2 1 fxundefined [1] ifx#1 fnum [1] #1firstoftwo secondoftwo fx [1] #1firstoftwo secondoftwo noop [0]secondoftwo ref[1]@startlink#1@href href[1]#1@endlink anitize@url [0]` 12`$12`&12`#12`1̂2`_12`%12 startlink[1] endlink[0] rl [1]href #1 @bib@innerbibempty [Morée et al.(2022)Morée, Hirayama, Schmid, Yamaji, and Imada]moree2022 author author J.-B. Morée, author M. Hirayama, author M. T. Schmid, author Y. Yamaji, and author M. Imada, https://doi.org/10.1103/PhysRevB.106.235150 journal journal Phys. Rev. B volume 106, pages 235150 (year 2022)NoStop
http://arxiv.org/abs/2303.07263v1
20230313164247
InferFix: End-to-End Program Repair with LLMs
[ "Matthew Jin", "Syed Shahriar", "Michele Tufano", "Xin Shi", "Shuai Lu", "Neel Sundaresan", "Alexey Svyatkovskiy" ]
cs.SE
[ "cs.SE" ]
Microsoft Redmond WA USA UCLA Los Angeles CA USA Microsoft Redmond WA USA Microsoft Redmond WA USA Microsoft Research Beijing China Microsoft Redmond WA USA Microsoft Redmond WA USA Software development life cycle is profoundly influenced by bugs; their introduction, identification, and eventual resolution account for a significant portion of software development cost. This has motivated software engineering researchers and practitioners to propose different approaches for automating the identification and repair of software defects. Large language models have been adapted to the program repair task through few-shot demonstration learning and instruction prompting, treating this as an infilling task. However, these models have only focused on learning general bug-fixing patterns for uncategorized bugs mined from public repositories. In this paper, we propose : a transformer-based program repair framework paired with a state-of-the-art static analyzer to fix critical security and performance bugs. combines a Retriever – transformer encoder model pretrained via contrastive learning objective, which aims at searching for semantically equivalent bugs and corresponding fixes; and a Generator – a large language model (12 billion parameter Codex Cushman model) finetuned on supervised bug-fix data with prompts augmented via adding bug type annotations and semantically similar fixes retrieved from an external non-parametric memory. To train and evaluate our approach, we curated , a novel, metadata-rich dataset of bugs extracted by executing the Infer static analyzer on the change histories of thousands of Java and C# repositories. Our evaluation demonstrates that outperforms strong LLM baselines, with a top-1 accuracy of 65.6% for generating fixes in C# and 76.8% in Java. We discuss the deployment of alongside Infer at Microsoft which offers an end-to-end solution for detection, classification, and localization of bugs, as well as fixing and validation of candidate patches, integrated in the continuous integration pipeline to automate the software development workflow. : End-to-End Program Repair with LLMs over Retrieval-Augmented Prompts Alexey Svyatkovskiy March 30, 2023 ====================================================================== § INTRODUCTION The software development lifecycle is profoundly affected by bugs. Traditional program analyses techniques can detect and localize bugs through formal reasoning, leaving the task of categorizing the bugs and coding a patch to a developer. The traditional approach of manually generating patches through examination of code changes is a time consuming and error-prone task, which could be automated. Many of the recently proposed approaches for bug prediction, detection, and repair rely on machine learning algorithms – infamously data hungry – depending on large amounts of high quality data for effective training. Large language models have been successfully adapted to the program repair tasks through few-shot demonstration learning and instruction prompting, treating this as an infilling task <cit.>. However, while focusing on solving specific research problems they failed to provide a reliable end-to-end program repair solution that could be productized. Static analysis tools like Infer can be used to identify critical security and performance issues. This can preempt large parts of the software development cycle, including the process of creating detailed unit tests, which can be extremely time-consuming and difficult for a large, complex project whose code is broken down into many modules or across many files. They can also identify bugs and produce bug reports in a way that is machine-readable and conducive to usage in conjunction with patch generation models. In this work we focus on three types of bugs reported by Infer: Null Pointer Dereference (NPD), Resource Leak (RL), and Thread Safety Violation (TSV). We focus on these because they pose critical performance, reliability and security issues, and can also be more difficult to fix than other issue types which are also more commonly detected and studied. Language models commonly adopt two paradigms for task-specific generalization – via finetuning or few-shot learning. In the former paradigm, the canonical model training structure is divided into two phases – pretraining and finetuning. In pretraining stage, a model is trained in a self-supervised way to perform denoising or generic sequence-to-sequence transformations, geared towards improving the performance on a variety of downstream tasks. In the finetuning stage the model is trained on a specialized supervised dataset to perform a concrete task, such as question answering, text summarization, or in our case, program repair. The few-shot learning paradigm allows model specialization for a downstream task via prompt augmentation, composition, or ensembling <cit.>. A variant of prompt augmentation, commonly called demonstration learning, introduces a few input-output examples for a given task, for instance “The capital of China is Beijing. The capital of Italy is Rome. The capital of South Africa is ”, allowing to achieve good performance on a downstream task without any gradient updates, which is crucial for very large language models like GPT-3 <cit.>, T5 <cit.>, and PaLM <cit.>. Another variant of prompt augmentation commonly referred to as instruction prompting aims to introduce a natural language description of a task, for instance: “write a program to determine whether a graph is bipartite”. It may utilize prompt templates filling in necessary information from an external source (a database, a neural model). In our approach we combine the benefits of both paradigms, by augmenting the prompts and then finetuning our model on the dataset of augmented prompts and predictions to get the best performance. In this paper, we introduce – a program repair framework which combines a transformer encoder model pretrained via contrastive learning serving as a retriever over a database of historic bugs and fixes, and a large language model (12 billion parameter Codex Cushman model, ) instrumented with the facility to leverage retrieved information from the external database. Given the baseline Codex model has been shown to occasionally predict insecure or buggy code <cit.>, we prioritized finetuning it on a bug-free supervised dataset of bugs and fixes with contexts enriched via relevant program repair patterns from an external non-parametric memory. The contributions of the paper are as follows: (i) we propose a program repair framework that leverages static analyses for bug detection, localization, and categorization paired with a large language model finetuned for program repair task on a dataset of augmented prompts, (ii) we curate : a metadata-rich dataset of bugs and fixes in Java and C# programming languages extracted with the Infer static analyzer, (iii) we introduce a dedicated prompt augmentation technique for program repair task, which leverages dense retrieval from an external database of historic bugs and fixes, bug type annotations, and syntactic hierarchies across the entire source code file affected by a bug, (iv) we evaluate our model on the dataset, achieving an impressive 76% top-1 accuracy of patch generation in Java, and over 65% in C#, across null pointer dereference, resource leak, and thread safety violation bug types, and finally (v) we deploy as a GitHub action and as part of the Azure DevOps continuous integration pipeline internally at Microsoft, and document aspects of deployment. § MOTIVATING EXAMPLE To provide the intuition about how our approach works and to describe the concrete details of the bug detection, localization, and repair scenario we begin with a motivating example. In a typical continuous software development workflow, software engineers make atomic, iterative changes to feature branches periodically merging to the production branch, which is then continuously and automatically deployed to the end users. Consider a large software project with a modular code base spread across multiple source code files. It can be extremely inefficient, in terms of developer time and effort, to detect, localize, and fix errors manually before they are merged to main. In addition, it requires the creation of an extensive unit test suite to ensure that a feature or change works across all possible versions of the software, and no regressions are introduced. <ref> illustrates a typical software development workflow at Microsoft Developer Division in presence of . As a pull request proposing code changes is created, continuous integration pipeline (CI) triggers unit testing, build, and Infer static analysis steps. If bugs are detected, the patch generation module will be invoked to propose a fix. The proposed bug fix is then validated and subsequently served as a bug-fixing pull request to a feature branch allowing developer to catch bugs before merging the code to the production branch. Our approach combines a static analyzer to detect, localize, and classify bugs with a powerful LLM (finetuned 12 billion parameter Codex model) to generate fixes. <ref> provides details about workflow based on a real-world bug example from the acs-aem-common <cit.> repository, which is a unified collection of code for content management that optimizes authoring, and delivery of content and digital media written in Java. The Infer static analyzer detects a null pointer dereference error, due to an object in the code returned by call, which could be null and is dereferenced at line 168. The context preprocessing module utilizes the information provided by the analyzer to extract the buggy method, and retains surrounding context most relevant to fixing the bug – import statements, class signature, body of the method which is invoked at buggy line. The retrieval augmentation engine then searches for semantically similar buggy code snippets in the historic database, prepending similar bug-fixes to the prompt. Finally, the augmented prompt is sent to the finetuned Codex model for inference. The predicted patch is then validated by executing the Infer static analyzer and unit tests as part of the continuous integration pipeline to ensure the error is indeed fixed and no regressions are introduced in the code base. § DATASET We collect a supervised dataset of bugs detected with (Infer Static Analyzer), which performs semantic analysis via Separation Logic. We executed and over the change histories of approximately 6.2k Java and C# open-source repositories (2.9k Java, 3.3k C#) hosted on GitHub, analyzing more than 1 million commits. While a few bug datasets are already available, such as Defects4j <cit.>, QuixBugs <cit.>, ManySStuBs4J <cit.>, UnifiedBugDataset <cit.> and many others, the dataset we introduce is differentiated by the amount and quality of information provided about each bug by the static analysis. Specifically, each bug in the dataset is associated with several pieces of metadata, including: * Bug Type: each detected or fixed bug is marked with a bug type extracted with , such as: null dereference, resource leak, immutable cast, etc. This information could be potentially used by automated program repair techniques to guide the bug-fixing attempts. Alternatively, these instances can be used as labeled data points for bug classification techniques. * Bug Location: the dataset provides localization info at different levels of granularity: file, class, method, and line. For specific types of bugs, also affected variables/methods are reported. * Change History: bugs are linked with the change history of the software project. Specifically, the dataset provides information on when a bug was introduced or fixed throughout the development process. Additionally, each analyzed commit is associated with the introduced/fixed or preexisting bugs involving the file touched in the commit. §.§ Background on Infer Static Analyzer Infer is an open-source static analysis tool originating from program analysis research on separation logic. It was first developed by the startup Monoidics Ltd, which was acquired by Facebook in 2013 and open-sourced in 2015. It computes program specifications to detect errors related to memory safety, concurrency, security, and more. It is industrially deployed at companies including Meta, Amazon, and Microsoft. Although in this work we will focus on null dereferences, resource leaks, and thread safety violations detected by Infer, it is able to detect a much wider variety of security and performance issues. For example, via taint tracking it is able to detect dataflow-related issues such as SQL injections. We believe our framework will be capable of mining and generating patches for these bug types as well, but leave the examination of this to future efforts. At Meta, Infer runs within the internal continuous integration (CI) system of repositories consisting of 10s and 100s millions of lines of code, including those for WhatsApp, Instagram, and Facebook core. Infer runs on diffs and reports issues to developers by writing comments within the code review system. A study conducted at Meta <cit.> saw a false positive rate under 20%, and issues posted saw a fix rate of 70%. The high issue relevance driven by this diff-time deployment of this system is critical; the same study saw a near-zero fix rate when it was deployed to developers as a list of assigned issues outside of the CI system. This underlines the value of our proposed system being deployed as a bug-detection-and-fix-recommendation code review module. InferSharp <cit.> is the compiler frontend developed by Microsoft which translates the Common Intermediate Language (CIL) to the Smallfoot Intermediate Language interpreted by Infer, thereby enabling Infer's capabilities on all CIL languages (including C# and F#). For the purposes of this paper, InferSharp refers to the static analysis of Infer applied to CIL languages. Notably, to our knowledge it is the only interprocedural static analysis for CIL languages which is free-to-use and MIT-licensed. Considering Infer's industry track record, this creates unique opportunities in both research and industry to build bug-detection-and-fix product capabilities for a relatively underserved developer segment. §.§ Collecting Data with Infer In this section we describe the data extraction process that culminated in the creation of the  dataset. Specifically, we provide details on how we executed Infer over the change histories of software projects in order to detect introduced and fixed bugs. Given as input the current commit curr and the previous commit prev, we begin by computing a to identify the files involved in the change performed by the developer in the commit curr. Next, we analyze the status of the files at commit prev. Specifically, we checkout the snapshot of the system at commit prev, and we build the system using the project-specific build tool. During the build process, the command intercepts calls to the compiler to read source files and translates them into an intermediate representation which will allow Infer to analyze these files. Next, we invoke the command specifying the files to be analyzed (the files diff involved in the commit). This analysis produces a report reportPrev detailing the bugs identified within the specified files. Subsequently, we move to the current commit curr and perform the same steps described for the commit prev, that is: checking out the commit, building system while capturing the source files, and analyzing the diff files in order to detect bugs. Finally, with the command, we compute the differences between the two infer reports reportPrev and reportCurr. The output bugs contain three categories of issues: * introduced: issues found in curr but not in prev; * fixed: issues found in prev but not in curr; * preexisting: issues found in both prev and curr. We perform these steps for each pair of commits (prev, curr) over the change histories of the analyzed software projects. We optimize this process by obviating the need to build the same commit twice (once as curr and next as prev) by instead reusing the build and capture stages in the next iteration. §.§ Filtering Algorithm <ref> detects commits which remove bugs detected by Infer; however, some of the bugs are removed as a result of a whole method refactoring, or as the result of a fix in a different method. Such diffs are unlikely to be useful for training a bug patch model that takes as input method-level context. Thus, we apply additional heuristics intended to filter out such commits: * The pointer is dereferenced within the method itself, rather than dereferenced in a call to another method. * With respect to the method, the lines edited are within 4 lines of the reported buggy line. * The edit itself is at most 8 lines. Filter (1) ensures the dereference occurs within the method, which is necessary as the model is intended to generate patches local to the method in which the bug occurs. Filter (2) ensures that the fix occurs local to the dereference, which filters out samples which contain edits irrelevant to the bug. Filter (3) tends to filter out samples in which the bug disappears as a result of method rewrite. §.§ Dataset Statistics After running the extraction pipeline on 2937 repositories, we identified a total of 8280 bug patches. Of these bugs, 259 of these are null dereference patches which pass the filtering process, and 462 of these are resource leaks which pass the filtering process. We note that the filtered dataset contains commits which might have been detected by traditional methods involving extracting commits with certain keywords related to the desire bug type. Of the 259 null patches, 59 contain “null” or “npe” in the corresponding commit message, and of the 462 resource leak patches, 15 contain the “leak” keyword. We see from this that we are able to extract many additional fixes that would not have appeared using naive commit message keyword matching. As shown in <ref> the is composed of multi-line bugs, which represents a challenging case for program repair tools. § BASELINES In the following, we explore several program repair baselines which are constructed around powerful LLMs ( and ) for tasks of completing code, filling code in the middle, or generating a fix following a natural language instruction. In the following, we evaluate the performance based on the accuracy of exact string match of a generated patch to the ground truth fix. §.§ Demonstration Prompting Demonstration learning is a prompt augmentation technique in which a few answered prompts are prepended to the context with the purpose of demonstrating how a language model should approach a downstream task. For program repair, we introduce a prefix constructed of two answered prompts as, followed by the actual buggy code snippet , as shown in <ref>. Our few-shot demonstration learning experiments are based on the strong 12 billion parameter Codex language model of code. §.§ Conditional Language Modeling Our next baseline is the zero-shot conditional language generation (code completion), which aims to utilize the next token prediction to repair programs. Specifically, given a bug-free prefix, we run Codex model inference to complete the buggy code snippet, aiming to rewrite a program without bugs. In our experiments, we apply nucleus sampling decoding algorithm with top_p = 1 and a temperature T = 0.7 generating top 10 samples up to the length of 1024 tokens with a total length for prefix and completion of 2048. Our conditional language modeling experiments are also based on the . §.§ Instruction Prompting Instruction learning is a prompt augmentation technique that introduces a natural language description of the task. To approach program repair, we prepare prompts following a template: We utilize OpenaAI GPT-3 Davinci model, a 175 billion parameter language model and a close sibling of ChatGPT, to complete the prompts. Typically, Davinci outputs a natural language summary of the proposed fix followed by a code snippet. An example prediction by ChatGPT model is illustrated in <ref>. For the sake of evaluation, we instruct to only output code snippet in its response which otherwise normally accompanied by the natural language descriptions. § FRAMEWORK program repair framework is composed of three following key modules: (i) a static analysis tool that detects, localizes, and classifies bugs, (ii) retrieval module – a large index of historic bugs and fixes, equipped with a facility to efficiently search and retrieve “hints” – semantically-similar source code segments – given a query, and (iii) generator module – a large language model finetuned on a dataset of prompts enriched with the information provided by the static analyzer and the retriever to generate fixes. §.§ Bug Detection & Classification Module Our bug detection, localization, and classification module is powered by the Infer, which performs program analysis via Separation Logic. Although Infer's Pulse framework has recently been released, for the purposes of this paper we examine bugs generated by Infer's biabduction framework. Compiler frontends for Infer, such as InferSharp, translate source code into the control-flow-graph intermediate representation understood by Infer, known as the Smallfoot Intermediate Language. Infer performs automated program analysis over this graph and produces compositional method summaries in order to determine whether there are defects present in the source code. §.§ Retrieval Module Our retrieval module closely follows the ReACC formulation <cit.>. The retriever searches for semantically equivalent vulnerable code given a buggy code snippet and retrieves corresponding fix candidates based on cosine similarity between the embedding of query vector q and a buggy code snippet c. Dense retrieval maps each code snippet to a d-dimension dense vector. The relevance of a code snippet to a given query can then be determined as a dot product of the query vector and each document vector. We closely follow the Dense Passage Retriever (DPR) model <cit.>. At the training stage, we adopt in-batch negatives to calculate the contrastive loss by InfoNCE <cit.>. Our dense retriever utilizes a bidirectional transformer encoder ℰ to obtain encoded dense vector representations of the query (ℰ(q)), and for each buggy code snippet c indexed in the retrieval database (ℰ(c)). The retrieval database is a key-value store with encoded buggy code snippets ℰ(c) serving as keys, and string representations of the corresponding fixes f serving as values. We take the representation of the token as a summary of the encoded sequences of tokens, and compute similarity between the query and each code snippet in the database as a dot-product: sim(q, c) = ℰ(c)^T ·ℰ(q). The bidirectional transformer encoder ℰ is pretrained with the contrastive learning objective. Contrastive learning <cit.> is a self-supervised learning technique, in which the machine learning model is aiming to learn from the commonality of the training samples but also the attributes that make samples different. Given a contrastive pretraining dataset D = {q_i, p_i^+, p_(i,1)^-,...,p_(i,h)^-}, i = 0...N, where each sample consists of a query – an encoding of a buggy code snippet; a positive sample representing a semantically similar code snippet of the same bug type; and a set of negative samples which are irrelevant code snippets of different bug types. The contrastive loss is then given by the following formula (negative log likelihood of the positive sample): L (q_i, p_i^+, p_(i,1)^-,...,p_(i,n)^-) = - log e^sim( q_i,p_i^+)/e^sim( q_i, p_i^+) + ∑_i=1^n e^sim(q_i, p_(i,j)^-), where sim is the cosine similarity between the embedding vectors. §.§ Generator Module Our generator model is based on Codex Cushman (), a 12B parameter decoder-only transformer language model <cit.> developed by OpenAI, which is a descendant of GPT-3, trained on source code. We finetune Codex on a supervised corpus extracted from the dataset, with the goal of teaching the model to generate a fix for the given buggy code. Specifically, the input to the model is the buggy code augmented with additional information such as bug localization and categorization, hierarchical extended context, and retrieved similar fixes. We discuss the prompt augmentation process in detail in <ref>. We perform full model finetuning (updating all weights of the model), on sixty four 32 GB V100 GPU for 5 epochs, retaining best model checkpoint by the exact match accuracy metric. We utilize Babel platform – a model repository and an AzureML designer component family bringing together state-of-the-art transformer models on Azure ML compute for rapid experimentation. We use Adam stochastic optimization procedure with the learning rate of 0.01, warmup period of 1000 optimization steps, and global batch size of 256. § PROMPT AUGMENTATION Prompt augmentation has been shown to be a powerful technique for extracting high-quality outputs from large language models, and, in particular, for domain and task adaptation. In the following we describe our dedicated prompt augmentation approach for program repair task. The proposed approach is two-fold: (i) we extract and prioritize syntax hierarchies which are most relevant to the buggy snippet region, including focal context, and (ii) retrieve hints – structurally similar bug fixes from commit histories on GitHub. By doing so we are constructing a loosely structured template which includes the following: * Retrieved hints * Bug type annotation * Syntactic hierarchies and peer methods * Focal methods * Buggy method with location markers <ref> shows an example of augmented prompt input for a null pointer dereference bug in Java, which includes the buggy code region surrounded by location markers, containing the method with surrounding most relevant syntax hierarchies, but type annotation string, and “hints” – structurally similar bug fixes retrieved from the historic database. In the following subsections, we will describe each prompt augmentation technique and quantify its impact on bug-fixing performance by adding features incrementally. §.§ Basic Prompt The most basic prompt we can construct for the model is to provide the buggy method as input while expecting the model to generate the fix by outputting the fixed version of the given method. Thus, we perform task-oriented finetuning of our Generator model (Codex) using the buggy and fixed versions of the methods from the dataset. We compare this basic prompting and finetuning against powerful LLM baselines described in Sec. <ref>. <ref> illustrates the effect of finetuning as compared to zero-shot and few-shot variants. Demonstration learning appears to be the most successful few-shot learning strategy for adapting the Codex model () to downstream patch generation task, yielding a modest 19–25% accuracy of fixing Java bugs. Instruction learning, which also includes natural language descriptions of the downstream task in the prompt, only becomes viable as the model size increases – we repeated the instruction learning experiments with the 175 billion parameter Davinci model (), a close sibling of ChatGPT. We observe a very competitive performance with the Davinci variant, with 40–53% accuracy of fixing Java bugs via prompt augmentation alone. Task oriented finetuning, without any prompt crafting, outperforms all few-shot baselines by a good margin, showing 11–55% relative improvement of accuracy across all bug types in Java. This improvement comes at a cost of computing resources necessary to finetune the Codex model, but provide an advantage of higher accuracy and cheaper inference as compared to few-shot Davinci. §.§ Bug Type Annotations The simplest prompt augmentation step is to prepend a bug type annotation to a basic prompt consisting of a buggy method only. As shown in <ref>, this improves performance across all bug categories and languages (Java and C#) yielding 2.7–5.6% relative improvement in accuracy. §.§ Bug Localization Bug location information is crucial for accurate program repair. Infer static analyzer can localize bugs by tracking the flow of data through the program and detecting any violations of predefined rules or programming patterns. Infer static analyzer outputs a line number on which an error could occur at runtime, which, however, does not mean that the fix would require to edit this line only. In our dataset <ref>, the bugs are often spanning over multiple lines of code, having disjoint diff regions. We utilize the bug location information output by Infer in two ways: (i) we parse the source code file affected by the bug to extract a method which contains the buggy line, and (ii) we surround the buggy region with special sentinel and symbols. During training, we refine the bug location by looking at the two-way diff markers with respect to the fix. During test time, we only use the information provided by the static analyzer as the fix is unknown. <ref> demonstrates the impact of adding bug location markers in the prompt in addition to the bug type annotations. As seen, this leads to a positive effect across all categories studies, up to 3.4% relative improvement in accuracy. The effect is more pronounced for larger methods. §.§ eWASH extended context A source code file may have nested scopes and references to other external libraries or other files. To accurately suggest patches a model must leverage knowledge across different parts of the file. The length of source code files will often exceed the fixed-length window of transformer models (2048 tokens in our case), which could potentially lead to a loss of information relevant for learning to repair programs. To overcome this limitation, we utilize eWASH <cit.> to prioritize syntax hierarchies which are most relevant to the buggy snippet region. Extracting syntactic hierarchies from the entire source code files, as opposed to the tokens immediately preceding the bug location, we are able to retain most relevant code context, such as class-level fields and method arguments, and peer methods which are highly relevant to program repair. Starting with a concrete syntax tree of a source file, we organize and prioritize class-level and method-level syntactic elements such as global import statements and assigned values, class attributes, method signatures, class docstring, and global expressions in the input. Quite often, a method affected by a bug will only contain an invocation expression or a call to a method defined elsewhere in the file – what we refer to as buggy focal method. For instance, in <ref> the buggy line of code has a return statement which is composed of a chain of method invocations with and focal methods. We conjecture that retaining the focal method implementation (signature, docstring, and body) in the prompt is crucial for program repair. We utilize stack trace provided as part of the Infer bug report to determine relevant focal method name, and include it in the prompt. <ref> shows the effect of adding the eWASH syntax hierarchies and focal context in the prompt. As seen, patch generation accuracy is further improved by over 7.2–7.8% for Java and by 4.0–6.7% for C#. §.§ Enriching Context with Hints To further enrich prompts, we perform a nearest neighbor search in the retrieval database for semantically similar fixes – so called hints. The resulting fixes are then prepended to the context with an instruction string . By default, we extract and prepend 2 nearest neighbors for each query. We apply quality criteria to avoid obviously incorrect matches: (i) retrieved fixes must be of the same bug type as the query, and (ii) impose a minimum similarity threshold between retrieved fixes and a query of 60%. To focus on extracting structurally similar fixes and reduce the dependency on identifier naming we obfuscate code snippets serving as keys in the database and search queries. Namely, we parse and analyze the code identifier types and mask the names of classes, methods, and identifiers with placeholder symbols: , , and , where is a unique number. An example obfuscated representation is shown in <ref>. Table <ref> shows the improvements in bug-fixing capabilities for with prompt which incorporates retrieved hints. This prompt augmentation further improves performances by 1–2% in absolute top-1 performances. §.§ Inference The Inference step for involves utilizing nucleus sampling decoding with a top_p parameter of 1.0 and a temperature of 0.7. During this step, the tool decodes the top-10 best predictions generated by the large language model, and ranks them according to their sequence log probabilities. This ranking helps to ensure that the most likely and relevant fixes are presented to the user. The use of nucleus sampling decoding, with its specific top_p and temperature parameters, helps to balance the trade-off between diversity and quality in the generated predictions, making it possible to obtain highly accurate and diverse patch candidates. § RESULTS <ref> shows the results achieved by on the dataset compared against the LLM baselines discussed in <ref>. is able to fix between 57% and 82% of the three categories of bugs for Java and C#, just with the top-1 prediction. The performance gap between our approach and the best performing baseline (Finetuned Codex) is between 8.6% and 13% in absolute terms. It is important to keep in mind that the results shown in <ref> present a conservative estimate of 's potential for generating fixes. The percentages displayed in the table are based on generated patches that exactly match the original developer's token-by-token fix. However, there may be other candidate patches that correctly fix the bug using a different token sequence. The impressive top-1 results achieved by are critical for its efficient and effective integration into the software development cycle. With the ability to propose high-quality fixes for critical bugs, has the potential to greatly enhance the productivity and reliability of the software development process. § DEPLOYMENT The deployment of at Microsoft as part of the Azure DevOps and GitHub continuous integration pipeline (CI) has significantly improved the software development workflow for our internal projects at Developer Division. Such tight integration has enabled our software development teams to automate the bug detection and fixing process, reducing the time and effort required to manually identify and fix bugs, and ensuring that bugs are addressed quickly and accurately. <ref> provides an overview of our CI pipeline with the integrated stages. When a pull request proposing code changes is created, the CI pipeline automatically triggers three steps: (i) build, (ii) testing, and (iii) Infer (or InferSharp) static analysis. If bugs are detected, the patch generation module is invoked to propose a fix. leverages the detailed information about the bug provided by Infer, such as context, location, and classification of the bug type. The module proposes a (configurable) set of candidate patches. Each candidate patch is packaged as a separate Pull Request, which is individually validated. The validation process is seamless and reuses the three CI pipeline steps mentioned above. Specifically, the PR containing the candidate patch is validated through: (i) build – checking that the candidate patch is syntactically and semantically correct w.r.t. the source project; (ii) testing – ensuring that the candidate patch does not introduce regressions (failing tests); (iii) Infer static analysis – validating that the candidate patch actually fixes the previously detected bug. The validated fix is then provided to the developer within the feature branch of the developer's Pull Request. The complexity of these stages are abstracted away from the developer, who will simply receive a PR comment within the system they are using (GitHub or Azure DevOps). We implemented a GitHub action which receives a validated patch from and surfaces it to the developer in form of a GitHub comment in the PR. The comment provides detailed information about the bug (extracted by Infer), and the resolution (served by ). The developer has the option to accept or decline the recommended fix. The deployment of in the CI pipeline for our internal projects has provided significant benefits. Our software development teams can now focus on more important tasks, confident in the knowledge that bugs are being detected and fixed in a timely and efficient manner. We are currently in the process of expanding the number of projects that integrate into their CI pipeline, and the benefits of this integration have been demonstrated through the seamless validation process and abstracted complexity for the developer. § RELATED WORK Our approach is related to a broad set of literature on patch generation and prompting and task-oriented finetuning. We refer a reader to <cit.> for a more comprehensive overview on the prior research in the area of program repair, and <cit.> for a systematic survey of prompting methods in NLP. Patches in the Wild <cit.>, utilize supervised machine translation to learn bug-fixing patterns for various common code defects. They mine bug-fixes from the change histories of projects hosted on GitHub and define the learning task on a method level, disregarding the surrounding code context. SequenceR <cit.> improves upon the Patches in the Wild by leveraging the extended context available through the source code file containing the buggy code, showing first attempt at prompt crafting. SequenceR learning objective is based around supervised machine translation with encoder-decoder recurrent neural network. Copy That! <cit.> builds upon an observation that patches typically only affect isolated spans of tokens, leaving most tokens unchanged. By introducing a span copying decoder they improve results upon the previous state-of-the-art. While also utilizing neural machine translation, DeepDebug <cit.> leverage extensive self-supervised pretraining to improve upon the prior art. BugLab <cit.> takes a step towards self-supervised bug detection and repair, co-training two neural models: a detector model that learns to detect and repair bugs in code, and a selector model that learns to create buggy code for the detector to use as training data. CODIT <cit.> uses a tree-based model to encode source code changes, learning bug-fixing activities. Recoder <cit.> generates edits in a syntax-guided manner and with a provider/decider architecture and placeholder generation. Lutellier  <cit.> employed ensemble learning with CNNs and NMT to generate patches with CoCoNuT. DLFix <cit.> is a two-tier model with the first layer focusing on learning the context of bug fixes and the second layer trying to generate the bug-fixing patch. Recently CURE <cit.> has reported state-of-the-art results on Defects4J and QuixBugs datasets, improving over NMT-based APR techniques with the use of a pre-trained programming language model, code-aware search, and sub-word tokenization. These works are trained on generic, unclassified bugs mined from change histories of open source repositories, and do not utilize the bug type information during learning. Differently, our proposed approach take advantage of the close relationship with the Infer static analyzer tool and leverages the bug type information during the learning process to generate specific fixes tailored for that category of bugs. Additionally, none of these aforementioned papers attempted to capitalize on large language models, as well as the effectiveness of prompt augmentation methods in connections to LLMs, combined with task-oriented finetuning. Our work is also aligned with a category of research that examines pretraining strategies and prompt augmentation. <cit.> permute ordering of the spans in the original prompt to train the model to infill. Specifically, by randomly replacing spans of code with a sentinel token and moving them to the end of the sequence they yield a unified approach for both program synthesis (via left-to-right generation) and editing (via infilling). <cit.> introduce a seminal LAMA dataset providing manually curated cloze templates to probe knowledge in language models. <cit.> investigate a template-based method for exploiting the few-shot learning potential of generative pre-trained language models to sequence labeling. Specifically, they define templates such as “ is a entity”, where can be “person” and “location”, etc, and train a model using a filled template. <cit.> introduce a concept of chain of thought prompting, in which a task is broken down into a series of intermediate reasoning steps which significantly improves the ability of large language models to perform complex reasoning Our proposed approach, , performs prompt augmentation by incorporating similar fixes identified in a historical database of bugs, along with other information. The concept of leveraging similar fixes has also been explored in other approaches, such as SimFix <cit.>, which extracts frequent abstract modifications from existing patches to form an abstract space for program repair. It then analyzes similar code snippets in the same program to extract concrete modifications, which forms a concrete space. The intersection of these two spaces is used to perform fine-grained code adaptation for patch generation. Differently from the AST-differencing approach proposed in SimFix, we rely on a dense retrieval model which allows for more flexibility in identifying similar code snippets with arbitrary length, not constrained by specific AST-subtrees. Furthermore, our approach enhances the prompt by providing additional information and cues to the LLM model to facilitate the repair process. § CONCLUSION We introduced : an end-to-end program repair framework based on Codex and a state-of-the-art static analyzer designed to fix critical security and performance bugs in Java and C#. is based on a retrieval-based prompt augmentation technique and task-oriented finetuning that leverages bug-type annotations and extended source code context. We have also curated a , a novel, metadata-rich dataset of bugs extracted by executing the Infer and InferSharp static analyzers on the change histories of thousands of Java and C# repositories. Our experiments demonstrated that outperforms strong LLM baselines, reaching a top-1 accuracy of 65.6% for generating fixes in C# and 76.8% in Java on the dataset. We deployed internally at Microsoft as a GitHub action and as an Azure DevOps plugin operating as part of the continuous integration pipeline. This tool has significantly improved the software development workflow for our internal projects at Developer Division. ACM-Reference-Format
http://arxiv.org/abs/2303.07189v1
20230313153028
Optimizing Convolutional Neural Networks for Chronic Obstructive Pulmonary Disease Detection in Clinical Computed Tomography Imaging
[ "Tina Dorosti", "Manuel Schultheiss", "Felix Hofmann", "Luisa Kirchner", "Theresa Urban", "Franz Pfeiffer", "Johannes Thalhammer", "Florian Schaff", "Tobias Lasser", "Daniela Pfeiffer" ]
eess.IV
[ "eess.IV", "cs.CV", "cs.LG" ]
Transverse single-spin asymmetry of midrapidity π^0 and η mesons in p+Au and p+Al collisions at √(s__NN)= 200 GeV L. Zou March 30, 2023 ================================================================================================================= Chronic Obstructive Pulmonary Disease (COPD) is a leading cause of death worldwide, yet early detection and treatment can prevent the progression of the disease. In contrast to the conventional method of detecting COPD with spirometry tests, X-ray Computed Tomography (CT) scans of the chest provide a measure of morphological changes in the lung. It has been shown that automated detection of COPD can be performed with deep learning models. However, the potential of incorporating optimal window setting selection, typically carried out by clinicians during examination of CT scans for COPD, is generally overlooked in deep learning approaches. We aim to optimize the binary classification of COPD with densely connected convolutional neural networks (DenseNets) through implementation of manual and automated Window-Setting Optimization (WSO) steps. Our dataset consisted of 78 CT scans from the Klinikum rechts der Isar research hospital. Repeated inference on the test set showed that without WSO, the plain DenseNet resulted in a mean slice-level AUC of 0.80±0.05. With input images manually adjusted to the emphysema window setting, the plain DenseNet model predicted COPD with a mean AUC of 0.86±0.04. By automating the WSO through addition of a customized layer to the DenseNet, an optimal window setting in the proximity of the emphysema window setting was learned and a mean AUC of 0.82±0.04 was achieved. Detection of COPD with DenseNet models was optimized by WSO of CT data to the emphysema window setting range, demonstrating the importance of implementing optimal window setting selection in the deep learning pipeline. § INTRODUCTION Chronic Obstructive Pulmonary Disease (COPD) refers to a group of respiratory diseases that reduce the exchange of oxygen and carbon-dioxide in the lung. COPD chronically impairs the structure of the lung by narrowing the airways and damaging the air sacs. One of the common diseases associated with COPD is emphysema, which is most often observed in smokers <cit.>. Although disease progression can be prevented with early detection, COPD is among the leading causes of death worldwide, with 3.23 million deaths recorded across the globe in 2019 <cit.>. In addition to increased mortality rates in direct correlation with the disease, patients with COPD are likely to develop comorbid diseases, such as cardiovascular diseases, mental disorders, and other respiratory diseases <cit.>. Furthermore, with respect to the recent outbreak of the Severe Acute Respiratory Syndrome Coronavirus type 2 (SARS‑CoV‑2) in 2019 and the associated Coronavirus disease (COVID-19), current research suggests that all-cause mortality risks are higher for individuals with COPD preconditions <cit.>,<cit.>. With early detection and intervention, the prevalence and negative impacts of COPD can be decreased <cit.>. A readily-available procedure for the detection of COPD is the spirometry test, whereby a measure of forced exhalation volume less than a reference value is indicative of COPD. The Global Initiative for Chronic Obstructive Lung Disease (GOLD) committee has defined a four-stage progression scale for the diagnosis of COPD based on spirometry measurements, staging from mild (I) to very severe (IV) <cit.>. Although spirometry reliably detects advanced stages of COPD, results for patients at an early stage of COPD can still be negative despite the presence of chronic symptoms, such as a persistent cough and shortness of breath <cit.>,<cit.>. Moreover, patients categorized in the same GOLD stage have shown drastic morphological differences in the lung structure <cit.>. X-ray Computed Tomography (CT) scanning of the chest is an alternative method for the detection of COPD. Chest CT scans provide detailed three-dimensional morphological information about the lung structure. Each volume element is characterized by its Hounsfield Unit (HU) value, a measure of the local attenuation coefficient for X-rays. The three-dimensional information obtained about phenotypic abnormalities and pattern of morphological changes reflecting emphysema allows for detection and control of disease progression even in early stages. In 2015, the Fleischner Society introduced a disease progression scale based on pattern of abnormalities present in CT data that correspond to COPD and emphysema sub-types <cit.>. In recent years, large scale studies with publicly-available datasets, such as the Evaluation of COPD Longitudinally to Identify Predictive Surrogate End-points (ECLIPSE) and the COPDGene study, have been carried out to investigate the association of COPD with biomarkers, genetic risk factors, and epidemiologic indicators <cit.>,<cit.>. In parallel, improvements in computation power and machine learning algorithms have made Convolutional Neural Networks (CNN) a popular tool for automated classification and detection tasks in medical imaging. CNNs are a specialized case of machine learning algorithms that can extract features from image data and are often applied to computer vision tasks <cit.>. Consequently, with rising prevalence of COPD, large imaging datasets, and technological advancements in the field of machine learning, CNNs have been applied to automate binary classification of COPD and have shown promising results <cit.>,<cit.>,<cit.>,<cit.>. However, model outcomes are still not ready for integration into a computer-aided clinical workflow for efficient and cost-effective COPD diagnosis. CNN research in other areas of medical data analysis, such as e.g. intracranial hemorrhage classification, has shown that the incorporation of clinically-relevant steps in the model workflow can improve the output. In particular, it was found that optimizing clinical window-setting parameters of input CT images greatly affects the output quality. <cit.>,<cit.>,<cit.>. Since the extant literature on COPD detection using CNNs predominantly focuses on fine-tuning deep learning algorithms, the potential of implementing preprocessing steps to more closely adapt clinical workflow processes has thus far not been explored in detail. Furthermore, relevant literature mainly benefits from the ECLIPSE and COPDGene study datasets, where ground truth labels for the scans are given on the GOLD standard progression scale, instead of the phenotypic-relevant scale introduced by the Fleischner Society <cit.>,<cit.>,<cit.>,<cit.>. In this work, we aim to optimize the detection of COPD based on emphysema presence in the lung with densely connected CNNs (DenseNets). We adapted a routine clinical-workflow procedure for a total of 78 chest CT scans obtained from the Klinikum rechts der Isar research hospital of the Technical University of Munich. In doing so, the effects of manually-adjusted versus automated window-setting optimization on the binary classification task for differentiation between healthy and COPD patient slices were explored in detail. Our findings demonstrate that diligent preprocessing based on existing radiological knowledge, as well as selecting phenotypically representative ground truth labels positively impact the outcome of COPD detection with CNN models. § METHODS §.§ Dataset A total of 78 patients with contrast enhanced chest CTs were retrospectively selected from our picture archiving and communication system at the Klinikum rechts der Isar research hospital between October, 2018 and December, 2019. CT scans included those of patients suffering from different COPD stages (n = 43) and healthy controls (n = 35). Scans that presented conditions or pathologies that did not correspond to COPD, yet could influence lung parenchyma, such as pulmonary congestion or lung cancer, were excluded in the selection process. Imaging was carried out with an IQon Spectral CT scanner (Royal Philips, Netherlands). The CT scans were first anonymized and then graded by three expert radiologists with four to 12 years of experience. Patient-level grading was based on the six Fleischner Score (FS) categories of absent (FS = 0), trace (FS = 1), mild (FS = 2), moderate (FS = 3), confluent (FS = 4), and advanced destructive (FS = 5) emphysema, as per Fleischner society's statement <cit.>. Scans with FS > 2 were considered as the COPD class for our binary classification task. Patients at a moderate COPD stage exhibit many defined areas of low attenuation in the CT scan covering over 5% of the lung region <cit.>. Therefore, to distinguish slices presenting COPD from other slices, CT scans with an FS = 3 were further annotated on slice-level basis by a radiologist not involved in the initial FS grading process. Datasets were selected on slice-level basis as such: Training and validation sets each included 3,392 and 1,114 slices, respectively. A total of 2,688 slices were reserved for the test set. All sets contained equal number of slices from the COPD and the no COPD class. §.§ Data preprocessing As an initial preprocessing step, each slice was multiplied by its corresponding lung segmentation mask, generated with a commercially available software (IntelliSpace, Royal Philips, Netherlands). The 256x256 pixel images were clipped to the respective window setting and normalized to values between zero and one. A window setting is given by the window width and the window level (WW, WL) in HU as standardized by radiologists. Note that the WL defines the mid-point value of a window setting. Here, the emphysema window (124, -962) HU was used to clip the CT images for classification of COPD. Furthermore, a ’full-range’ windowing (2048, 0) HU was applied to introduce a base-line intensity range for all slices. The (WWfull-range, WLfull-range) values were set based on the minimum, -1024 HU, and the maximum, 966 HU, intensity values recorded over all slices. <ref> shows an example slice from the no COPD class in (a, b), and a slice from the COPD class in (c–f). The slices were preprocessed to the full-range window setting in <ref>(a, c, e) and to the emphysema window setting in (b, d, f). The nonhomogeneous patches of low attenuation corresponding to emphysema are emphasized with a stronger contrast in <ref>(d) compared to the full-range window setting in <ref>(c). §.§ Implementation of DenseNets Three DenseNets with minor differences in their architectures and training process were compared to examine the effects of window setting on COPD detection. The models were implemented with the TensorFlow platform (version 2.4.0) <cit.>. §.§.§ Plain DenseNet The DenseNet with 121 layers (plain DenseNet) was chosen as it has been shown to outperform other CNNs such as VGGNet, AlexNet, ResNet, and DenseNet201 for COPD classification <cit.>. <ref> depicts the architecture of the DenseNet model used in this work as introduced by <cit.> with a growth rate of 32. All models were compiled with a binary cross entropy loss and the Adam optimizer <cit.>. Early stopping and reduced learning rate were scheduled for the training process over 50 and 15 epochs respectively. A learning rate of 0.01 was initially set and reduced by a factor of 10 after 15 epochs if the validation loss did not reduce. The aforementioned parameters were set empirically. To analyze the influence of preprocessed input slices to different window settings on classification of COPD, the plain DenseNet model was trained and tested on images linearly clipped to the full-range and the emphysema window settings. §.§.§ DenseNet with Added Window-Setting Optimization Layer (DenseNetWSO) A window-setting optimization (WSO) layer was added to the aforementioned DenseNet as suggested by <cit.>. Both a Rectified Linear Unit (ReLU) function and a sigmoid function were initially considered for the WSO layer. The ReLU variant consistently outperformed the sigmoid variant for the validation set. Therefore, only DenseNetWSO models with a ReLU activation function in the WSO layer are considered here. As depicted in <ref>, the WSO layer consisted of a 1x1 convolution layer followed by a ReLU activation function. The ReLU hereby acts as a windowing function, trained to find an optimal window setting for the classification task. The WW and WL values were related to the learnable weight (w) and bias (b) parameters of the ReLU function, taken from <cit.> with correction, f_ReLU(x) = max(min(wx+b, U), 0), wherew=U/WW, b=U/WW(WW/2 - WL). The parameter U sets the upper bound for the ReLU windowing function. Therefore, to achieve learned window settings that range between zero and one, the upper limit was set to U = 1. The DenseNetWSO model was trained to converge to an optimal window setting after being initialized to the full-range and the emphysema window settings, while simultaneously adjusting learnable parameters of the DenseNet block for classification of COPD. Initialization of the WSO layer was carried out by defining the learnable parameters for each window setting respectively. To do so, all input slices for DenseNetWSO were given in the full-range window setting and normalized. The optimal window settings learned by the model were calculated using (<ref>). All other architectural elements and training processes were identical to that of the plain DenseNet. §.§.§ DenseNetWSO with Sequentially Trained WSO Parameters (DenseNetFNF) The learned window setting by the DenseNetWSO model after initialization to the full-range window setting exhibited large standard deviations over seven runs, as described in <ref>. In an attempt to stabilize the learned window setting over all runs, the DenseNetWSO model was first trained with the learnable parameters from the WSO layer, w and b, frozen. In doing so, the clipping parameters from the WSO layer were fixed to the initialized settings. Then, the model was further trained with the WSO layer unfrozen, which allowed its parameters to adjust for the optimal window setting. Additionally, the same model was trained continuously for a third round, again with the learnable parameters of the WSO layer frozen. We refer to this sequence of training with frozen, not-frozen, and frozen (FNF) WSO layer learnable parameters as DenseNetFNF. Similar to DenseNetWSO, all input slices for DenseNetFNF were clipped to the full-range windowing and normalized. All other architectural elements and training processes were identical to that of the plain DenseNet. §.§ Evaluation Metrics Training was repeated seven times and each run was inferred on once with the test data. The Receiver Operating Characteristics (ROC) curve, and area under the ROC curve (AUC) were used to assess the performance of DenseNet models with different window settings on the binary classification task. As the AUC utilizes different threshold choices, this metric was considered over the conventional accuracy metric. Additionally, for smaller sample sizes, the choice of maximizing for sensitivity or (1-specificity) becomes ambiguous since there is an inherent trade-off between the two parameters. Therefore, the AUC value was taken as the evaluation metric to resolve any ambiguities based on the choice of threshold by providing the highest value for the best observer while independent of the choice of a threshold <cit.>. The Scikit-learn library (version 1.2.0) was used to generate the ROC curves, choose optimal thresholds for each curve, and calculate the respective AUC values <cit.>. § RESULTS This section presents the classification results of the three DenseNet variants. §.§ Manually-adjusted WSO Using the plain DenseNet model, slice-level ROC plots with corresponding AUC values were compared between full-range and emphysema window settings in <ref>. Since the test set had balanced slices from both classes of no COPD and COPD, the chance diagonal was used as a visual guide to mark the AUC value of 0.5. We see in <ref> that clipping data to emphysema window setting allows the model to consistently achieve better results (mean AUC = 0.86±0.04) in comparison to the full-range window setting (mean AUC = 0.80±0.05). The single highest AUC value of 0.91 corresponded to the plain DenseNet model with the input slices preprocessed to the emphysema window setting. §.§ Automatically-adjusted WSO The window-setting values in <ref> correspond to the mean and standard deviation values for WW and WL over the seven runs of each arrangement. The information in <ref> is independent of the inference data set, as the learned window-setting values are fixed model-specific parameters after a completed training run. The learned WW and WL parameters were calculated from the weights and bias values of the WSO layer using (<ref>). <ref> shows the learned and the corresponding initialization window setting for each WSO model. Note that the window settings used for initialization of WSO models were the same as the parameters used for clipping the inputs to the plain DenseNet. < g r a p h i c s > figureROC plots and AUC values show inference on slice-level test data for each run of the plain DenseNet for input data clipped to full-range and emphysema window settings. < g r a p h i c s > figureThe full-range and the emphysema window settings (green) plotted against the mean learned window setting with standard deviation over seven runs for DenseNetWSO (blue) and DenseNetFNF (orange). Note, the standard window settings were used to clip the inputs to the plain DenseNet model, and also to initialize the DenseNetWSO and DenseNetFNF models. Exact values for window settings are provided in <ref>. tableFull-range and emphysema window setting parameters in comparison to windowing parameters optimized by the DenseNetWSO and DenseNetFNF models. The learned window setting values are given as the mean and standard deviation values over seven runs for each model. Window setting (model) Full-range (WW, WL) HU Emphysema (WW, WL) HU Standard (Plain DenseNet) (2048, 0) (124, -962) Learned (DenseNetWSO) (1301 ± 676, -373 ± 338) (90 ± 13, -979 ± 6) Learned (DenseNetFNF) (993 ± 337, -528 ± 169) (114 ± 37, -967 ± 19) We notice a shift towards the lower end of the HU range in all learned window settings, as given by <ref> and <ref>. The mean learned WL decreased more drastically for models initialized to the full-range window setting. The observed trends suggest a convergence towards the standard emphysema window setting for the learned WW and WL parameters by both DenseNetWSO and DenseNetFNF when initialized to the full-range window setting. Between the two models, DenseNetFNF learned a window setting closer to the emphysema window setting regardless of initialization window setting. However, when initialized to the full-range window, the DenseNetFNF arrived at the mean WW and WL parameters over seven runs with less deviation in comparison to when the model was initialized to the emphysema window. Overall, we see that when the learned window setting is closer to the standard emphysema window, the better mean AUC values are achieved. <ref> and <ref> depict the ROC curves for DenseNetWSO and DenseNetFNF models respectively. We observe that initialization to emphysema windowing results in more consistent AUC values over seven runs compared to the full-range window setting for the DenseNetWSO model. Conversely, for the DenseNetFNF model, initialization to the full-range window generates more consistent AUC values over seven runs compared to the emphysema window setting. These results are in agreement with the standard deviation values given in <ref>. The highest AUC value achieved between the DenseNetWSO and the DenseNetFNF models was 0.91. This corresponded to the emphysema window setting initialization for the DenseNetFNF model. §.§ Optimal Window Setting for COPD Detection The mean AUC values for all model and window setting combinations for inference on the same test set are provided in <ref>. Overall, the plain DenseNet with input slices initialized to the emphysema window setting resulted in the best mean AUC value at 0.86±0.04 over all runs. Implementation of the WSO layer in DenseNetWSO and DenseNetFNF models did not drastically enhance the AUC compared to the results obtained with the plain DenseNet. Taking the plain DenseNet model with full-range input images as baseline, the DenseNetFNF model generated slightly better AUC values when initialized to either window setting. However, The most optimal window setting for the COPD detection task was the standard emphysema window setting of (124, -962) HU and not a window setting learned by either of the automated WSO models. § DISCUSSION Results in <ref> indicate that adjusting input slices to different window settings directly impacts the binary classification of COPD. Looking closer at the plain DenseNet model, clipping the input data to different window settings influenced the AUC values: with AUC values for the plain DenseNet model for full-range input data as baseline, when the input was clipped to the emphysema window, the AUC values increased from 0.80 to 0.86. The AUC values for the DenseNetWSO model in <ref> suggest the shortcoming of the model in simultaneously detecting COPD and converging to optimal windowing parameters when initialized to the full-range window setting. Furthermore, the windowing parameters learned with this setup suffered from large standard deviations between the seven runs, as seen in <ref>. Lower standard deviations in learned window settings were observed when the WSO layer was trained with periodically frozen learnable parameters, as implemented in DenseNetFNF initialized to the full-range window setting. Through automatic WSO, only minimal improvement in AUC value was observed with the DenseNetWSO and the DenseNetFNF models initialized to emphysema window setting, in comparison to the baseline. The window settings learned by these two models were in the vicinity of the standard emphysema window at the lower ranges of the HU scale. However, neither DenseNetWSO nor DenseNetFNF outperformed the mean AUC values obtained with the plain DenseNet model with images clipped to the standard emphysema window setting. A possible explanation is that although the single WSO layer was effective in converging to the optimal emphysema window setting, it was not sufficiently complex for the task of optimal window setting selection. The standard emphysema windowing is tailored to present high contrast between healthy and emphysematous tissue in the lung. Therefore, as the ground truth labels for our dataset were graded based on the severity of emphysema, the results were in line with the hypothesis that slices clipped directly to the standard emphysema windowing, or automatically clipped with the WSO layer to learned window-setting parameters in the proximity of standard emphysema window, would improve classification of COPD with DenseNets. Optimizing for window setting as a means of increasing contrast in slices was effective for the detection task because the Fleischner Score (FS) ground-truth labels were directly based on disease-relevant morphological changes in the lung. Therefore, for models trained with spirometry-based GOLD standard COPD stages as ground truth label for lung CTs, adjusting input data based on window setting could potentially not be as effective. Utilizing FS as ground-truth labels also enabled us to achieve comparable results to related works in the literature, despite our use of a considerably smaller dataset <cit.>,<cit.>,<cit.>. The main limitation of this work was its small dataset, giving rise to intra-slice correlation for slice-level evaluations. Additionally, all patients were examined at the same hospital. Extendability of our findings to a larger, more diverse dataset should be further explored. In the context of COPD, future works could further explore categorical classification of the disease based on the progression scale introduced by the Fleischner society. We showed that optimizing for a task-specific window-setting improved CNN outcome by enhancing disease-relevant information from the input data. Our findings can be extended to a range of computer vision tasks in medicine focusing on X-ray and CT data. Specifically, when disease relevant window settings are commonly used by radiologists, that information can be extended to the deep learning pipeline. § CONCLUSION Our results demonstrate the importance of incorporating the common clinical workflow process of window setting selection for CT scans in the CNN pipeline for binary classification of COPD. Specifically, preprocessing CT images to emphysema window setting improved the plain DenseNet model's performance. Furthermore, we showed that when information regarding the optimal window setting for classification of COPD is unknown, learning an optimal windowing through the addition of a WSO layer with the DenseNetFNF model would result in higher AUC values in comparison to training a plain DenseNet model with full-range normalized slices. 00 Vogelmeier2017 C. F. Vogelmeier et al., “Global Strategy for the Diagnosis, Management, and Prevention of Chronic Obstructive Lung Disease 2017 Report. GOLD Executive Summary,” Am. J. Resp. Crit. Care. Med.., vol. 195, no. 5, pp. 557–582, Mar. 2017. Accessed on: Aug. 17, 2022, DOI: 10.1164/RCCM.201701-0218PP, [Online]. WHO2022 World Health Organization. (2022, May. 20). Fact sheets: Chronic Obstructive Pulmonary Disease (COPD). Geneva, Switzerland. May 20, 2022. [Online]. Available: https://www.who.int/en/news-room/fact-sheets/detail/chronic-obstructive-pulmonary-disease-(copd). Accessed on: Aug. 18, 2022. Mannino2007 D. M. Mannino and S. Braman, “The epidemiology and economics of chronic obstructive pulmonary disease,” in Proc. Am. Thorac. Soc.., vol. 4, no. 7, pp. 502–506, Oct. 2007, Accessed on: Aug. 17, 2022, DOI: 10.1513/pats.200701-001FM, [Online]. Zhao2020 Q. Zhao et al., “The impact of COPD and smoking history on the severity of COVID-19: A systemic review and meta-analysis,” J. Med. Virol.., vol. 92, no. 10, pp. 1915–1921, Oct. 2020. Accessed on: Aug. 17, 2022, DOI: 10.1002/JMV.25889, [Online]. Halpin2021 D. M. G. Halpin et al., “Global Initiative for the Diagnosis, Management, and Prevention of Chronic Obstructive Lung Disease. The 2020 GOLD Science Committee Report on COVID-19 and Chronic Obstructive Pulmonary Disease ,” Am. J. Resp. Crit. Care. Med.., vol. 203, no. 1, pp. 24–36, Jan. 2021. Accessed on: Aug. 18, 2022, DOI: 10.1164/RCCM.202009-3533SO, [Online]. Grenier2020 P. A. Grenier. “Emphysema at CT in Smokers with Normal Spirometry: Why It Is Clinically Significant,”  Radiology., vol. 296, no. 3, pp. 650–651, Jul. 2020. Accessed on: Aug. 18, 2022, DOI: 10.1148/RADIOL.2020202576, [Online]. Lynch2015 D. A. Lynch et al., “CT-Definable Subtypes of Chronic Obstructive Pulmonary Disease: A Statement of the Fleischner Society,”  Radiology., vol. 277, no. 1, pp. 192–205, Oct. 2015. Accessed on: Aug. 18, 2022, DOI: 10.1148/radiol.2015141579, [Online]. copdGeneStudy E. A. Regan et al., “Genetic epidemiology of COPD (COPDGene) study design,” COPD., vol. 7, no. 1, pp. 32–43, Feb. 2010. Accessed on: Aug. 18, 2022, DOI: 10.3109/15412550903499522, [Online]. Vestbo2008 J. Vestbo et al., ”Evaluation of COPD Longitudinally to Identify Predictive Surrogate End-points (ECLIPSE),”  Eur. Respir. J.., vol. 31, no. 4, pp. 869–873, Apr. 2008. Accessed on: Aug. 18, 2022, DOI: 10.1183/09031936.00111707, [Online]. Lecun2015 Y. Lecun, Y. Bengio, and G. Hinton, ”Deep learning,” Nature., vol. 521, no. 7553, pp. 436–444, May 2015. Accessed on: Aug. 18, 2022, DOI: 10.1038/nature14539, [Online]. Ho2021 T. T. Ho et al., “A 3D-CNN model with CT-based parametric response mapping for classifying COPD subjects,”  Sci. Rep.., vol. 11, no. 1, pp. 1–12, Jan. 2021. Accessed on: Aug. 18, 2022, DOI: 10.1038/s41598-020-79336-5, [Online]. Gonzalez2018 G. Gonzalez et al., “Disease Staging and Prognosis in Smokers Using Deep Learning in Chest Computed Tomography,” Am. J. Resp. Crit. Care. Med.., vol. 197, no. 2, pp. 193–203, Jan. 2018. Accessed on: Aug. 18, 2022, DOI: 10.1164/RCCM.201705-0860OC., [Online]. Tang2020 L. Y. W. Tang, H. O. Coxson, S. Lam, J. Leipsic, R. C. Tam, and D. D. Sin, ”Towards large-scale case-finding: training and validation of residual networks for detection of chronic obstructive pulmonary disease using low-dose CT,” Lancet Digit. Health., vol. 2, no. 5, pp. e259–e267, May 2020. Accessed on: Aug. 18, 2022, DOI: 10.1016/S2589-7500(20)30064-9, [Online]. Zhang2022 L. Zhang, B. Jiang, H. J. Wisselink, R. Vliegenthart, and X. Xie, ”COPD identification and grading based on deep learning of lung parenchyma and bronchial wall in chest CT images,” Br. J. Radiol.., vol. 95, no. 1133, May 2022. Accessed on: Feb. 03, 2023, DOI: 10.1259/bjr.20210637, [Online]. Kloenne2020 M. Kloenne et al., ”Domain-specific cues improve robustness of deep learning-based segmentation of CT volumes,”  Sci. Rep.., vol. 10, no. 1, pp. 1–9, Jul. 2020. Accessed on: Aug. 18, 2022, DOI: 10.1038/s41598-020-67544-y, [Online]. Lee2018 H. Lee, M. Kim, and S. Do. (Dec. 2018). ”Practical window setting optimization for medical image deep learning.” Presented at  NIPS. [Online]. Available: https://arxiv.org/abs/1812.00572. Wang2021 X. Wang et al., ”A deep learning algorithm for automatic detection and classification of acute intracranial hemorrhages in head CT scans,”  Neuroimage. Clin.., vol. 32, pp. 1–10, Jan. 2021, Accessed on: Aug. 18, 2022, DOI: 10.1016/J.NICL.2021.102785, [Online]. TensorFlow M. Abadi et al., “TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems,” 2015. Accessed on: Aug. 29, 2022, Available: https://www.tensorflow.org/, [Online]. Hegel2021 M. Hegel, ”Classification of Chronic Obstructive Pulmonary Disease in Clinical X-Ray Compute Tomography using Deep Learning Techniques,” M.S. thesis, Info., Tech. Uni. Munich, Munich, Germany, 2021. Huang2018 G. Huang, Z. Liu, L. Van Der Maaten, and K. Q. Weinberger, ”Densely Connected Convolutional Networks,” in  Proc. IEEE CVPR, Honolulu, HI, USA, 2017, pp. 2261–2269. Kingma2014 D. P. Kingma and J. L. Ba. (Dec. 2015). ”Adam: A Method for Stochastic Optimization.” Presented at  ICLR. [Online]. Available: https://arxiv.org/abs/1412.6980. Ruiz2018 Medium: Towards data science. (2018, Oct. 10). Understanding and visualizing DenseNets. [Online]. Available: https://towardsdatascience.com/understanding-and-visualizing-densenets-7f688092391a. Accessed on: Jan. 02, 2022. Chakrabotry2018 D. P. Chakraborty, “Modeling the binary task,” in Observer Performance Methods for Diagnostic Imaging. Boca Raton, FL, USA: CRC Press, 2021, ch. 3, sec. 9-12, pp. 47–57. Scikit-learn F. Pedregosa et al., “Scikit-learn: Machine Learning in Python,” JMLR., vol. 12, pp. 2825–2830, 2011. Accessed on: Aug. 29, 2022, Available: https://scikit-learn.org/, [Online].
http://arxiv.org/abs/2303.06712v1
20230312172835
Improved refrigeration in presence of non-Markovian spin-environment
[ "Aparajita Bhattacharyya", "Ahana Ghoshal", "Ujjwal Sen" ]
quant-ph
[ "quant-ph" ]
Harish-Chandra Research Institute, A CI of Homi Bhabha National Institute, Chhatnag Road, Jhunsi, Prayagraj 211 019, India We explore a small quantum refrigerator consisting of three qubits each of which are kept in contact with an environment. We consider two settings: one is when there is necessarily transient cooling and the other is when both steady-state and transient cooling prevail. We show that there can be significant advantages than the Markovian environments case for both these settings in the transient regime and also in equilibrium if we replace the bath attached to the cold qubit by a non-Markovian reservoir. We also consider refrigeration with more than one non-Markovian bath of the three-qubit refrigerating device. Curiously, a steady temperature is reached only if there are at least two Markovian environments, although there are distinct envelopes of the temperature oscillations in all cases. We compare the device connected to one or more non-Markovian reservoirs with the case of all Markovian environs, as also with two- and single-qubit self-sustained devices connected to one or more non-Markovian baths. We propose a measure to quantify the amount of non-Markovianity in the systems. Finally, the refrigerator models are studied in presence of Markovian noise, and we analyse the response on the refrigeration of the noise strength. In particular, we find the noise strength until which refrigeration remains possible. Improved refrigeration in presence of non-Markovian spin-environment Aparajita Bhattacharyya, Ahana Ghoshal, Ujjwal Sen March 30, 2023 ==================================================================== § INTRODUCTION The onset and flourishing of quantum thermodynamics <cit.> has sustained the arena of quantum thermal devices, which in turn has gained utmost importance in the advancement of quantum technologies and in particular, for the miniaturisation of quantum circuits. In the last few decades, the achievement in designing quantum heat engines and quantum refrigerators <cit.>, quantum diodes <cit.>, quantum thermal transistors <cit.>, quantum batteries <cit.> has built the backbone of quantum technologies, which aims to enhance the efficiencies of quantum devices over their classical counterparts <cit.>. The confluence of quantum thermodynamics with many-body physics <cit.>, quantum information theory <cit.>, statistical and solid-state physics <cit.> have triggered the implementations of quantum devices in experiments using superconducting qubits <cit.>, mesoscopic substrates <cit.>, ionic systems <cit.>, nuclear magnetic resonance <cit.>, etc. The performance of such devices is evidently controlled by thermal baths or environments connected to the machinery setup, and the dynamics of the device components are driven by the open quantum evolutions <cit.>. The thermal baths, that influence the efficiency of performance of the devices, can either be Markovian or non-Markovian depending on the validity of Born-Markov approximations <cit.>. In general, the efficiencies of quantum thermal devices immersed in Markovian <cit.> environments are computable and the dynamics of the machinery components can be efficiently handled. Most of the thermal baths, however, reside in a non-Markovian family and therefore makes the realistic situations different from the ideal Markovian dynamics. There exists a significant body of work on quantum thermal machines operating under more than one thermal baths, which are either all Markovian <cit.> or all non-Markovian <cit.>. The miniaturisation of technologies has acquired a considerable momentum with the introduction of the concept of quantum absorption refrigerators by Linden et al. in <cit.>. The devices consist of a small number of qubits <cit.> and/or qudits <cit.> which are driven by local Markovian baths attached to the respective subsystems and a local cooling of one of the qubits, named as the cold qubit, can be attained. The absorption refrigerators are self-contained refrigerators, that usually operate in the absorption region, where no external energy is required for the cooling process <cit.>. The dynamics of the device components is regulated to transfer thermal energy from a cold to a hot bath with the aid of a third heat bath, known as the work reservoir, both in the steady and in the transient regimes, in order to decrease the cold qubit's temperature with respect to its initial temperature. To put it in another way, maintaining the state of the cold qubit in the currently accessible ground state allows the cooling of the qubit which is achieved by lowering the system's local temperature. Along with theoretical advancements, the implementation of quantum absorption refrigerators in quantum few-level systems have been devised by employing quantum dots <cit.>, atom-cavity systems <cit.> and circuit QED architectures <cit.>. Recently, three trapped ions <cit.> have also been used to construct a quantum absorption refrigerator. These refrigerators are anticipated to be helpful in instances where in-situ, on-demand cooling of systems as small as a qubit may be necessary without the need of external energy transfer and faster than the qubit's equilibriation time with a heat bath. The aforementioned works on quantum absorption refrigerators are mostly investigated in Markovian environments. Naturally, the efficiency of performance of the devices may be altered when connected with non-Markovian baths. In practical situations, most of the environments exhibit non-Markovian behaviour. In order to belong to the Markovian family, the thermal baths must be infinitely large and have a continuous energy spectrum <cit.>. The bosonic bath, consisting of an infinite number of harmonic oscillators, within certain constraints, behaves as a Markovian one. Most of the common baths, such as spin-baths <cit.>, are not Markovian. A few non-Markovian baths have Markovian limits, while for others, such as the spin star model, such a limit is evasive <cit.>. As Markovian nature of a thermal bath is, in general, far from the realistic scenario, it is important to study the effect of non-Markovianity on the refrigeration process. Sometimes, the situation may be more complex, in that while some of the thermal environments connected locally to the device components are Markovian, and the rest are not so. For such mixed local environments, the sub-systems of the machinery setup evolve under a combination of local Markovian and non-Markovian dynamics <cit.>. Such situations can arise, e.g. while considering hybrid systems like atom-photon arrangements. To discuss the non-Markovian effects on refrigeration, it is necessary to detect and quantify non-Markovianity of the system dynamics. There are a variety of non-Markovianity measures <cit.>, that are not all analogous. Two widely used measures were proposed by Breuer-Laine-Pillo (BLP) <cit.> and Rivas-Huelga-Plenio (RHP) <cit.>, that use non-monotonicity in time-evolution of state distinguishability and system-auxiliary entanglement respectively. For more works on non-Markovianity measures, see e.g. <cit.>. In this paper, we consider a few-qubit refrigerator where each qubit is connected with a local reservoir, and look at the effect of substituting each Markovian reservoir by a non-Markovian one. The Markovian baths are considered to be bosonic in nature, interacting with the appropriate qubits via Markovian qubit-bath interactions. When the Markovian baths are replaced by non-Markovian spin-baths, the model is found to be advantageous over the complete Markovian scenario, which we call the “ideal" case. Along with three-qubit refrigerator models, with one or more non-Markovian reservoirs, producing advantages over the Markovian baths setting, we also, for comparison and completeness, consider single- and two-qubit self-sustained thermal devices kept in contact with one or more spin-baths, which in certain situations also exhibit refrigeration. Subsequently, we propose a measure of non-Markovianity in these devices. Finally, since noise permeates all practical implementations of quantum machines, the three-qubit refrigerator is analysed in presence of several Markovian noise models. The remainder of the paper is arranged as follows. The relevant information necessary to formulate the problem is discussed in Sec. <ref>. This includes establishing the system Hamiltonian, the initial state, and providing a formal definition of local temperature of the individual qubits. In Section <ref>, we analyse the interaction of the system with the Markovian and non-Markovian baths with a detailed description of the system operators. In Sec. <ref>, there is given a quantifier of non-Markovianity and its comparison with the well-known RHP measure. Sec. <ref> illustrates the operation of the refrigerator in presence of noise. Finally, the concluding remarks are presented in Sec. <ref>. § QUANTUM ABSORPTION REFRIGERATOR A quantum absorption refrigerator usually comprises of three interacting qubits locally connected with three Markovian thermal baths B_1^M, B_2^M and B_3^M respectively, where the superscripts M stands for Markovian environments. The first qubit is the one to be cooled, often termed as the cold qubit, while the second and third qubits perform the refrigeration <cit.>. The Hamiltonian of the three-qubit system is represented as H_S=H_loc+H_int, where H_loc represents the local Hamiltonian of the three individual qubits and H_int describes the interaction between the qubits. The H_loc and H_int are respectively considered to be H_loc=K/2∑_i=1^3 E_i σ_i^z, H_int=Kg(|010⟩⟨101|+|101⟩⟨010|). Here |1⟩_i and |0⟩_i are the ground and excited states of the i^th qubit, having energies -K E_i/2 and K E_i/2 respectively, where K is an arbitrary constant having the unit of energy. {E_i} are dimensionless quantities and g is the dimensionless interaction strength. σ_i^z stands for the z-component of the Pauli matrices, σ⃗_⃗i⃗(σ_i^x,σ_i^y,σ_i^z), for i^th qubit. The individual qubits are connected with local heat baths of temperatures τ_1, τ_2 and τ_3 respectively, where τ_1 ≤τ_2 ≤τ_3. τ_2 is initially chosen to be at room temperature. Note that, τ_1, τ_2 and τ_3 are dimensionless temperatures with the actual temperatures τ̃_1, τ̃_2 and τ̃_3, defined as τ_1=k_Bτ̃_1/K, τ_2=k_Bτ̃_2/K and τ_3=k_Bτ̃_3/K respectively, where k_B is the Boltzmann constant. To construct a self-contained refrigerator, which can operate autonomously independent of any external source, a special choice of the energy of the qubits, E_1+E_3=E_2, has to be taken <cit.>. Additionally, we also set the first qubit to remain at room temperature initially, i.e., τ_1=τ_2. At t=0, where t being the dimensionless time with the actual time t̃ representing as t=K t̃/ħ, we start with the situation where the three qubits are separately in thermal equilibrium with the three reservoirs locally connected to them. So, the initial state of the three-qubit system is given by ρ_0=ρ_0^1 ⊗ρ_0^2 ⊗ρ_0^3. Here ρ_0^i=Z_i^-1exp(-β_i E_i σ_i^z/2), where Z_i is the partition function for the i^th qubit represented by Z_i=Tr[exp(-β_i E_i σ_i^z/2)] and β_i is the corresponding dimensionless inverse temperature given by β_i=1/τ_i. After turning on the interaction between the qubits for t>0, the system undergoes a time evolution governed by the quantum master equation of the Lindblad form <cit.> ∂ρ_s(t)/∂ t =ℒ(ρ_s(t))= -i/K[H_S,ρ_s(t)] +∑_i=1^3 ħ/K𝒟_i(ρ_s(t)), where ρ_s(t) is the reduced state of the three-qubit system at time t and 𝒟_i(ρ_s(t)) comes from the decoherence effects of the i^th bath. The form of 𝒟_i(ρ_s(t)) solely depends on the type of the i^th bath connected to the systems and it may have different forms for Markovian and non-Markovian environments. One point is to be borne in mind that, initially, the density matrices of the three reduced subsystems are diagonal in the eigenbasis of H_loc. As the Markovian baths do not generate coherence, the local subsystems ρ_i(t)=Tr_j,k(ρ_s(t)), j,k i [i,j,k ∈{1,2,3}], also remain diagonal at a later time t. This helps us to define a local temperature for the qubits. Let the reduced state of the first qubit after time development be ρ_1(t)=r_1(t) |0⟩⟨0| +[1-r_1(t)]|1⟩⟨1|, where r_1(t) is the population in the ground state at time t, given by r_1=Z_1^-1exp (-E_1/2 T_1(t)). T_1(t) being the dimensionless local temperature of the cold qubit at time t, with the actual temperature T̃_1(t) represented as T_1(t)=k_B T̃_1(t)/K=E_1[ ln( 1-r_1(t)/r_1(t)) ]^-1. The temperatures of the remaining two qubits can also be defined in a similar fashion. The definition of local temperatures for any qubit is based on the population of ground and excited states of the system. Decrease in temperature is here manifested as an increase in the ground state population. In all further discussions, temperatures and time indicate the corresponding dimensionless temperature and time defined above. For proper refrigeration to occur, the local temperature of the cold qubit is to be sufficiently reduced than its initial temperature, i.e., T_1(t)<τ_1, during the evolution of the system in presence of the heat baths, until it attains a steady or canonical equilibrium state. If the temperature of the cold qubit in the steady state, T_1^S, is lower than τ_1, we say that a steady state cooling (SSC) has been achieved. Also, in the transient regime, cooling is attained at time scales shorter than the steady state, and a temperature much less than τ_1 may be achieved. Such a cooling may be referred to as transient cooling (TC) <cit.>. Sometimes TC can be obtained without the occurrence of SSC. §.§ Refrigeration in Markovian environment A local cooling of qubit-1 can be obtained by the three-qubit three-bath setup with the bath configuration {B_1^M,B_2^M,B_3^M}, which means all the three baths are Markovian. We consider the Markovian baths to be bosonic baths consisting of infinite number of harmonic oscillators with a frequency range varying widely. The Hamiltonian of the baths is taken to be H_B^M=∑_i=1^3 H_B_i^M, where H_B_i^M= ∫_0^Ωħω̃η_ω^i†η_ω^idω. Here ω̃ is an arbitrary constant having the unit of frequency and Ω is the cutoff frequency taken to be same for all the baths, which is very high such that the memory time, Ω^-1, is negligibly small and we can safely incorporate the Markovian approximations <cit.>. η^i†_ω(η^i_ω), having the unit of 1/√(ω), represents the bosonic creation (anihilation) operators corresponding to the mode ω of i^th bath. The system-bath interaction Hamiltonian is taken as H_SB^M=∑_i H_SB_i^M, where H_SB_i^M=∫_0^Ωħ√(ω̃)dω h_i(ω)σ_i^x⊗ (η_ω^i†+η^i_ω) describes the interaction between the i^th system and i^th bath. Here h_i(ω) is a dimensionless function of ω, which tunes the coupling of qubit-i and B_i^M. For harmonic oscillator baths, ω̃ h_i^2(ω)=J_i(ω), where J_i(ω) is the spectral density function of B_i^M. In this paper, we have taken J_i(ω) to be Ohmic spectral density function in the form J_i(ω)= α_i ωexp(-ω/Ω). α_i stands for the dimensionless qubit-bath interaction strengths. The dynamical equation of the system is given by the Gorini–Kossakowski–Sudarshan–Lindblad (GKSL) master equation presented by Eq. (<ref>) with the dissipative parts, 𝒟_i(ρ_s(t)) = ∑_ω^'γ_i(ω^') [L_i^ω^'ρ_s(t) L^ω^'†_i -1/2{ L_i^ω^'† L^ω^'_i, ρ_s(t) }]. Here i=1,2,3. γ_i(ω^') is the decay rate having the unit of time^-1 and { L^ω^'_i } refers to the Lindblad operators corresponding to the possible transition energies ω^' of the system. For the validation of Born-Markov approximations, we are residing in the weak coupling limit, max{γ̃_i(ω^')}≪min{E_i,g}, where γ̃_i(ω^')=ħγ_i(ω^')/K. The explicit expressions of the Lindblad operators and the decay constants {γ_i(ω^')} are given in Appendix <ref>. It is already known that there are three operating regimes of an ideal quantum absorption refrigerator with the configuration {B_1^M,B_2^M,B_3^M}, depending on the qubit-bath interaction strengths, α_i for i=1,2,3, of the three-qubit three-bath model <cit.>. An example of these three scenarios is described below in a regime, where the coupling between the qubits are taken to be strong, i.e., g ≈ E_i. 𝐒_1: TC without SSC. Fig. <ref>-(a) shows a refrigeration of the cold qubit in the regime where transient cooling occurs without the occurance of steady state cooling. The minimum of the transient temperature is acquired for T_1^C ≈ 0.84. After a finite time, the temperature of the cold bath saturates at a value higher than the initial temperature τ_1=1, displaying a characteristic of steady state heating. 𝐒_2: TC better than SSC. From Fig. <ref>-(b) we can realise a situation where both the transient and steady state cooling occur, but the transient cooling is better than the steady state one. Comparing with Fig. <ref>-(a), it is noted that in the transient region, the behaviour of the system remains qualitatively same attaining a minimum temperature at T_1^' C≈ 0.84. Also, there is an additional feature of steady state cooling (T_1^' S≈ 0.88) which is completely non-existent in the previous case (𝐒_1). 𝐒_3: SSC better than TC. Fig <ref>-(c) describes a operative region of the refrigerator where both the transient and steady state cooling occur, but the steady state cooling is better than the transient one. In all the three situations 𝐒_1, 𝐒_2 and 𝐒_3, we get a specific parameter region of {α_1,α_2,α_3} for the operation of the refrigerators. For the convenience of notation we will denote the specific regions as {α_1^S_i,α_2^S_i,α_3^S_i} for the corresponding situation 𝐒_𝐢 with i=1,2 and 3. § EFFECT OF NON-MARKOVIANITY ON THE REFRIGERATION A Markovian situation is a very special case having some strict restrictions on the thermal baths, whereas the existence of a non-Markovian bath in the nature is more likely. So, there may occur some erroneous tuning of the parameters of the thermal baths, and any of the three bath or all the three baths may show non-Markovianity. Hence, the effect of non-Markovian baths on the refrigeration is needed to be studied. Let us first discuss the case, where all the three baths in the three-qubit three-bath refrigerator setup are non-Markovian i.e., the configuration is {B_1^NM,B_2^NM,B_3^NM}. The NM in the superscripts stands for the non-Markovian baths. In this case, the system bath interaction is considered to form a “spin-star" configuration. There are N+1 number of spins, among which N are lying on the surface of a sphere with one single central spin at equal distance from the spins on the surface. The central spin comprises the open system and is supposed to belong to a two dimensional Hilbert space ℋ_A, while the surrounding spins constitute the environment associated with a Hilbert space ℋ_B whose dimension is an N-fold tensor product of two dimensional spaces. The local Hamiltonian of the i^th bath is taken as H_B_i^NM=ħν_i J_i^+J_i^-, where J_i^±=∑_i^Nσ_(i)^± and σ_i^±=σ_x^i ± iσ_y^i/2, with ν_i being the frequency of B_i^NM. The interaction between the central spin and neighbouring spins is taken to be of the form of the Heisenberg XY interaction <cit.>, given by H_SB_i^NM=2 Kα_0 ( σ_i^+ J_i^- + σ_i^- J_i^+ ). Here, α_0 stands for the dimensionless interaction strength. For our entire analysis, we have chosen α_0=0.5. The time dynamics of the reduced three-qubit system after tracing out the baths is controlled by the following equation, ρ_s(t) = Tr_B [e^-i(H_S+H_I)ρ(t) e^i(H_S+H_I)], where ρ(t) is the combined state of system-bath setup at time t. The effect of cooling of the first qubit, for the configuration {B_1^NM,B_2^NM,B_3^NM} is depicted in Fig. <ref>. The temperature T_1(t) oscillates between 0.8 and 0.96. So, the minimum transient temperature attained by qubit-1 is less than the minimum transient (≈ 0.84) and steady state temperatures (> 0.86) for the settings in Figs.<ref>-(a) and (b), but is not better than the situation depicted in Fig.<ref>-(c), attained for the ideal Markovian cases. Therefore, the transient cooling of the first qubit can be enhanced for certain choices of the bath parameters, once all the three baths attached to the system are made non-Markovian. An important point is to be noted that, although the rapidity of oscillation of T_1(t) reduces with the increase of time, but the steady state is not reached due to the non-Markovian nature of the system-bath interaction, or it may appear at a larger timescale. So, a steady state cooling may not be attainable for the situation where all the three baths are non-Markovian. Since some baths (with some restrictions) can be considered as a member of a Markovian family and some non-Markovian baths have their Markovian limits, so it is justifiable to have a situation where among the three baths one or two will be Markovian and the remaining are not so. The time evolution of the three-qubit system as a whole in presence of such a mixture of local Markovian and non-Markovian environments is given by the following equation <cit.> ∂ρ̃_s(t)/∂ t =ℒ(ρ̃_s(t))= -i/K[H_S,ρ̃_s(t)] + ħ/K∑_{i_m}𝒟_M_i_m(ρ̃_s(t))+ ħ/K∑_{i_n}𝒟_NM_i_n(ρ_sB_{i_n}^NM(t)). Here, each of i_m and i_n stands for the i^th qubit, connected to i^th bath which can be either m^th Markovian or n^th non-Markovian, with m and n are the total number of Markovian and non-Markovian baths respectively. The reduced state of the system ρ̃_s(t) is given by ρ̃_s(t)=Tr_B_{i_n}(ρ_sB_{i_n}^NM(t)), where ρ_sB_{i_n}^NM(t) is the system state correlated with all the non-Markovian baths. 𝒟_M_i_m(ρ̃_s(t)) is the dissipative term coming from the interaction between i^th qubit and i^th bath, which is a Markovian bosonic one, having the form same as Eq. (<ref>). The Lindblad operators of this dissipative term corresponding to i_m=i can be presented as L_i^ω^' for i=1, 2 and 3 and has the same structure as in Eq. (<ref>). 𝒟_NM_i_n(ρ_sB_{i_n}^NM(t)) is the same coming from the i^th qubit-bath interaction, for which the bath is non-Markovian, given by 𝒟_NM_i_n(ρ_sB_{i_n}^NM(t)) = -i/ħTr_B_i_n^NM[ H_SB_i_n^NM,ρ_sB_{i_n}^NM(t) ]. The choice of spin star model as a non-Markovian bath ensures that the reduced subsystem of the first qubit is diagonal in the eigenbasis of the system Hamiltonian, hence curtailing any ambiguity regarding the definition of local temperature for the combination of local Markovian and non-Markovian evolution. We now replace the Markovian baths of the ideal absorption refrigerator by non-Markovian reservoirs successively and investigate the effect of a mixed set of local environments on the transient as well as the steady state cooling of the first qubit. We refer to the usual three-qubit three Markovian baths setup to be an “ideal" one and after replacing any of the Markovian bath with a non-Markovian one, we denote the situations as “altered" scenarios. In all the three altered setups, 𝐒_1, 𝐒_2 and 𝐒_3, the parameters of the Markovian baths, α_i for i=1,2 and 3, are same as in ideal 𝐒_1, 𝐒_2 and 𝐒_3 scenarios respectively, and all the parameters of the non-Markovian baths are same as in Fig. <ref>. In this paper, we have considered four altered scenarios by taking two situations with m=2 and n=1 in Eq. (<ref>) with the bath configurations: 𝒜_1^S_i≡{B_1^NM,B_2^M,B_3^M} and 𝒜_2^S_i≡{B_1^M,B_2^M,B_3^NM}, and two situations with m=1 and n=2 with the bath configurations: 𝒜_3^S_i≡{B_1^NM,B_2^M,B_3^NM} and 𝒜_4^S_i≡{B_1^M,B_2^NM,B_3^NM}. The superscripts, S_i, denote the corresponding ideal situations 𝐒_1, 𝐒_2 and 𝐒_3 respectively for i=1,2 and 3. Therefore the parameter spaces corresponding to these four scenarios 𝒜_1^S_i, 𝒜_2^S_i, 𝒜_3^S_i and 𝒜_4^S_i are respectively {α_0,α_2^S_i,α_3^S_i}, {α_1^S_i,α_2^S_i,α_0}, {α_0,α_2^S_i,α_0} and {α_1^S_i,α_0,α_0}. The situations 𝒜_1^S_1, 𝒜_3^S_1 and 𝒜_4^S_2 are same as 𝒜_1^S_2, 𝒜_3^S_2 and 𝒜_4^S_3 respectively, since α_1^S_2=α_1^S_3, α_2^S_3=α_2^S_2 and α_3^S_1=α_3^S_2. Further, we compare the three-qubit refrigerator model with one and two-qubit self-sustaining thermal devices kept in contact with spin-baths, which also exhibit refrigeration in certain situations. §.§ Cooling of the cold qubit in the altered situation of 𝒜_1^S_i Let us first consider a situation where there is a single qubit attached to a spin-environment where the qubit-bath interaction is given by Eq. (<ref>). The system Hamiltonian is considered to be H^1=E_1^1σ_z/2. The initial state is taken as a product of the thermal states of the qubit and bath, each of which are at temperature T_1^1=1. After the evolution, the final state is also diagonal, and we can calculate the temperature corresponding to the final state. If we consider the environment to consist of only a single spin, i.e. N=1 in Eq. (<ref>), then the expression of the final temperature of the qubit, hence obtained, is given in Appendix <ref>. It is noted that if E_1^1 < 1, then the temperature, T_1(t), oscillates uniformly between T_1(t)=1 and some T_1(t) < 1, but the envelope of temperature oscillations is linear and never converges to equilibrium. So there is an instance of transient refrigeration at certain times, although the maximum of the envelope never goes below unity(Fig. <ref>-(a)). Next let us consider a two-qubit thermal device comprising of the cold qubit and one of the other two qubits of the three-qubit absorption refrigerator. So the configuration is either 𝒬_1={B_1^NM,B_2^M} or 𝒬_2={B_1^NM,B_3^M}. The interactions between the two qubits for the configurations 𝒬_1 and 𝒬_2 are H_1=|01⟩⟨10|+|10⟩⟨01| and H_2=|00⟩⟨11|+|11⟩⟨00| respectively. Let us first look at the case 𝒬_1. The local Hamiltonian is H^2=(E_1^2/2) σ_z^(1)+(E_2^2/2) σ_z^(2). The two eigenstates of H^2, |01⟩ and |10⟩, are degenerate if E_1^2=E_2^2, and therefore the swapping, |10⟩↔|01⟩, can be done without any input of external energy. However under this condition, the initial temperature of the first qubit being T_1 and the second qubit being T_2, satisfying τ_1=T_1 ≤ T_2, one always obtains the final temperature T_1(t) > τ_1, and there is no refrigeration. On the other hand, for the configuration, 𝒬_2, the self-sustained condition is given by E_1^2=-E_2^2, where no external energy input is needed. Under this condition, keeping T_1 ≤ T_2, and E^2_1 < 1, there is an instance of refrigeration, and we depict the particular case of E^2_1 = 0.5 in Fig.<ref>-(b). So refrigeration is observed under certain conditions in the single and two-qubit scenarios, when the first qubit is attached to spin-bath, but in none of these situations steady state cooling is achieved. Let us now move to the three-qubit case. We consider a three-qubit ideal quantum absorption refrigerator operating in the parameter regime 𝐒_1. We now replace the Markovian bath attached to the cold qubit by a non-Markovian one, which gives the configuration 𝒜_1^S_1, i.e., {B_1^NM,B_2^M,B_3^M}. The system-bath interaction is now governed by H̃_1=H_SB_1^NM+∑_i=2^3 H_SB_i^M. In Fig. <ref>-(a) we depict the dynamics of the temperature of the first qubit in this scenario. We observe that the refrigeration of the refrigerator is present here. The transient temperature T_1(t) approaches a minimum > 0.75, which is less than the same of the corresponding ideal Markovian baths case T_1^C, and in course of time slowly attains a steady state temperature with temperature ≈ 0.7. So, in this altered situation we acquire both transient cooling (TC) and steady state cooling (SSC), while for the ideal Markovian case, the SSC was non-existent in 𝐒_1 (see Fig <ref>-(a)). If we consider the parameter regime, 𝐒_2, and substitute the first Markovian bath by a non-Markovian one, we get the configuration 𝒜_1^S_2. This configuration is qualitatively the same as in 𝒜_1^S_1, since α_2 and α_3 are equal in both these cases. We now look at the effect of combined local Markovian and non-Markovian evolution on the operation of an ideal absorption refrigerator with the bath combination {B_1^NM,B_2^M,B_3^M}, but in the parameter space 𝐒_3. In this case, the minimum of the transient temperature T^C_1_min<T_1^' C of the ideal case, and it approaches the steady state with temperature T_1^S<T'_1^S. So, here also, the refrigeration of the refrigerator is prevalent, and both TC and SSC is observed. In the case of 𝒜_1^S_3, we can attain a steady state cooling with a temperature of the first qubit ≈ 0.7, while in the ideal case of S_3, the steady state temperature is ≈ 0.75. Hence, compared to Fig. <ref>-(c), an enhancement occurs both in the transient cooling and the steady state cooling when compared with the ideal scenario 𝐒_3. Therefore, we can infer that, a reduction of the temperature of cold qubit is clearly visible in the transient and steady state regime for this altered setup, 𝒜_1^S_i. Therefore, the replacement of the Markovian bath attached to the cold qubit of an ideal absorption refrigerator in the operating regime 𝐒_1 (or 𝐒_2), enhance the transient cooling by reducing the temperature of the cold qubit below the cooling obtained in the ideal Markovian case (< T_1^C). Moreover, the system equilibriates towards a steady state temperature in this altered situation of 𝐒_1 (or 𝐒_2). Similarly, substituting the first Markovian reservoir by a non-Markovian one for the setting 𝐒_3, one attains an improved refrigeration both in the transient state and steady state regimes. So, the results in this subsection depict that if we substitute the Markovian bath attached to the cold qubit by a spin-environment, both transient and steady state cooling can be achieved, which is better than the ideal Markovian case. Further, we compare the situation 𝒜_1^S_i with the single-qubit case. For the single-qubit, we find that refrigeration is non-existent unless E_1^1<1, while in the three-qubit scenario, we always consider E_1=E_3=1. Also, unlike the case of 𝒜_1^S_i, the final temperature in the single-qubit situation does not attain a staedy state, although it periodically goes below its initial temperature, T_1^1 = 1 (compare Figs. <ref>-(a) and  <ref>). Now if we ompare 𝒜_1^S_i with the setting 𝒬_2, we see that refrigeration is present in both the settings, but again in the two-qubit case, E_1^2 has to be less than unity. Also, unlike 𝒜_1^S_i, the oscillations in 𝒬_2 are persistent and steady state is not attained (compare Figs. <ref>-(b) and  <ref>). Thus attainment of steady state cooling is a distinct feature of the quantum absorption refrigerator consisting of three qubits and not less than that. §.§ Cooling of the cold qubit in the altered situation of 𝒜_2^S_i We begin this subsection by considering the ideal three-qubit scenario where all the three baths are Markovian, and substitute the bath, which is not connected to the cold qubit, by a non-Markovian one. We consider the three parameter regimes of 𝐒_1, 𝐒_2 and 𝐒_3, and look at the effect of replacing the bosonic bath attached to the third qubit of the “ideal" scenario into a non-Markovian one, i.e. {B_1^M,B_2^M,B_3^NM}. The situation is qualitatively same for {B_1^M,B_2^NM,B_3^M} configuration also (not shown). If we substitute any one of the second or third bosonic baths with a non-Markovian one, say the third one, i.e., the configuration 𝒜_2^S_1 ({B_1^M,B_2^M,B_3^NM}), we obtain only TC but do not obtain SSC as evident from Fig. <ref>-(a). In this situation, the minimum transient temperature is < 0.88, which at steady state regime converges to a value > 1. Similarly for the configuration 𝐒_2, if the third qubit is connected to the non-Markovian spin-bath while the others being Markovian, i.e., 𝒜_2^S_2, transient cooling is evident but steady state cooling may not be obtained, and the refrigeration of the refrigerator is present in the transient region only. See Fig. <ref>-(b). Here the minimum transient temperature, < 0.88, and the steady state temperature, ≈ 0.98, are greater than the corresponding minimum transient temperature and the equilibrium temperature of the final state in the corresponding ideal Markovian case. This feature is different from the 𝒜_1^S_i scenario, where there was an advantage over the corresponding ideal Markovian scenarios. Similarly, the configuration 𝒜_2^S_3 exhibits transient cooling of the first qubit as depicted in Fig.(<ref>-(c)). The minimum transient temperature lies beneath ≈ 0.88 and equilibriates to a value ≈ 0.98. So in the setting, 𝒜_2^S_i, the action of the refrigerator in the transient regime still persists but without any advantage over the “ideal" Markovian case, and also showing instances of steady state heating. Hence, only TC is obtained but with no advanatge over the “ideal" Markovian scenario with the Markovian and non-Markovian bath ratio 2:1, if the first qubit is not kept in contact with the non-Markovian environment. Moreover, though the oscillations vary within a certain range of temperature in the transient region, the temperatures for all these three cases tend to attain an equilibrium at some large timescales. So attainability of steady state is also a feature noted in this situation. §.§ Cooling of the cold qubit in the altered situation of 𝒜_3^S_i Here we consider an ideal three-qubit quantum refrigerator where all the three qubits are initially attached to Markovian baths, and two of them, say first and third one, are replaced by a spin-environment. So, here we consider the setting 𝒜_3^S_i, i.e., {B_1^NM,B_2^M,B_3^NM}, where the system-bath interaction is governed by H̃_1=∑_i=2^3 H_SB_1^NM+ H_SB_i^M. The features obtained in this setting are qualitatively same for the configuration, {B_1^NM,B_2^NM,B_3^M} (not shown). Let us first look at the configuration 𝒜_3^S_1, as depicted in <ref>-(a). The transient temperature T_1(t) oscillates rapidly between 0.75 and 1.0 with its magnitude never surpassing unity. The minima of T_1(t) varies around ≈ 0.75, which shows refrigeration along with an enhancement in cooling of the first qubit than the minimum transient temperature of the corresponding ideal Markovian case. Compare Figs. <ref>-(a) and <ref>-(a). The setting 𝒜_3^S_2 is qualitatively same as the previous case, 𝒜_3^S_1 because of the choice of α_2. Moreover,the attainment of equilibrium is non-existent in this scenario in a sufficiently large time-scale. Next we consider the parameters corresponding to the configuration, 𝒜_3^S_3, where we observe similar features. The transient temperature, T_1(t), varies between ≈ 0.75 and 1.0, and the envelope of oscillations narrows down within the observed time. It may or may not reach equilibrium at large times. The refrigeration, however, is existent and the minimum transient temperature in this case(≈ 0.75) is less than the minimum transient temperature in the corresponding ideal Markovian case <ref>-(c), although not less than its steady state temperature. Therefore, substituting any two Markovian baths including the first one is beneficial as this enhance the transient cooling, but the increase of non-Markovianity restrict the attainability of the steady state cooling. One distinct nature of this m=1, n=2 cases is that, the oscillations in T_1(t) consistently persist with undiminished amplitudes and do not tend to saturate in a sufficiently large time-scale. This behaviour appears with the increase in the number of non-Markovian baths and qualitatively resembles the situation where all the three baths are non-Markovian. Compare with Fig. <ref>. Next we compare the results obtained using the configuration, 𝒜_3^S_i, with the single-qubit case. In the single-qubit scenario, refrigeration effect is present with periodic oscillations under the condition E_1^1 < 1 and not with E_1^1=1. But in the three-qubit situation, we always consider E_1=E_3=1. Moreover, in the single-qubit case, the envelope of oscilllations does not vary with time, a feature similar to 𝒜_3^S_1 (refer to figures <ref>-(a) and  <ref>-(a)). While, for 𝒜_3^S_3, similar transient cooling is existent but the envelope narrows down with time (refer to Fig. <ref>-(b)). The non-attainment of equilibrium is also another feature noted in both these cases. We now compare the three-qubit quantum absorption refrigerator under the configuration, 𝒜_3^S_i, with the relevant two-qubit cases. We saw previously that the configuration 𝒬_1 does not provide a self-sustained two-qubit refrigerator. So we compare the two-qubit configuration,𝒬_2, with the three-qubit configuration, 𝒜_3^S_i. Again, in the two-qubit case, refrigeration is possible only when E_1^2<1 while in the three-qubit setup, cooling occurs when E_1=E_3=1. Both the cases depict a refrigeration effect without attaining equilibrium, although the envelope of the two plots are different. Compare Figs. <ref>-(b) and  <ref>-(b). Next, we also consider a two-qubit situation where both the qubits are attached to spin-baths, i.e. the configuration is 𝒬_3={B^NM_1,B^NM_2}. The local Hamiltonian is H^2=(E_1^2/2) σ_z^(1)+(E_2^2/2) σ_z^(2). The two qubits interact via the interaction H_1=|01⟩⟨10|+|10⟩⟨01|, under the self-sustained condition, E_1^2=E_2^2. We measure the final temperature of the first qubit, which exhibits only transient cooling at certain times, and the final temperature of the first qubit, T_1(t), sometimes rises above its initial temperature. Fig. <ref>, for example, depicts the case where E_1^2=0.1 and the spin-environment corresponds to N=1. Moreover, unlike the three-qubit case, cooling is not obtained here for E_1^2 ≥ 1. §.§ Cooling of the cold qubit in the altered situation of 𝒜_4^S_i Let us now look into the case where the second and third qubits are connected to non-Markovian spin-baths while the first one is Markovian, i.e., the setting 𝒜_4^S_i. Initially consider the ideal scenario when all the three baths are Markovian within the parameter region of 𝐒_1. Now if we replace the baths attached with the second and third qubits to non-Markovian ones, it is observed that steady state cooling is not obtained, and the refrigeration of the refrigerator is almost destroyed. See Fig. <ref>-(a). In this case, the oscillations vary between temperatures 0.9 and 1.02, with the minimum transient temperature being ≈ 0.9. The envelope of the oscillations gradually narrows down to a value greater that the initial temperature of the first qubit. Like in the previous subsection, here also the oscillations do not converge to a steady state within the observation period. We now take the altered situation of 𝐒_2, i.e. 𝒜_4^S_2. For this setting (same with 𝒜_4^S_3), we observe that the transient temperature of the cold qubit T_1(t) begins to oscillate between 0.9 and < 1.02 without attaining a steady state. So here also, the envelope of temperature oscillations vary with time and no enhancement of the transient state cooling is achieved over the ideal Markovian situation compared to 𝐒_2. Compare Figs. <ref>-(b) and <ref>-(b). An important feature to be noted here is that, like the situation of 𝒜_3^S_i with two of the baths made non-Markovian, here also for 𝒜_4^S_i, the steady state is not attainable within the observation time. So, unattainability of steady state is a general feature of m=1 and n=2 configurations, and it does not solely depends on the parameter space of the Markovian bath, which is coupled to any of the qubits. Therefore, we can conclude from the last two subsections that replacement of any two Markovian baths including the first one is beneficial as this enhance the transient cooling, but the increase of non-Markovianity restrict the attainability of the steady state cooling. On the other hand, replacing any of the second or third Markovian baths or both of them by a non-Markovian one by keeping the cold qubit attached with a Markovian bath, results in a deterioration of performance of the usual absorption refrigerator. So, one can attain a sufficient cooling of qubit-1 whenever it is connected to a non-Markovian environment, whatever be the nature of the baths attached to the other two. Finally, the analysis in this section infers that, the effect of non-Markovian baths on the quantum absorption refrigerator, results an enhancement in cooling attainable in transient as well as the steady state regime in some cases (if attainable), when the cold qubit is attached to a non-Markovian bath. We can call the quantum refrigerators with the beneficial altered setups as “non-Markovian quantum refrigerators". This reduction of temperature of the cold qubit with this non-Markovian setups owes its origin to the non-Markovianity incorporated to the bath attached to the first qubit. This leads to define a quantifier of non-Markovianity for a quantum absorption refrigerator discussed in the next section. § A MEASURE OF NON-MARKOVIANITY We have already shown that the efficiency of a quantum absorption refrigerator can be enhanced if the cold qubit is attached with a non-Markovian spin-bath, instead of a Markovian bosonic one. While for ideal Markovian situations (among of the three cases of ideal 𝐒_1, 𝐒_2 and 𝐒_3), the transient and steady state temperatures attain ≈ 0.84 and ≈ 0.75 respectively, and a replacement of the Markovian bath attached to the cold qubit with a non-Markovian one, can reduce the respective transient and steady state temperatures to < 0.8 and ≈ 0.7. Let us try to find the origin of the decrease of temperature. As we concentrate on the temperature of qubit-1, from now on we will focus on the time dynamics of the first qubit only. Let us consider a two level system described by the Hamiltonian H=KE^'_0|0⟩⟨0|+KE^'_1|1⟩⟨1| and the initial state of the system, ρ^'(0), is taken to be diagonal in the eigenbasis of the Hamiltonian. Now suppose, a non-Markovian channel N^t_NM is applied on the qubit for time t which results an evolution of the system, such that the density matrix of the state remains diagonal in the eigenbasis of the Hamiltonian. The corresponding density matrix is given by ρ^'_NM(t)=N^t_NM(ρ^'(0))=p(t)|0⟩⟨0|+(1-p(t))|1⟩⟨1|. Similarly, if the qubit evolves through a Markovian channel N^t_M, one can obtain the dynamical state as ρ^'_M(t)=N^t_M(ρ^'(0))=p^'(t)|0⟩⟨0|+(1-p^'(t))|1⟩⟨1|. The dynamical temperatures corresponding to the non-Markovian (T_NM^t) and Markovian (T_M^t) processes are defined through the following relations ⟨0|ρ^'_NM(t)|0⟩ = e^-E'_0/ T_NM^t/e^-E'_0/ T_NM^t+e^-E'_1/T_NM^t= α_NM ⟨0|ρ^'_M(t)|0⟩ = e^-E'_0/ T_M^t/e^-E'_0/T_M^t+e^-E'_1/T_M^t= α_M respectively. Inverting these equations, one arrives at T_NM^t-T_M^t=(E'_0-E'_1)[ 1/ln(1/α_NM -1) - 1/ln(1/α_M -1)]. In this equation, the difference, T_NM^t-T_M^t, is a function of the parameters of the Markovian channel, α_1, α_2 and α_3. So the difference will vary with the choice of the channel parameters and may even give zero value corresponding to a particular choice of these three parameters. So we optimise over the channel parameters, α_1, α_2 and α_3, to give a generalized expression of the quantity in <ref>. Thus Eq. (<ref>), with an optimisation over α_M, can be visualized as a measure of non-Markovianity of an arbitrary quantum channel C which manifests the deviation from its Markovian counterpart. We therefore define the quantity, M_C= |(E'_0-E'_1)[ 1/ln(1/α_C -1) - min_α_M1/ln(1/α_M -1)]| as a measure of non-Markovianity as this term quantifies the temperature difference of a system after passing through an arbitrary channel C, from the temperature obtained when passing through an optimal Markovian channel. This quantifier M_C returns a positive value when the channel is non-Markovian, While for a Markovian channel, the quantifier is zero. We now study the nature of the quantifier for the configuration of bath, 𝒜_1^S_i, with the parameter regions 𝒜_1^S_1=𝒜_1^S_2 and 𝒜_1^S_3 as quantum channels, say C_1, C_2 respectively. The time dynamics of M_C_1 and M_C_2 are presented in Fig. <ref>-(a) and Fig. <ref>-(b) (the green curves) respectively. For clarity, the quantifier M_C is scaled by a factor δ=20 and plotted. Both M_C_1 and M_C_2 show similar features. The two curves depict a small but positive value of the quantifier M_C when plotted against time. It is thus evident that the system exhibits a non-Markovian behaviour within the observed timescale in the altered scenario, 𝒜_1^S_i. It is a well established fact that the quantifiers of non-Markovianity are not all equivalent. So, here we consider a different measure of non-Markovianity, the Rivus-Huelga-Plenio (RHP) measure <cit.>, to comment on the equivalence between the measure, M_C, with a widely used quantifier of non-Markovianity. Suppose we can split a dynamical map from 0 to t+ϵ, with some intermediate time difference ϵ, as ℰ_(t+ϵ,0)=ℰ_(t+ϵ,t)ℰ_(t,0), where ℰ_(t+ϵ,t) is a completely positive (CP) map, then the channel implemented by ℰ_(t+ϵ,0) is Markovian. The non-CP nature of ℰ_(t+ϵ,t) is given by g_ℰ(t)=lim_ϵ→ 0^+f(t+ϵ,t)-1/ϵ, where f(t+ϵ,t)=||(ℰ_(t+ϵ,t)⊗𝐈)(|ϕ⟩⟨ϕ|)||_1 with ϵ > 0. Here ℰ_(t+ϵ,t) represents an arbitrary channel between times t and t+ϵ, and ||A||_1 is the trace norm defined by √(A^† A). The map, ℰ_(t+ϵ,0), is said to be Markovian if and only if g_ℰ(t)=0, otherwise g_ℰ(t)>0. Therefore, for a process to be non-Markovian, the quantity, g_ℰ(t)>0. Here |ϕ⟩ is a maximally entangled system-auxiliary state which is chosen to be 1/√(2)(|00⟩_SA+|11⟩_SA) in this paper. The orange curves in Fig. <ref>-(a) and  <ref>-(b) depict the behaviour of the RHP measure given in Eq. (<ref>) for the non-Markovian channel C. If the dynamics of a non-Markovian evolution be governed by dρ/dt=ℒ_t, then in the limit ϵ→ 0, Eq. (<ref>) reduces to g(t)=lim_ϵ→ 0^+||[I+(ℒ_t ⊗I)ϵ]|ϕ⟩⟨ϕ|||_1-1/ϵ, where ℰ_(t+ϵ,t)=e^ℒ_t ϵ. The orange curves in Fig. <ref> has been plotted using this Eq. (<ref>). The quantifier g_C(t) exhibits a positive value at a all times, which imply non-Markovianity in terms of the RHP measure at all timescales. Figures <ref>-(a) and (b), depict the non-Markovianity of the respective channels C_1 and C_2, as quantified by the new measure, M_C_i for i=1,2 (green curve), and the RHP measure (orange curve). Comparing the green and orange curves in each of <ref>-(a) and (b), it is noted that in the observed times, both M_C_i and g_C_i are positive, which implies that non-Markovianity is key feature of the system which is depicted by both the measures. Our measure, therefore, captures the non-Markovianity present in the system which is also evident in terms of the RHP measure. § IMPACT OF MARKOVIAN NOISE ON A NON-MARKOVIAN QUANTUM REFRIGERATOR We have already observed the enhancement in the efficiency of cooling of a quantum absorption refrigerator in some cases, while using non-Markovian baths instead of the Markovian ones for the ideal setups. Those altered situations, advantageous over the relevant Markovian cases, are idealistic, and environmental noise or fluctuations can have non-negligible effects on the efficiency of refrigeration, as noise is ubiquitous in nature. So, if we want to implement such an altered refrigerator model in reality, it is useful to look at the scenario in presence of decoherence noise. §.§ Noise model-I A quantum absorption refrigerator is constructed by a three-qubit three-bath setup. In ideal situations, all the three baths are Markovian and in some altered cases, the bath attached to the cold qubit can be non-Markovian. Here we consider a three-qubit refrigerator in which the cold qubit is kept in a spin-environment (altered situation), along with being connected with a noisy Markovian environment, given by 𝒩_1(·), where the argument is the altered refrigerator setup. In this paper, we have considered the noisy scenario 𝒩_1(𝒜_1^S_3) , where the cold qubit is coupled to a non-Markovian spin-bath taken in the previous discussions and also to a Markovian bosonic environment B^M_1. The other two qubits are connected to bosonic baths as before. Therefore the configuration is {B_1^NM,N_1,B_2^M,B_3^M}, and the interaction Hamiltonian of the cold qubit and the Markovian environment B^M_1 is given by H_SB^M_1=√(g_1)∫_0^Ωħ√(ω̃) dω h_M_1(ω)(σ_- η_ω^M_1†+σ_+η_ω^M_1). Here g_1 is the dimensionless noise strength. All the other quantities are defined previously. The modified GKSL master equation for this noisy scenario is same as Eq. (<ref>), with an extra dissipative term coming from the contribution of noisy Markovain environment. So, the GKSL master equation for this noisy scenario turns out to be ∂ρ̃_s^𝒩_1(t)/∂ t=∂ρ̃_s(t)/∂ t+ ħ/Kg_1𝒟_M_1(ρ̃_s(t)). Taking this noisy environment into consideration, the additional system operators are given by 𝒜^E_1_1 = (|111⟩⟨011|+|100⟩⟨000|)√(2) 𝒜^E_1+g_1 = (|110⟩⟨+|+|-⟩⟨001|) 𝒜^E_1-g_1 = (|+⟩⟨001|-|110⟩⟨-|). The respective operators for the reverse processes is given by 𝒜^-ω=𝒜^ω^†. If an isolated qubit interacts with a reservoir via the interaction given in Eq. (<ref>), then the time dynamics of the well-known amplitude damping channel is obtained for T_N_1=0.0, where T_N_1 is the temperature of the relevant bath. In this case, we see that the system attains a steady state, and the temperature of the cold qubit at steady state is higher than the corresponding equilibrium temperature without the Markovian noise. If g_1 is made smaller ≈ 0.0001, then the steady state temperature is almost equal to the one corresponding to Fig <ref>-(b), but is never less than that. So the Markovian noise deteriorates the operation of the refrigerator when compared with the non-Markovian case, though its behaviour as a refrigerator is still retained within a finite domain of g_1. It has been numerically examined that this noise model never gives advantage over the non-Markovian scenario if g_1 is non-zero, keeping the other parameters fixed in the previously mentioned values. Fig.<ref>-(a) depicts the scaling of the temperature difference between the cold qubit (T_1(t)) and the steady state temperature of Fig.(<ref>-(b)) (T_1^s) vs the noise strength g_1. The solid red curve is at time t=t_s=0.008 when the system is at equilibrium and the blue dashed line represents the nature at t=t_s/2. There is a finite gap between the two curves for small g_1, and the difference gradually reduces prior to when the system stops behaving as a refrigerator. §.§ Noise model II In this subsection, we repeat the same formalism followed in the previous subsection but in presence of a different Markovian noise. Here we consider the configuration 𝒩_2(𝒜_1^S_3). So here, the first qubit is kept in contact with a Markovian reservoir, 𝒩_2, in addition to the non-Markovian environment. Therefore the configuration is {B_1^NM,N_2,B_2^M,B_3^M}, and interaction between the system and the noisy bath, N_2, is given by H_SB^N_2 = g_2 ∑_i=1^3 A_i⊗ B_i, where A_i⊗ B_i = σ_i ⊗∫_0^ω_maxħ√(ω̃) h_N_2(ω) (a_ω^†+a_ω) dω. Here σ_i represents the three Pauli matrices for i=1,2,3, and h_N_2(ω) is a dimensionless coupling parameter depending on ω, which tunes the coupling between the coupling of H_SB^N_2 to the rest of the Hamiltonian. All other quantities are as defined previously. The explicit expressions for the additional system operators due to the presence of the noise, 𝒩_2, is given in Appendix <ref>. The time dynamics of the well-known dephasing channel is restored if an isolated qubit interacts with a bath via H_SB^N_2, and the temperature of the bathT_N_2, is given by T_N_2→∞. In this situation also, the noise model does not improve the performance of the refrigerator when compared to the case where the first qubit is non-Markovian, but the refrigeration occurs within a range of the noise strength g_2. The scaling of the temperature difference between the cold qubit T_1(t) in presence of the noise, 𝒩_2, and the steady state temperature (T_1^s) of Fig.<ref>-(b) is shown in Fig.<ref>-(a), where the difference is plotted against the dimensionless noise strength g_2. The steady state temperature at time t=t'_s=0.05 is depicted by the solid red curve whereas the blue dashed curve corresponds to the time t=t'_s/2. In contrast to the previous case, this graph has a trend that the difference between the red and blue curves gradually grows in magnitude with increasing g_2 until the value of g_2 crosses 0.009 where the model ceases to behave as a refrigerator. § CONCLUSION In this paper, we inspected a quantum refrigerator comprising of a few qubits, each of which are connected separately to local baths. We looked at situations where both TC and SSC coexist in a quantum refrigerator system. We identified three domains, viz. where there is only TC, SSC better than TC, and TC better than SSC, considering different parameter regimes. Along with three-qubit quantum absorption refrigerators we also considered, for comparison and completeness, single- and two-qubit self-sustained thermal devices in presence of one or more spin-environments. In the single- and two-qubit cases, we note that although cooling is obtained under certain conditions, the oscillations in the final temperature are persistent throughout, and the envelopes never converge to a steady state value. Whereas, the three-qubit refrigerator attains a steady state when at most one of the bosonic baths is replaced by a spin-environment. We investigated the three-qubit absorption refrigerator for the three domains mentioned above, in presence of one or more spin-environments. We studied the system when the bath of a single qubit, two qubits or all the baths of the three qubits of the refrigerator are replaced by non-Markovian spin-baths. The core objective of this paper is to show that replacing the Markovian bath attached to the cold qubit of a refrigerator with a non-Markovian reservoir, results in a considerable lowering of the temperature of the cold qubit, compared to the situation when all the three baths are Markovian. This advantage is apparent both in the transient and steady states. Connecting the other two qubits with non-Markovian baths, while keeping the cold qubit in a Markovian reservoir, does not provide advantage over the scenario where all the three baths are Markovian. In accordance with this result, we have also suggested a way to gauge how non-Markovian a channel is, by defining a measure of non-Markovianity by optimising over the channel parameters. Since noise permeates all physical processes, the refrigerator model has also been examined in the presence of Markovian noise in addition to the Markovian and non-Markovian baths. We identified the range of noise strength for which refrigeration still occurs. We acknowledge computations performed using Armadillo <cit.>, and QIClib <cit.> on the cluster computing facility of the Harish-Chandra Research Institute, India. We also acknowledge partial support from the Department of Science and Technology, Government of India through the QuEST grant (grant number DST/ICPS/QUST/Theme-3/2019/120). § COOLING OF A QUBIT IN A SINGLE-QUBIT SINGLE-BATH SETUP Final temperature of the qubit for a single qubit thermal device attached to a single non-Markovian spin-bath is given by T_1(t)=E_1^1/log(-1+√(E_1^1^2+4)(e^1/T_1^1+1)/(e^-i √(E_1^1^2+4) t(e^1/T_1^1((E_1^1^2+2) e^i √(E_1^1^2+4) t+e^2 i √(E_1^1^2+4) t+1)-(-1+e^i √(E_1^1^2+4) t)^2 e^E_1^1/T_1^1)+E_1^1^2+4/√(E_1^1^2+4)(e^E_1^1/T_1^1+1))). The dimension of the spin-bath is taken to be N=1. § LINBLAD OPERATORS FOR THE THREE-QUBIT QUNATUM ABSORPTION REFRIGERATOR The Lindblad operators corresponding to the GKSL equation given in Eq. (<ref>) with the dissipative term as in Eq. (<ref>) are expressed as L^E_1_1 = |111⟩⟨011|+|100⟩⟨000| L^E_1+g_1 = 1/√(2)(|110⟩⟨+|+|-⟩⟨001|) L^E_1-g_1 = 1/√(2)(|+⟩⟨001|-|110⟩⟨-|) L^E_2_2 = |110⟩⟨100|+|011⟩⟨001| L^E_2+g_2 = 1/√(2)(|111⟩⟨+|-|-⟩⟨000|) L^E_2-g_2 = 1/√(2)(|+⟩⟨000|+|111⟩⟨-|) L^E_3_3 = |111⟩⟨110|+|001⟩⟨000| L^E_3+g_3 = 1/√(2)(|011⟩⟨+|+|-⟩⟨100|) L^E_3-g_3 = 1/√(2)(|+⟩⟨100|-|011⟩⟨-|) Here |+⟩=1/√(2)(|101⟩+|010⟩) and |-⟩=1/√(2)(|101⟩-|010⟩). The other nine non-zero operators for the corresponding opposite processes are evaluated using the relation 𝒜^-ω^'_i= 𝒜^ω^'†_i. In the Master equation corresponding to the Markovian qubit-bath interaction, the information of the reservoirs is contained in the incoherent transition rates {γ_i(ω^') } which can be evaluated from the equations γ_i(ω^') = J_i(ω^') [1+f(ω^',β_i)] ω^'>0 = J_i(|ω^'|) f(|ω^'|,β_i) ω^'<0, where f(ω^',β_i)=[exp(βħω^')-1]^-1 is the Bose-Einstein distribution for the heat baths. § LINDBLAD OPERATORS FOR THE NOISE MODEL II The Lindblad operators considering the configuration {B_1^NM,N_2,B_2^M,B_3^M}, and interaction of the system with the noisy bath, N_2, given by H_SB^N_2, is of the following form 𝒟_1(E_1) = |111⟩⟨011| + |100⟩⟨000|, 𝒟_1(E_1+g) = 1/√(2)(|-⟩⟨001|+|110⟩⟨+|), 𝒟_1(E_1-g) = 1/√(2)(|+⟩⟨001|-|110⟩⟨-|), 𝒟_2(E_1) = i(|111⟩⟨011| + |100⟩⟨000|), 𝒟_2(E_1+g) = i/√(2)(|-⟩⟨001|+|110⟩⟨+|), 𝒟_2(E_1-g) = i/√(2)(|+⟩⟨001|-|110⟩⟨-|), 𝒟_3(0) = |000⟩⟨000|+|001⟩⟨001|, +|011⟩⟨011| -|100⟩⟨100|, -|110⟩⟨110|-|111⟩⟨111|, 𝒟_2g = -|-⟩⟨+|, 𝒟_-2g = -|+⟩⟨-|. Also, 𝒟^-ω=𝒟^ω^† gives the corresponding operators for the opposite processes. 100 Allahverdyan A. E. Allahverdyan and T. M. Nieuwenhuizen, Extraction of Work from a Single Thermal Bath in the Quantum Regime, Phys. Rev. Lett. 85, 1799 (2000). Gemmer G. Gemmer, M. Michel, and G. Mahler, Quantum Thermodynamics (Springer, New York, 2004). Kosloff R. Kosloff, Quantum Thermodynamics: A Dynamical Viewpoint, Entropy 15, 2100 (2013). Brand F. Brandão, M. Horodecki, N. Ng, J. Oppenheim, and S. Wehner, The second laws of quantum thermodynamics, Proceedings of the National Academy of Sciences 112, 3275 (2015). Gardas B. Gardas and S. Deffner, Thermodynamic universality of quantum Carnot engines, Phys. Rev. E 92, 042126 (2015). Gelbwaser D. Gelbwaser-Klimovsky, W. Niedenzu, and G. Kurizki, Thermodynamics of quantum systems under dynamical control, Adv. At. Mol. Opt. Phys. 64, 329 (2015). Misra A. Misra, U. Singh, M. N. Bera, and A. K. Rajagopal, Quantum Rényi relative entropies affirm universality of thermodynamics, Phys. Rev. E 92, 042161 (2015). Millen J. Millen and A. Xuereb, Perspective on quantum thermodynamics, New Journal of Physics 18, 011002 (2016). Vinjanampathy S. Vinjanampathy and J. Anders, Quantum thermodynamics, Contemporary Physics 57, 545 (2016). Goold J. Goold, M. Huber, A. Riera, L. del Rio, and P. Skrzypczyk, The role of quantum information in thermodynamics—a topical review, Journal of Physics A: Mathematical and Theoretical 49, 143001 (2016). Benenti G. Benenti, G. Casati, K. Saito, and R. S. Whitney, Fundamental aspects of steady-state conversion of heat to work at the nanoscale, Phys. Rep. 694, 1 (2017). Binder F. Binder, L. A. Correa, C. Gogolin, J. Anders, and G. Adesso, Thermodynamics in the Quantum Regime: Fundamental Aspects and New Directions (Springer, 2018). Deffner S. Deffner and S. Campbell, Quantum Thermodynamics (Morganand Claypool Publishers, 2019). Palao J. P. Palao, R. Kosloff, and J. M. Gordon, Quantum thermodynamic cooling cycle, Phys. Rev. E 64, 056130 (2001). Feldmann T. Feldmann and R. Kosloff, Quantum four-stroke heat engine: Thermodynamic observables in a model with intrinsic friction, Phys. Rev. E 68, 016101 (2003). Popescu N. Linden, S. Popescu, and P. Skrzypczyk, How Small Can Thermal Machines Be? The Smallest Possible Refrigerator Phys. Rev. Lett. 105, 130401 (2010). Levy1 A. Levy and R. Kosloff, Quantum Absorption Refrigerator, Phys. Rev. Lett. 108, 070604 (2012). Levy R. Kosloff and A. Levy, Quantum Heat Engines and Refrigerators: Continuous Devices, Annual Review of Physical Chemistry 65, 365 (2014). Uzdin R. Uzdin, A. Levy, and R. Kosloff, Equivalence of Quantum Heat Machines, and Quantum-Thermodynamic Signatures, Phys. Rev. X 5, 031044 (2015). Scarani S. Nimmrichter, A. Roulet and V. Scarani, “Quantum rotor engines,” in Thermodynamics in the Quantum Regime: Fundamental Aspects and New Directions, edited by F. Binder, L. A. Correa, C. Gogolin, J. Anders, and G. Adesso Springer International Publishing, 227–245, (2018). Clivaz F. Clivaz, R. Silva, G. Haack, J. B. Brask, N. Brunner, and M. Huber, Unifying Paradigms of Quantum Refrigeration: A Universal and Attainable Bound on Cooling, Phys. Rev. Lett. 123, 170605 (2019). Mitchison M. T. Mitchison, Quantum thermal absorption machines: refrigerators, engines and clocks, Contemporary Physics 60, 164 (2019). Yuan Q. Yuan, T. Wang, P. Yu, H. Zhang, H. Zhang, and W. Ji, A review on the electroluminescence properties of quantum-dot light-emitting diodes, Organic Electronics 90, 106086 (2021). Joulain K. Joulain, J. Drevillon, Y. Ezzahri, and J. Ordonez-Miranda, Quantum Thermal Transistor, Phys. Rev. Lett. 116, 200601 (2016). Zhang Y. Zhang, Z. Yang, X. Zhang, B. Lin, G. Lin, and J. Chen, Coulomb-coupled quantum-dot thermal transistors, Europhysics Letters 122 17002 (2018). Su S. Su, Y. Zhang, B. Andresen, and J. Chen, Quantum coherence thermal transistors, arXiv:1811.02400. Mandarino A. Mandarino, K. Joulain, M. D. Gómez, and B. Bellomo, Thermal transistor effect in quantum systems, Phys. Rev. Applied 16, 034026 (2021). Alicki_Fannes ] R. Alicki and M. Fannes, Entanglement boost for extractable work from ensembles of quantum batteries, Phys. Rev. E 87, 042123 (2013). Campaioli F. Campaioli, F. A. Pollock and S. Vinjanampathy, Quantum Batteries - Review Chapter, arXiv:1805.05507. Dutta S. Bhattacharjee and A. Dutta, Quantum thermal machines and batteries, Eur. Phys. J. B 94, 239 (2021). Kosloff2 E. Geva and R. Kosloff , On the classical limit of quantum thermodynamics in finite time, J. Chem. Phys. 97, 4398 (1992). Kosloff1 T. Feldmann and R. Kosloff, Performance of discrete heat engines and heat pumps in finite time, Phys. Rev. E 61, 4774 (2000). Wehner_new N. H. Y. Ng, M. P. Woods, and S. Wehner, Surpassing the Carnot efficiency by extracting imperfect work, New Journal of Physics 19, 113005 (2017). Kurizki_new W. Niedenzu, V. Mukherjee, A. Ghosh, A. G. Kofman, and G. Kurizki, Quantum engine efficiency bound beyond the second law of thermodynamics, Nature Communications 9, 165 (2018). Chen_LiuY. Y. Xu, B. Chen, and J. Liu, Achieving the classical Carnot efficiency in a strongly coupled quantum heat engine, Phys. Rev. E 97, 022130 (2018). Dorner R. Dorner, J. Goold, C. Cormick, M. Paternostro, and V. Vedral, Emergent Thermodynamics in a Quenched Quantum Many-Body System, Phys. Rev. Lett. 109, 160601 (2012). Mehboudi M Mehboudi, M Moreno-Cardoner, G De Chiara and A Sanpera, Thermometry precision in strongly correlated ultracold lattice gases, New J. Phys. 17, 055020 (2015). Reimann P. Reimann, Eigenstate thermalization: Deutsch's approach and beyond, New J. Phys. 17, 055025 (2015). Eisert J. Eisert, M. Friesdorf and C. Gogolin, Quantum many-body systems out of equilibrium, Nature Phys. 11, 124 (2015). Gogolin C. Gogolin and Jens Eisert, Equilibration, thermalisation, and the emergence of statistical mechanics in closed quantum systems, Rep. Prog. Phys. 79 056001 (2016). Skelt A. H. Skelt, K. Zawadzki and I. D'Amico, Many-body effects on the thermodynamics of closed quantum systems, J. Phys. A: Math. Theor. 52 485304 (2019). Gour G. Gour, M. P. Müller, V. Narasimhachar, R. W. Spekkens and N. Y. Halpern, The resource theory of informational nonequilibrium in thermodynamics, Phys. Rep. 583, 1 (2015). Fazio M. Campisi, J. Pekola, and R. Fazio, Nonequilibrium fluctuations in quantum heat engines: theory, example, and possible solid state experiments New Journal of Physics 17, 035012 (2015). Rigol L. D’Alessio, Y. Kafri, A. Polkovnikov, and M. Rigol, From Quantum Chaos and Eigenstate Thermalization to Statistical Mechanics and Thermodynamics, Advances in Physics 65, 239 (2016). Pekola2 B. Karimi and J. P. Pekola, Otto refrigerator based on a superconducting qubit: Classical and quantum performance, Phys. Rev. B 94, 184503 (2016). Aslan A. U. C. Hardal, N. Aslan, C. M. Wilson and O. E. Müstecaplıoğlu, Quantum heat engine with coupled superconducting resonators, Phys. Rev. E 96, 062120 (2017). Jordan S. K. Manikandan, F. Giazotto, and A. N. Jordan, Superconducting quantum refrigerator: Breaking and rejoining Cooper pairs with magnetic field cycles, Phys. Rev. Applied 11, 054034 (2019). Pekola F. Giazotto, T. T. Heikkilä, A. Luukanen, A. M. Savin and J. P.Pekola, Opportunities for mesoscopics in thermometry and refrigeration: Physics and applications, Rev. Mod. Phys. 78, 217 (2006). ionic1 O. Abah, J. Roßnagel, G. Jacob, S. Deffner, F. Schmidt-Kaler, K. Singer and E. Lutz, Single-Ion Heat Engine at Maximum Power, Phys. Rev. Lett. 109, 203006 (2012). ionic2 J. Roßnagel, S. T. Dawkins, K. N. Tolazzi, O. Abah, E. Lutz, F. Schmidt-Kaler and K. Singer, A single-atom heat engine, Science 352, 325 (2016). n_m_resonance J. P. S. Peterson, T. B. Batalhao, M. Herrera, A. M. Souza, R. S. Sarthour, I. S. Oliveira, and R. M. Serra, Experimental Characterization of a Spin Quantum Heat Engine, Phys. Rev. Lett. 123, 240601 (2019). Petruccione H. P. Breuer and F. Petruccione, The Theory of Open Quantum Systems (Oxford University Press, Oxford, 2002). Alicki R. Alicki and K. Lendi, Quantum Dynamical Semigroups and Applications (Springer, Berlin Heidelberg 2007). Rivas A. Rivas and S. F. Huelga, Open Quantum Systems: An Introduction (Springer Briefs in Physics, Springer, Spain, 2012). Lidar D. A. Lidar, Lecture Notes on the Theory of Open Quantum Systems, arXiv:1902.00967. non-Markov P. A. Camati, J. F. G. Santos, and R. M. Serra, Employing non-Markovian effects to improve the performance of a quantum Otto refrigerator Phys. Rev. A 102, 012217 (2020). Kurizki D. Gelbwaser-Klimovsky, W. Niedenzu, G. Kurizki, Thermodynamics of quantum systems under dynamical control, Advances In Atomic, Molecular, and Optical Physics 64, 329 (2015). Uzdin1 R. Uzdin, A. Levy, R. Kosloff, Quantum heat machines equivalence and work extraction beyond Markovianity, and strong coupling via heat exchangers, Entropy 18, 124 (2016). Kato A. Kato, Y. Tanimura, Quantum Heat Current under Non-perturbative and Non-Markovian Conditions: Applications to Heat Machines, Journal of Chemical Physics 145, 224105 (2016). Chen H.-B. Chen, P.-Y. Chiu, Y.-N. Chen, Vibration-induced coherence enhancement of the performance of a biological quantum heat engine, Phys. Rev. E 94, 052101 (2016). Ostmann P. Ostmann, W. T. Strunz,Cooling and frequency shift of an impurity in a ultracold Bose gas using an open system approach, arXiv:1707.05257. Arpan A. Das, V. Mukherjee, A quantum enhanced finite-time Otto cycle, Phys. Rev. Research 2, 033083 (2020). Shirai Y. Shirai, K. Hashimoto, R. Tezuka, C. Uchiyama, N. Hatano, Non-Markovian effect on quantum Otto engine: -Role of system–reservoir interaction, Phys. Rev. Research 3, 023078 (2021). Raja S. H. Raja, S. Maniscalco, G.-S. Paraoanu, J. P. Pekola, N. Lo Gullo, Finite-time quantum Stirling heat engine, New J. Phys 23, 033034 (2021). Chakraborty S. Chakraborty, A. Das, D. Chruściński, Strongly coupled quantum Otto cycle with single qubit bath, arXiv:2206.14751. Carrega M. Carrega, L. M. Cangemi, G. De Filippis, V. Cataudella, G. Benenti, M. Sassetti, Engineering dynamical couplings for quantum thermodynamic tasks, PRX quantum 3 010323 (2022). Koyanagi S. Koyanagi, Y. Tanimura, Numerically "exact" simulations of a quantum Carnot cycle: Analysis using thermodynamic work diagrams, J. Chem. Phys. 157, 084110 (2022). Filippis F. Cavaliere, M. Carrega, G. De Filippis, V. Cataudella, G. Benenti, M. Sassetti, Dynamical heat engines with non–Markovian reservoirs, Physical Review Research 4, 033233 (2022). Krzysztof K. Ptaszyński, Non-Markovian thermal operations boosting the performance of quantum heat engines, Phys. Rev. E 106, 014114 (2022). Popescu2 P. Skrzypczyk, N. Brunner, N. Linden and S. Popescu, The smallest refrigerators can reach maximal efficiency, Journal of Physics A: Mathematical and Theoretical 44, 492002 (2011). Popescu3 N. Brunner, N. Linden, S. Popescu, and P. Skrzypczyk, Virtual qubits, virtual temperatures, and the foundations of thermodynamics, Phys. Rev. E 85, 051117 (2012). Popescu4 N. Brunner, M. Huber, N. Linden, S. Popescu, R. Silva and P. Skrzypczyk, Entanglement enhances cooling in microscopic quantum refrigerators, Phys. Rev. E 89, 032115 (2014). Brask J. B. Brask and N. Brunner, Small quantum absorption refrigerator in the transient regime: Time scales, enhanced cooling and entanglement, Phys. Rev. E 92, 062101 (2015). Palao2 L. A. Correa, J. P. Palao, G. Adesso and D. Alonso, Performance bound for quantum absorption refrigerators, Phys. Rev. E 87, 042131 (2013). Palao3 L. A. Correa, J. Palao, D. Alonso and G. Adesso, Quantum-enhanced absorption refrigerators, Scientific Reports 4, 3949 (2014). Silva R. Silva, P. Skrzypczyk and N. Brunner, Small quantum absorption refrigerator with reversed couplings, Phys. Rev. E 92, 012136 (2015). Woods M. T. Mitchison, M. P. Woods, J. Prior, and M. Huber, Coherence-assisted single-shot cooling by quantum absorption refrigerators, New Journal of Physics 17, 115013 (2015). Fazio2P. A. Erdman, B. Bhandari, R. Fazio, J. P. Pekola and F. Taddei, Absorption refrigerators based on Coulomb-coupled single-electron systems, Phys. Rev. B 98, 045433 (2018). Sreetama S. Das et al, Necessarily transient quantum refrigerator, EPL 125, 20007 (2019). Naseem M. T. Naseem, A. Misra, and Özgür E Müstecaplıoğlu, Engineering entanglement between resonators by hot environment, Quantum Science and Technology 5, 035006 (2020). Chiara A. Hewgill, J. O. Gonzalez, J. P. Palao, D. Alonso, A. Ferraro and G. De Chiara, Three-qubit refrigerator with two-body interactions, Phys. Rev. E 101, 012109 (2020). Bhandari B.Bhandari and A.N.Jordan, Minimal two-body quantum absorption refrigerator, Phys. Rev. B 104, 075442 (2021). Ghoshal2 A.Ghoshal, S.Das, A.K.Pal, A.Sen(De), and U.Sen, Three qubits in less than three baths: Beyond two-body system-bath interactions in quantum refrigerators, Phys. Rev. A 104, 042208 (2021). Tanoy1 T.K.Konar, S.Ghosh, A.K.Pal, and A.Sen(De), Designing robust quantum refrigerators in disordered spin models, Phys. Rev. A 105, 022214 (2022). Tanoy3 T.K.Konar, S.Ghosh, A.Sen De, Refrigeration via purification through repeated measurements, Phys. Rev. A 106, 022616 (2022). Damas G. G. Damas, R. J. de Assis, N. G. de Almeida, Cooling with fermionic reservoir, arXiv:2207.08862. Okane H. Okane, S. Kamimura, S. Kukita, Y. Kondo, Y. Matsuzaki, Quantum Thermodynamics applied for Quantum Refrigerators cooling down a qubit, arXiv:2210.02681. Man Z.-X. Man and Y.-J. Xia, Smallest quantum thermal machine: The effect of strong coupling and distributed thermal tasks, Phys. Rev. E 96, 012122 (2017). Segal H. M. Friedman and D. Segal, Cooling condition for multilevel quantum absorption refrigerators, Phys. Rev. E 100, 062112 (2019). Wang J. Wang, Y. Lai, Z. Ye, J. He, Y. Ma, and Q. Liao, Efficiency at maximum power of a quantum heat engine based on two coupled oscillators, Phys. Rev. E 91, 050102 (2015). Tanoy2 T. K. Konar, S. Ghosh, A. K. Pal, A. Sen De, Beyond Qubits: Building Quantum Refrigerators in Higher Dimensions, arXiv:2112.13765. Cao H.-J. Cao, F. Li, S.-W. Li, Quantum refrigerator driven by nonclassical light, arXiv:2209.03674. Giovannetti D. Venturelli, R. Fazio and V. Giovannetti, Minimal Self-Contained Quantum Refrigeration Machine Based on Four Quantum Dots, Phys. Rev. Lett. 110, 256801 (2013). Monsel J. Monsel, J. Schulenborg, T. Baquet, J. Splettstoesser, Geometric energy transport and refrigeration with driven quantum dots, arXiv:2202.12221. Plenio M. T. Mitchison, M. Huber, J. Prior, M. P. Woods and M. B.Plenio, Realising a quantum absorption refrigerator with an atom-cavity system, Quantum Science and Technology 1, 015001 (2016). Potts M. T. Mitchison and P. P. Potts, “Physical implementations of quantum absorption refrigerators,” in Thermodynamics in the Quantum Regime: Fundamental Aspects and New Directions, edited by F. Binder, L. A. Correa, C. Gogolin, J. Anders and G. Adesso (Springer International Publishing, Cham, 2018) pp. 149–174. Brask2 P. P. Hofer, M. Perarnau-Llobet, J. B. Brask, R. Silva, M. Huber and N. Brunner, Autonomous quantum refrigerator in a circuit QED architecture based on a Josephson junction, Phys. Rev. B 94, 235420 (2016). Scarani2 G. Maslennikov, S. Ding, R. Hablützel, J. Gan, A. Roulet, S. Nimmrichter, J. Dai, V. Scarani and D. Matsukevich, Quantum absorption refrigerator with trapped ions, Nature Communications 10, 202 (2019). Misra_Pati S. Bhattacharya, A. Misra, C. Mukhopadhyay, and A. K. Pati, Exact master equation for a spin interacting with a spin bath: Non-Markovianity and negative entropy production rate, Phys. Rev. A 95, 012122 (2017). Prokofev N. Prokof́ev, P. Stamp, Theory of the spin bath, Rep. Prog. Phys. 63, 669 (2000). Fisher_Breuer J. Fischer and H.-P. Breuer, Correlated projection operator approach to non-Markovian dynamics in spin baths, Phys. Rev. A 76, 052119 (2007). Chitra S. Camalet and R. Chitra, Effect of random interactions in spin baths on decoherence, Phys. Rev. B 75, 094434 (2007). Majumdar S. Bhattacharya, B. Bhattacharya, and A. S. Majumdar, Thermodynamic utility of Non-Markovianity from the perspective of resource interconversion, arXiv:1902.05864. Breuer1 H.-P. Breuer, D. Burgarth, and F. Petruccione, Non-Markovian dynamics in a spin star system: Exact solution and approximation techniques, Phys. Rev. B 70, 045323 (2004). Ghoshal A. Ghoshal, U.Sen, Multiparty Spohn's theorem for mixed local Markovian and non-Markovian quantum dynamics, arXiv:2208.13026. RHP0 A Rivas, S. F. Huelga, and M. B. Plenio, Quantum Non-Markovianity: Characterization, Quantification and Detection, Rep. Prog. Phys. 77, 094001 (2014). BLP H.P. Breuer, E.-M. Laine, and J. Piilo, Measure for the Degree of Non-Markovian Behavior of Quantum Processes in Open Systems, Phys. Rev. Lett. 103, 210401 (2009). RHP A. Rivas, S. F. Huelga, and M. B. Plenio, Entanglement and Non-Markovianity of Quantum Evolutions, Phys. Rev. Lett. 105, 050403 (2010). Chrusci D. Chruściński, A. Kossakowski, Á. Rivas, On measures of ´ non-Markovianity: divisibility vs. backflow of information, Phys. Rev. A. 83, 052128 (2011). Zheng H.-S. Zeng, N. Tang, Y.-P. Zheng, and G.-Y. Wang, Equivalence of the measures of non-Markovianty for open two-level systems, Phys. Rev. A. 84, 032118 (2011). Debarba T. Debarba and F. F. Fanchini, Non-Markovianity quantifier of an arbitrary quantum process, Phys. Rev. A 96, 062118 (2017). Strasberg P. Strasberg and M. Esposito, Response Functions as Quantifiers of Non-Markovianity, Phys. Rev. Lett. 121, 040601 (2018). Das_Roy S. Das, S. S. Roy, S. Bhattacharya, and U. Sen, Nearly Markovian maps and entanglement-based bound on corresponding non-Markovianity, J. Phys. A: Math. Theor. 54, 395301 (2021). Huang_Guo Z. Huang and X.-K. Guo, Quantifying non-Markovianity via conditional mutual information, Phys. Rev. A 104, 032212 (2021). Sanderson C. Sanderson and R. Curtin, Armadillo: a template-based C++ library for linear algebra, Journal of Open Source Software 1, 26 (2016). Sanderson1 C. Sanderson and R. Curtin, Lecture Notes in Computer Science (LNCS) 10931, 422 (2018). QIClib T. Chanda, QIClib, <https://titaschanda.github.io/QIClib>.
http://arxiv.org/abs/2303.07231v1
20230313160417
Closed-form propagator of the Calogero model
[ "Valdemar Melin", "Edwin Langmann" ]
quant-ph
[ "quant-ph", "math-ph", "math.MP", "nlin.SI", "81Q80 (Primary) 81Q05, 33C50, 35K08 (Secondary)" ]
Department of Physics, KTH Royal Institute of Technology, SE-106 91 Stockholm, Sweden Nordita, KTH Royal Institute of Technology and Stockholm University, SE-106 91 Stockholm, Sweden We present an exact closed-form expression for the propagator of the Calogero model, i.e., for the integral kernel of the time evolution operator of the quantum many-body system on the real line with an external harmonic potential and inverse-square two-body interactions. This expression is obtained by combining two results: first, a simple formula relating this propagator to the eigenfunctions of the Calogero model without harmonic potential and second, a formula for these eigenfunctions as finite sums of products of polynomial two-body functions. Closed-form propagator of the Calogero model Edwin Langmann March 12, 2023 ============================================ Introduction. Integrable systems have always played an important role in physics, with historic examples including the Kepler problem and the quantum mechanical model of hydrogen. Today, quantum many-body systems of Calogero-Moser-Sutherland (CMS) type <cit.> have become prime integrable models due to their successful applications in many different areas of physics, including (quantum) hydrodynamics, gauge theories, solitons, fractional quantum Hall effect, conformal field theory, and non-equilibrium physics; see e.g. <cit.>. Furthermore, the intriguing mathematics behind these models has received attention by mathematical physicists and mathematicians with specializations as diverse as representation theory, differential geometry, combinators, and the modern theory of special functions; see e.g. <cit.>. However, despite of all this work, we are still far from knowing all quantities of interest in physics for CMS-type models analytically. One important such example is the propagator, i.e., the integral kernel of the time evolution operator in position representation. Numerical solutions of the time-dependent Schrödinger equation are typically restricted to small particle numbers and, for this reason, exact propagators are of interest to the large community of physicists trying to understand the dynamics of real quantum systems. Unfortunately, as for today, few examples of exact propagators are known in closed form; these examples include the heat kernel for the non-interacting case, the Mehler kernel for the quantum harmonic oscillators, and and the Hille-Hardy formula for the propagator of the singular harmonic oscillator; see e.g. <cit.>. In this paper, we present exact analytic formulas for the propagator of the quantum many-body system studied by Calogero in his seminal paper <cit.>; see (<ref>)–(<ref>) for one way to write our result in closed form. Since the Calogero model is a prototype for interacting systems in one dimension, we believe that our results are of general interest in physics. Furthermore, our exact results for the Calogero model suggest a new kind of ansatz to find approximate wave functions for generic quantum many-body systems taking into account non-trivial correlations (this is discussed in our conclusions). We also hope that our results can inspire future work finding exact propagators for other CMS-type quantum systems. Calogero model. The Calogero model is a many-body generalization of the quantum harmonic oscillator to an arbitrary number, N, of particles with inverse-square two-body interactions; it is defined by the quantum mechanical Hamiltonian (i<j is short for 1≤ i<j≤ N) H = ∑_i=1^N1/2( -∂^2/∂ x_i^2 + ^2x_i^2 ) + ∑_i<jℓ(ℓ+1)/(x_i-x_j)^2 where x_i∈ are the particle positions, and ≥ 0 and ℓ≥ -1/2 are parameters determining the strength of the harmonic potential and two-body interactions, respectively (we use units such that m=ħ=1). We recall that the eigenfunctions of H of interest in physics have the form Ψ(x) =^- x^2/2_N(x)^ℓ+1P(x) with P(x) symmetric and analytic functions in the variables x=(x_1,…,x_N)∈^N, x^2 short for ∑_i=1^Nx_i^2, and _N(x)∏_i<j(x_i-x_j) the Vandermonde. In particular, since the Vandermonde changes sign under particle exchanges x_1↔ x_2 etc., the Calogero models describes fermions and bosons for even and odd integers ℓ, respectively; for this reason, we restrict ourselves to integer ℓ≥ 0. For >0, the functions P(x) are symmetric polynomials which are natural many-variable generalizations of the Hermite polynomials <cit.>; in this case, the Calogero model has discrete energy eigenvalues. The case =0 is special in that the Calogero Hamiltonian has continuous spectrum and the eigenfunctions are generalizations of (anti-)symmetrized plane waves; as will be seen, this case is important for us. The propagator of the Calogero model is the time evolution operator in position representation for H in (<ref>), K_N(x,y;t)⟨ x|^- Ht|y⟩, using the Dirac bra-ket notation. Mathematically, this propagator can be defined as integral kernel in the following solution of the time dependent Schrödinger equation ∂_tψ(x;t)=Hψ(x;t), ψ(x;t) = ∫_^N K_N(x,y;t)ψ_0(y) d^N y with ψ_0(x)ψ(x;0) an arbitrary wave function at initial time t=0 <cit.>. Our explicit formula for this propagator in (<ref>) below is obtained by combining two results: (i) A relation between K_N(x,y;t) and the eigenfunctions Ψ_N(x;p) of the Calogero Hamiltonian H|_=0 in (<ref>) for =0 (Proposition 1), (ii) a simple explicit formula for Ψ_N(x;p) (see Proposition 2 for N=3 and (<ref>) with (<ref>) in general). Relation to wave functions. To motivate our first result, we recall the well-known propagator for the quantum harmonic oscillator H|_N=1 known as Mehler kernel, K_1(x,y;t) = ^[(x^2+y^2)cos( t)-2xy]/2sin( t)/(2πsin( t)/)^1/2 (x,y∈); see e.g. <cit.>. From this, one can obtain the propagator of the Calogero model in the non-interacting case ℓ=0, which describes non-interacting fermions in a harmonic potential, as follows: multiply the product of N Mehler kernels for the variables x_i, i=1,…,N, and anti-symmetrize, i.e., K_N(x,y;t)|_ℓ=0= 1/N!∑_σ∈ S_N_σ∏_i=1^N K_1(x_σ(i),y_i;t) with S_N is the permutation group and _σ=+1 and -1 for even and odd permutations σ∈ S_N, respectively. We note that (<ref>) can be written as K_N(x,y;t) = ^(x^2+y^2)/2tan( t)/(2πsin( t)/)^N/2Ψ_N(x;- y/sin( t)) with Ψ_N(x;p)|_ℓ=0 = (1/N!)∑_σ∈ S_N_σ^ p· x_σ the plane-wave eigenfunction of the Hamiltonian H_ℓ=0,=0 describing non-interacting fermions on the real line without harmonic potential (we use the short-hand notation x_σ and p· x for (x_σ(1),…,x_σ(N)) and ∑_i=1^N p_ix_i, respectively). We found that the propagator of the Calogero model is given by (<ref>) even for non-zero ℓ but where Ψ_N(x;p) is the eigenstate of the corresponding Calogero Hamiltonian H|_=0 without harmonic potential. To be precise (see the Appendix for proof): Proposition 1: The propagator of the Calogero model is given by (<ref>) with the wave function Ψ_N(x;p) satisfying the following conditions: (i) it solves the stationary Schrödinger equation H|_=0Ψ_N(x;p)=(p^2/2)Ψ_N(x;p), (ii) it converges to (1/N!)∑_σ∈ S_N_σ^ℓ+1^ p· x_σ in the limit |x_i-x_i+1|→∞, i=1,…,N-1, where all particles are infinitely far apart, (iii) Ψ_N(x;p)/_N(x)^ℓ+1 is analytic and symmetric in the variables x, (iv) Ψ_N(x;p) satisfies the scaling relations Ψ_N(sx;p) =Ψ_N(x;sp) (s>0). We believe this result deserves to be generally known: the wave function Ψ_N(x;p), p∈^N, appearing in the exact formula (<ref>) for the propagator of the Calogero model is identical with the eigenfunctions of the translationally invariant Calogero Hamiltonian H|_=0 of interest in physics. It is known that the conditions (i)–(iii) above determine these eigenfunctions uniquely; as shown in Appendix A, (iv) is implied by (i)–(iii). Explicit wave functions. There exist several explicit formulas for the wave function Ψ_N(x;p) in the literature (such results can be found in <cit.>, for example); any of these provides an explicit formula for the propagator K_N(x,y;t) by (<ref>). We found a formula for this wave function which has a natural physics interpretation and is particularly simple from a computational point of view: Ψ_N(x;p) = 1/N!∑_σ∈ S_N_σ^ℓ+1_N(x_σ;p) ^ p· x_σ with _N(x;p) a finite(!) linear combination of products of the polynomials F_k(X)∑_a=k^ℓ(ℓ+a)!/(ℓ-a)!(a-k)!1/X^a (k=0,…,ℓ) in the variables 1/X=1/X_i,j with X_i,j - (p_i-p_j)(x_i-x_j) (1≤ i<j≤ N) ; see (<ref>) below for general N and (<ref>) for N=3. To motivate this result and explain the significance of the polynomials in (<ref>), we recall that the known eigenfunctions in the two-body case N=2 are given by <cit.> Ψ_2(x;p) = ^(x_1+x_2)(p_1+p_2)/2(-)^ℓ+1z_ℓ(z) with z (p_1-p_2)(x_1-x_2)/2, where _ℓ(z) are spherical Bessel functions <cit.>. One can verify that (<ref>) can be written as in (<ref>) with _2(x;p)=F_0(X_1,2) the function in (<ref>) for k=0 and with X_1,2 in (<ref>) (using e.g. <cit.>) <cit.>. Thus, F_0(X) accounts for the two-body correlations in the Calogero model for =0. Since F_0(X)→ 1 as X→∞, Ψ_2(x;p) simplifies to symmetrized or anti-symmetrized plane waves in the limit |x_1-x_2|→∞ when the particles are infinitely apart, as expected. The other functions in (<ref>) are descendants of F_0(X) in the following sense, F_k(X)=∂_s^kF_0(X/s)|_s=1 for k=1,…,ℓ. Moreover, the larger k, the faster F_k(X) decays as X→∞: F_k(X)=(ℓ+k)!/(ℓ-k)!X^k+… with the dots indicating terms vanishing faster as X→∞. For example, for ℓ=1 we have F_0(X)=1+2/X and F_1(X)=2/X, and for ℓ=2 these functions are F_0(X)=1+6/X+12/X^2, F_1(X)=6/X+24/X^2, and F_2(X)=24/X^2, etc. In the N-body case and in the asymptotic region when all particles are infinitely far apart, the two-body interactions are irrelevant and the eigenfunction Ψ_N(x;p) can be obtained by symmetrizing or anti-symmetrizing a product of N one-particle eigenfunctions; this corresponds to (<ref>) with _N(x;p)→ 1 in the asymptotic region. More generally, the function _N(x;p) must satisfy cluster properties as a consequence of the fact that interactions vanish for particles infinitely far apart: if we take the limit where we divide the particles into K groups of N_J particles, J=1,…,K and ∑_J=1^K N_J=N, and such that particles in the same group keep finite distances but particles in different groups become infinitely apart, the interactions between particles in different groups become irrelevant and _N(x;p) →∏_J=1^K _N_J(x_J;p_J) where x_J∈^N_J and p_J∈^N_J are the positions and momenta of the particles in the group J (_1= 1). Clearly, (<ref>) is a highly restrictive constraint on the function _N(x;p). For example, by choosing all N_J to be 2 or 1 one finds that (<ref>) implies _N(x;p) = ∏_1≤ i<j≤ N_2((x_i,x_j);(p_i,p_j)) + ⋯ where the dots indicate sub-leading terms. The considerations in the previous paragraph are general and apply to any translationally invariant quantum-many body systems with two-body interactions that vanish in the limit when particles distances become infinite. It thus is not surprising that (<ref>) holds true for the Calogero model with _2((x_i,x_j);(p_i,p_j))=F_0(X_i,j). What is special for the Calogero model is that the sub-leading terms in (<ref>) can be also written as linear combinations of products of two-body functions in (<ref>): we found that the function _N(x;p) in (<ref>) has the exact form _N(x;p) = ∑_𝐤 c_N(𝐤) ∏_1≤ i<j≤ N F_k_i,j(X_i,j) with coefficients c_N(𝐤) depending on the integer vectors 𝐤=(k_i,j)_1≤ i<j≤ N in the finite set {0,…,ℓ}^N(N-1)/2. We believe there is a simple general formula for the coefficients c_N(𝐤); at this point, we know this formula in some special cases, including N=3 and arbitrary integers ℓ>0: Proposition 2. For N=3, the eigenfunctions of H|_=0 characterized in Proposition 1 are given by (<ref>) and _3(x;p) = ∑_k=0^ℓ(ℓ-k)!/(ℓ+k)!k!F_k(X_1,2)F_k(X_1,3)F_k(X_2,3) with F_k(X) in (<ref>) and X_i,j in (<ref>). We discovered this formula by computer experiments and subsequently found a mathematical proof for all ℓ; since this proof is technical and it is easy to verify the result for ℓ=1,…,10 using symbolic computing software on a laptop, we plan to publish this proof elsewhere. We also obtained explicit results for larger values of N for the simplest non-trivial case ℓ=1; see Appendix B(ii). Clearly, by combining Propositions 1 and 2, we obtain a fully explicit propagator for the Calogero model for the case N=3. Moreover, by finding an explicit formula for the coefficients c_N(𝐤) in (<ref>), this can be extended to other particle numbers N. By combining cluster property (<ref>) with the results (<ref>) and (<ref>) for N=2 and N=3, respectively, many (but not all) of the coefficients c_N(𝐤) can be determined. Fig. <ref> shows two examples of visualizations of the propagator for (N,ℓ)=(3,2). Conclusions. We present exact analytic results for the Calogero model providing the following many-body generalization of the Mehler kernel K_1 in (<ref>), K_N(x,y;t) = 1/N!∑_σ∈ S_N_σ^ℓ+1∏_i=1^N K_1(x_σ(i),y_i;t) ×∑_𝐦 C_N(𝐦) ∏_ i<j( -sin(ω t)/ω/(x_σ(i)-x_σ(j))(y_i-y_j))^m_ij with 𝐦=(m_i,j)_1≤ i<j≤ N∈{0,…,ℓ}^N(N-1)/2 and postive-integer coefficients C_N(𝐦) which, for N=2 and N=3, are given by ((a,b,c) is short for (m_12,m_13,m_23)), C_2(a) = (ℓ+a)!/(ℓ-a)!a! and C_3(a,b,c) = C_2(a)C_2(b)C_2(c) ×∑_k=0^min(a,b,c)(ℓ-k)!a!b!c!/(ℓ+k)!k!(a-k)!(b-k)!(c-k)!, respectively. We expect that similar positive integer formulas for C_N(𝐦) exist for all N=4,5,…; see Appendix B(ii) for results on C_N(𝐦) for ℓ=1 and arbitrary N. Our closed-form expressions for the propagator of the Calogero model provide analytic tools to compute the dynamics of a prototype quantum many-body system with non-trivial interactions. We hope that this will find applications in, for example, non-equilibrium physics or realizations of the Calogero model in cold atom systems <cit.>. One important ingredient to our result is a formula for the eigenfunctions of the Calogero model without harmonic potential which is of interest in its own right; see (<ref>) and Proposition 2. In particular, we propose to use this exact result as a guide to find approximate wave functions for other quantum many-body systems. The simplest example would be (<ref>) with _2(x;p) obtained by solving the two-body problem (ignoring the dots) or, alternatively, one could try to find a mean-field type equation determining _2(x;p). More generally, one could use (<ref>) as an ansatz for the three-body wave function with F_k(X_i,j) replaced by variational two-body functions _2^(k)((x_i,x_j);(p_i,p_j)), k=0,…,ℓ, and then use (<ref>) for the many-body wave functions: in this way, one could try to systematically improve the approximate wave functions by increasing ℓ and having the cluster properties (<ref>) always satisfied. Our result for N=2 was known before: in this case, the propagator given in (<ref>) and (<ref>) is a product of a Mehler kernel for the center-of-mass x_1+x_2, and the propagator for the singular harmonic oscillator given by the Hille-Hardy formula <cit.> for the relative coordinate x_1-x_2. We also mention an integral representation of the propagator of the Calogero model in the special case ℓ=-1/2 obtained in Ref. <cit.>. Proposition 2 has relations to previous results in the mathematics literature <cit.>, as discussed in more detail in Appendix C(v) and (vi). Clearly, it would be interesting to extend Proposition 2 to all particle numbers N>3. The interested reader can find further results and further remarks on mathematical aspects of our work in Appendix B and C, respectively. Acknowledgements. We would like to thank Martin Hallnäs and Masatoshi Noumi for helpful discussions. We are grateful to Martin Hallnäs for pointing out Ref. <cit.> containing results coming close to our Proposition 1. E.L. acknowledges support from the European Research Council, Grant Agreement No. 2020-810451. Appendix A: Proof of Proposition 1. We first show that properties (i)–(iii) of the eigenfunction Ψ_N(x;p) imply property (iv): Replacing x→ sx (s>0) changes H|_=0→ s^-2H|_=0. Therefore, (i) implies s^-2H|_=0Ψ_N(sx;p)=(p^2/2)Ψ_N(sx;p); clearly, this equation is also satisfied by Ψ_N(x;sp). Moreover, (ii) and (iii) are satisfied by Ψ(sx;p) if and only if they are satisfied by Ψ(x;sp). Since (i)–(iii) have a unique solution, (iv) follows. We note in passing that (iii) is a technical condition ruling out unphysical solutions. To verify that ψ in (<ref>) satisfies the pertinent time-dependent Schrödinger equation, we write K_N=GΨ_N with G short for ^(x^2+y^2)/2tan( t)/(2πsin( t)/)^N/2 and Ψ_N=Ψ_N(x;p) with p=- y/sin( t), suppressing arguments. We compute, using the product and chain rules of differentiation, (∂_t - H) K_N = G( (p^2/2)- H|_=0)Ψ_N + G /tanh( t)∑_i=1^N(x_j∂Ψ_N/∂ x_j - p_j∂Ψ_N/∂ p_j) + Ψ_N( ∂_t -H|_ℓ=0 -(p^2/2))G; we added and subtracted the same term (p^2/2)K_N in the first and last lines, respectively; the first and second term in the second line come from ∇ G·∇Ψ_N and G∂_tΨ_N, respectively, using ∂_t p_j = - p_j/tan( t); we included the two-body and harmonic potential terms in the first and third lines, respectively. By differentiating (<ref>) with respect to s and setting s=0 we obtain an identity showing that the terms in the second line in (<ref>) vanish. We now use the fact that, in the non-interacting case ℓ=0, Proposition 1 is true by (<ref>) (this is explained in the main text). This implies that (∂_t -H|_ℓ=0)GΨ_N|_ℓ=0=0. Thus, setting ℓ=0 in (<ref>) and using that H|_=ℓ=0Ψ_N|_ℓ=0=(p^2/2)Ψ_N|_ℓ=0, we find that ( ∂_t -H|_ℓ=0 -(p^2/2))G=0; this proves that the term in the third line in (<ref>) vanishes as well. Thus, if (<ref>) and (<ref>) hold true, then (∂_t - H) K_N=0, and this implies that ψ in (<ref>) is a solution of the time dependent Schrödinger equation ∂_tψ=Hψ. In the limit t→ 0 of (<ref>), one can replace the functions sin( t)/ and tan( t)/ by t and Ψ_N(x;- p/sin( t)) by (1/N!)∑_σ∈ S_N_σ^ℓ+1^-· x_σ· y/t, respectively; the latter follows from (ii). Thus, to compute the limit t→ 0 of ψ in (<ref>), we can replace K_N(x,y;t) in (<ref>) by ^(x^2+y^2)/2t/(2π t)^N/21/N!∑_σ∈ S_N_σ^ℓ+1^-· x_σ· y/t = 1/N!∑_σ∈ S_N_σ^ℓ+1^(x_σ -y)^2/2t/(2π t)^N/2; this is the well-known propagator of free fermions/bosons for even/odd ℓ, respectively, converging to the appropriate Dirac delta in the limit t→ 0. Thus, ψ in (<ref>) satisfies ψ(x;t)→ψ_0(x) as t→ 0. Appendix B: Further results. We give a further visualizations of our result in (i), and in (ii) we present results on the coefficients C_N(𝐦) in (<ref>) for ℓ=1 and N=4,5,…. (i) Fig. <ref> shows a visualization of the propagator for (N,ℓ)=(3,2) which is complementary to the one in Fig. <ref>: while Fig. <ref> shows K_3(x,y;t) for particular values of y=(y_1,y_2,y_3) and t as a function of the relative coordinates u=2^-1/2(x_1-x_2), v=6^-1/2(x_1+x_2-2x_3) for fixed center-of-mass x_1+x_2+x_3=0 (we follows Calogero <cit.> in our choice of coordinates), Fig. <ref> shows |K_3(x,y;t)| for these two examples (with everything else the same). To set this result in perspective we note that, for N=1 (Mehler kernel), |K_1(x,y;t)| is a time dependent constant (independent of x and y), i.e., the non-trivial structure in Fig. <ref> is due to many-body effects. We note in passing that the dark regions in Fig. <ref> containing the straight lines u=0 and v=± u/√(3) are a consequence of |K_3(x,y;t)| vanishing like |_3(x)|^3 as x_i→ x_j (1≤ i<j≤ 3). (ii) For ℓ=1, we computed the coefficients C_N(𝐦) for all N=2,…,5 using symbolic computer software. As explained below, our results suggest that the coefficients C_N(𝐦) have a combinatorial interpretation. For ℓ=1, the components m_i,j of 𝐦=(m_i,j)_i<j are either 0 or 1, and one can represent 𝐦 by the graph obtained by drawing N nodes i=1,…,N and connecting those pairs of nodes (i,j) where m_i,j=1. We found that the value of C_N(𝐦) does not depend on the labeling of the nodes and, for this reason, only topologically inequivalent such graphs need to be considered; see Fig. <ref> for these graphs for N=2,…,5 and the corresponding coefficients C_N(𝐦). More specifically, our results in Fig. <ref> are all consistent with the following Conjecture: Let f_n be the rational numbers determined by the following conditions, ∏_n=2^N f_n^Nn = ∏_n=2^N n! (N=2,3,4,…), i.e., f_2=2, f_3=3/2, f_4=8/9, f_5=135/128 etc. Then C_N(𝐦) = ∏_n=2^N f_n^q_n(𝐦) with q_n(𝐦) the number of cliques of size n in the graph associated with 𝐦 (a clique is a fully connected subgraph). It is not manifest but true that all C_N(𝐦) obtained in this way are integers ≥ 1. The conjecture implies, in particular, that for the vector 𝐦_max where all m_i,j=1 (corresponding to the maximally connected graph where all pairs of nodes are connected by edges), C_N(𝐦_max)=∏_n=2^N n!; we have a proof of the latter result for arbitrary N∈_≥ 2 (we plan to present this proof elsewhere). For general ℓ∈_≥ 1, one can identify 𝐦 with multigraphs consisting of N nodes with m_i,j∈{ 0,…,ℓ} counting the number of edges between node i and j, and C_N(𝐦) can be interpreted as amplitude corresponding to this multigraph. Appendix C: Further remarks. We give various remarks on mathematical aspects of our results. (i) We first obtained Proposition 1 by developing a quantum version of the projection method (which is a well-known method used to compute the exact time evolution of the classical variants of CMS systems <cit.>); this derivation of Proposition 1 is restricted to integer ℓ (we plan to present this derivation elsewhere). Subsequently, we discovered the elementary proof presented in Appendix A which applies even to non-integer ℓ. (ii) It is interesting to note that (<ref>) implies _N(x;p) = ∑_𝐦C_N(𝐦)/∏_i<j X_i,j^m_i,j where 𝐦=(m_i,j)_i<j∈{0,…,ℓ}^N(N-1)/2. We conjecture that all coefficients C_N(𝐦) in this formula are non-negative integers (since this is true in all cases we understand), and that they have interesting combinatorial interpretations (we discuss such an interpretation for ℓ=1 in Appendix B(ii)). (iii) It is interesting to note that the eigenfunctions Ψ_N(x;p) (<ref>) of the Calogero Hamiltonian H|_ω=0 are invariant under the exchange x↔ p and, for this reason, they are also eigenfunctions of the differential operator - ∑_i=1^N1/2∂^2/∂ p_i^2 + ∑_i<jℓ(ℓ+1)/(p_i-p_j)^2 with eigenvalue x^2/2. This property is known as bispectrality in the mathematics literature. (iv) The function _N(x;p)^ p· x is an eigenfunction of the Calogero Hamiltonian H|_ω=0 without harmonic potential, and the corresponding eigenvalue is p^2/2. It is important to note that this eigenfunction is unphysical since it is singular; the symmetrization (for odd ℓ) or anti-symmetrization (for even ℓ) in (<ref>) is needed to obtain the non-singular eigenfunctions Ψ_N(x;p) of interest in physics. To be more specific: While while _N(x;p)^ p· x diverges in the limit x_i→ x_j (i<j), the (anti-)symmetrized wave function Ψ_N(x;p) vanishes like _N(x)^ℓ+1 in any such limit (this is a consequence of Property (iii) in Proposition 1); this property is not manifest in our explicit formulas for Ψ_N(x;p). For N=2, this property is implied by well-known representations of the spherical Bessel functions making manifest that zj_ℓ(z) vanishes like z^ℓ+1 as z→ 0. For N≥ 3, this property can be proved using an explicit formula for the wave function Ψ_N(x;p) obtained by specializing a known kernel function representation of the eigenfunctions of the hyperbolic Calogero-Sutherland model <cit.> (we plan to present details on this elsewhere). We note in passing that this kernel function representation of Ψ_N(x;p) was useful for us during our work. (v) The functions Ψ_N(x;p) is equal to Opdam's Bessel functions for the A_N-1 case <cit.>. Moreover, _N(x;p)^ p· x is known as Baker–Akhiezer function in the mathematics literature <cit.>, and explicit formulas for this function were obtained in <cit.>. We believe our result in Proposition 2 is somewhat simpler from a computational point of view than previously known results. (vi) An explicit formula for asymptotically free eigenfunctions of the trigonometric Macdonald-Rujsenaars operators for N=3 that is similar Proposition 2 was obtained by Noumi and Shiraishi <cit.>; it would be interesting to understand the precise relation between their and our result. In particular, we hope that a future extension of Proposition 2 to N>3 could help to find an extension of the Noumi-Shiraishi result to N>3. (vii) It would be interesting to extend our results to non-integer ℓ≥ -1/2 where the Calogero model is known to describe anyons <cit.>. We expect that, for non-integer ℓ, the series corresponding to (<ref>) become infinite and, for this reason, nontrivial issues of convergence arise. It would also be interesting to find other CMS-type models were the eigenfunctions can be expressed as finite sums of products of two-body functions. 10 calogero1971 F. Calogero, “Solution of the one-dimensional N-body problems with quadratic and/or inversely quadratic pair potentials,” Journal of Mathematical Physics, vol. 12, no. 3, pp. 419–436, 1971. moser1976 J. Moser, “Three integrable hamiltonian systems connected with isospectral deformations,” in Surveys in Applied Mathematics, pp. 235–258, Elsevier, 1976. sutherland1972 B. Sutherland, “Exact results for a quantum many-body problem in one dimension. ii,” Physical Review A, vol. 5, no. 3, p. 1372, 1972. toda1967 M. Toda, “Vibration of a chain with nonlinear interaction,” Journal of the Physical Society of Japan, vol. 22, no. 2, pp. 431–436, 1967. olshanetsky1976 M. Olshanetsky and A. Perelomov, “Completely integrable Hamiltonian systems connected with semisimple Lie algebras,” Inventiones mathematicae, vol. 37, no. 2, pp. 93–108, 1976. olshanetsky1983 M. Olshanetsky and A. Perelomov, “Quantum integrable systems related to Lie algebras,” Physics Reports, vol. 94, no. 6, pp. 313–404, 1983. polychronakos1995 A. P. Polychronakos, “Waves and solitons in the continuum limit of the Calogero-Sutherland model,” Physical Review Letters, vol. 74, no. 26, p. 5153, 1995. dhoker1998 E. D'Hoker and D. Phong, “Calogero-Moser systems in SU (N) Seiberg-Witten theory,” Nuclear Physics B, vol. 513, no. 1-2, pp. 405–444, 1998. abanov2005 A. G. Abanov and P. B. Wiegmann, “Quantum hydrodynamics, the quantum Benjamin-Ono equation, and the Calogero model,” Physical Review Letters, vol. 95, no. 7, p. 076402, 2005. bettelheim2006 E. Bettelheim, A. G. Abanov, and P. Wiegmann, “Nonlinear quantum shock waves in fractional quantum Hall edge states,” Physical Review Letters, vol. 97, no. 24, p. 246401, 2006. agarwal2006 A. Agarwal and A. P. Polychronakos, “BPS operators in 𝒩= 4 SYM: Calogero models and 2D fermions,” Journal of High Energy Physics, vol. 2006, no. 08, p. 034, 2006. stone2008 M. Stone, I. Anduaga, and L. Xing, “The classical hydrodynamics of the Calogero–Sutherland model,” Journal of Physics A: Mathematical and Theoretical, vol. 41, no. 27, p. 275401, 2008. wiegmann2012 P. Wiegmann, “Nonlinear hydrodynamics and fractionally quantized solitons at the fractional quantum Hall edge,” Physical Review Letters, vol. 108, no. 20, p. 206810, 2012. estienne2012 B. Estienne, V. Pasquier, R. Santachiara, and D. Serban, “Conformal blocks in Virasoro and W theories: duality and the Calogero–Sutherland model,” Nuclear Physics B, vol. 860, no. 3, pp. 377–420, 2012. isachenkov2016 M. Isachenkov and V. Schomerus, “Superintegrability of d-dimensional conformal blocks,” Physical Review Letters, vol. 117, no. 7, p. 071602, 2016. berntson2020 B. K. Berntson, E. Langmann, and J. Lenells, “Nonchiral intermediate long-wave equation and interedge effects in narrow quantum Hall systems,” Physical Review B, vol. 102, no. 15, p. 155308, 2020. spohn2023 H. Spohn, “Hydrodynamic scales of integrable many-particle systems,” arXiv preprint arXiv:2301.08504, 2023. berntson2023 B. K. Berntson, E. Langmann, and J. Lenells, “Conformal field theory, solitons, and elliptic Calogero–Sutherland models,” arXiv preprint arXiv:2302.11658, 2023. ruijsenaars1999 S. Ruijsenaars, “Systems of Calogero-Moser type,” in Particles and fields, pp. 251–352, Springer, 1999. polychronakos2006 A. P. Polychronakos, “The physics and mathematics of Calogero particles,” Journal of Physics A: Mathematical and General, vol. 39, no. 41, p. 12793, 2006. chalykh2008 O. Chalykh, “Algebro-geometric Schrödinger operators in many dimensions,” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 366, no. 1867, pp. 947–971, 2008. etingof2007 P. Etingof and P. I. Etingof, Calogero-Moser systems and representation theory, vol. 4. European Mathematical Society, 2007. nekrasov2010 N. A. Nekrasov and S. L. Shatashvili, “Quantization of integrable systems and four dimensional gauge theories,” in XVIth International Congress On Mathematical Physics: (With DVD-ROM), pp. 265–289, World Scientific, 2010. vandiejen2012 J. F. van Diejen and L. Vinet, Calogero–Moser–Sutherland Models. Springer Science & Business Media, 2012. khandekar1975 D. Khandekar and S. Lawande, “Exact propagator for a time-dependent harmonic oscillator with and without a singular perturbation,” Journal of Mathematical Physics, vol. 16, no. 2, pp. 384–388, 1975. nowak2013 A. Nowak and P. Sjögren, “Sharp estimates of the Jacobi heat kernel,” Studia mathematica, vol. 218, no. 3, pp. 219–244, 2013. sakurai2014 J. Sakurai and J. Napolitano, Modern quantum mechanics. 2-nd edition. Person New International edition, 2014. lassalle1991 M. Lassalle, “Polynômes de Hermite généralisés,” Comptes rendus de l'Académie des sciences. Série 1, Mathématique, vol. 313, no. 9, pp. 579–582, 1991. brink1992 L. Brink, T. Hansson, and M. A. Vasiliev, “Explicit solution to the N-body Calogero problem,” Physics Letters B, vol. 286, no. 1-2, pp. 109–111, 1992. baker1997 T. H. Baker and P. J. Forrester, “The Calogero-Sutherland model and generalized classical polynomials,” Communications in Mathematical Physics, vol. 188, no. 1, pp. 175–216, 1997. nekrasov1997 N. Nekrasov, “On a duality in Calogero-Moser-Sutherland systems,” arXiv preprint hep-th/9707111, 1997. rosler1998 M. Rösler, “Generalized Hermite polynomials and the heat equation for Dunkl operators,” Communications in Mathematical Physics, vol. 192, no. 3, pp. 519–542, 1998. feigin2021 M. V. Feigin, M. A. Hallnäs, and A. P. Veselov, “Quasi–invariant Hermite Polynomials and Lassalle–Nekrasov Correspondence,” Communications in Mathematical Physics, vol. 386, no. 1, pp. 107–141, 2021. remark2 We analytically continue time, t, so that ( t)>0. calogero1969 F. Calogero, “Solution of a three-body problem in one dimension,” Journal of Mathematical Physics, vol. 10, no. 12, pp. 2191–2196, 1969. chalykh1990 O. Chalykh and A. Veselov, “Commutative rings of partial differential operators and Lie algebras,” Communications in Mathematical Physics, vol. 126, no. 3, pp. 597–611, 1990. opdam1993 E. M. Opdam, “Dunkl operators, Bessel functions and the discriminant of a finite Coxeter group,” Compositio Mathematica, vol. 85, no. 3, pp. 333–373, 1993. chalykh1999 O. Chalykh, M. V. Feigin, and A. Veselov, “Multidimensional Baker–Akhiezer functions and Huygens' principle,” Communications in Mathematical Physics, vol. 206, pp. 533–566, 1999. felder2009 G. Felder and A. P. Veselov, “Baker–Akhiezer function as iterated residue and Selberg-type integral,” Glasgow Mathematical Journal, vol. 51, no. A, pp. 59–73, 2009. DLMF “NIST Digital Library of Mathematical Functions.” http://dlmf.nist.gov/, Release 1.0.26 of 2020-03-15. F.W.J. Olver, A.B. Olde Daalhuis, D.W. Lozier, B.I. Schneider, R.F. Boisvert, C.W. Clark, B.R. Miller, B.V. Saunders, H.S. Cohl, and M.A. McClain, eds. remark3 One can also verify directly that ^ p· x_2(x;p) is an eigenfunction of H|_N=2,ω=0. polkovnikov2011 A. Polkovnikov, K. Sengupta, A. Silva, and M. Vengalattore, “Colloquium: Nonequilibrium dynamics of closed interacting quantum systems,” Reviews of Modern Physics, vol. 83, no. 3, p. 863, 2011. fleury1998 M. Fleury, “The propagator of the Calogero-Moser system in an external quadratic potential,” Journal of Geometry and Physics, vol. 28, no. 3-4, pp. 320–338, 1998. noumi2012 M. Noumi and J. Shiraishi, “A direct approach to the bispectral problem for the Ruijsenaars-Macdonald q-difference operators,” arXiv preprint arXiv:1206.5364, 2012. kazhdan1978 D. Kazhdan, B. Kostant, and S. Sternberg, “Hamiltonian group actions and dynamical systems of Calogero type,” Communications on Pure and Applied Mathematics, vol. 31, no. 4, pp. 481–507, 1978. hallnas2015 M. Hallnäs and S. Ruijsenaars, “A recursive construction of joint eigenfunctions for the hyperbolic nonrelativistic Calogero-Moser hamiltonians,” International Mathematics Research Notices, vol. 2015, no. 20, pp. 10278–10313, 2015.
http://arxiv.org/abs/2303.07067v1
20230313124202
Cross-device Federated Learning for Mobile Health Diagnostics: A First Study on COVID-19 Detection
[ "Tong Xia", "Jing Han", "Abhirup Ghosh", "Cecilia Mascolo" ]
cs.LG
[ "cs.LG", "cs.DC", "cs.SD", "eess.AS" ]
Topology optimization with physics-informed neural networks: application to noninvasive detection of hidden geometries Ken Kamrin March 30, 2023 ======================================================================================================================== Federated learning (FL) aided health diagnostic models can incorporate data from a large number of personal edge devices (e.g., mobile phones) while keeping the data local to the originating devices, largely ensuring privacy. However, such a cross-device FL approach for health diagnostics still imposes many challenges due to both local data imbalance (as extreme as local data consists of a single disease class) and global data imbalance (the disease prevalence is generally low in a population). Since the federated server has no access to data distribution information, it is not trivial to solve the imbalance issue towards an unbiased model. In this paper, we propose FedLoss, a novel cross-device FL framework for health diagnostics. Here the federated server averages the models trained on edge devices according to the predictive loss on the local data, rather than using only the number of samples as weights. As the predictive loss better quantifies the data distribution at a device, FedLoss alleviates the impact of data imbalance. Through a real-world dataset on respiratory sound and symptom-based COVID-19 detection task, we validate the superiority of FedLoss. It achieves competitive COVID-19 detection performance compared to a centralised model with an AUC-ROC of 79%. It also outperforms the state-of-the-art FL baselines in sensitivity and convergence speed. Our work not only demonstrates the promise of federated COVID-19 detection but also paves the way to a plethora of mobile health model development in a privacy-preserving fashion. Federated learning, Privacy-preserving, Mobile health, COVID-19 detection, Acoustic modelling § INTRODUCTION Pervasive mobile devices along with on-device machine learning enable continuous sensing of individual health signals and cost-effective health screening at population scale <cit.>. However, traditional machine learning methods need the data from all the devices to be aggregated at a central server, raising privacy concerns as the health status and other personally identifiable information can potentially be leaked from the untrusted server or during data sharing <cit.>. Federated learning (FL) avoids aggregating the data and thus promise privacy by iteratively learning models at the participating devices using their local data and then aggregating the local models at a central server <cit.>. This opens a new way for privacy-preserving diagnostic model development. Most existing diagnostic FL frameworks consider cooperation among hospitals or health institutions with each participant containing clinical data from multiple individuals (also known as cross-silo FL setting) <cit.>. While such settings have boosted accuracy over participating institutions learning in isolation and improved privacy over centralising the data from all institutes, they still fall short in scaling to more distributed settings where the data of each participant resides on their mobile devices. The cross-silo FL algorithms do not trivially transfer to cross-device FL settings mainly because the latter has many orders of magnitudes more client devices. In this paper, we push the envelope of decentralisation by considering cross-device FL, where the data resides in users' (clients') edge devices. The learning works in rounds and at every round, each client's edge device trains a model using locally collected health signals and disease labels, while the federated server aggregates the local models into a global one. Finally, the trained model is used for population health screening by any client device using its local sensing data (Fig. <ref>). Cross-device FL imposes the following challenges: i) An individual's health status changes very slowly generally. Therefore, most personal devices will only present a single class, i.e., the current health status of the device owner. It is infeasible to balance the data distribution on the device, and thus learning from such data, the local model is likely to over-fit and be biased. ii) Due to the generally low disease prevalence, the data is also globally imbalanced, with a large proportion of healthy individuals. Without accessing the label distribution, the global aggregation could introduce an unwanted bias in the classification. Yet, failing to detect the disease may come at a heavy price in healthcare applications. To address the local and global class imbalance, this paper proposes an efficient federated training algorithm, FedLoss. The novelty of FedLoss lies in its adaptive model aggregation: only a small number of clients are required to participate in each round, and their models are aggregated according to adaptive weights proportional to the predictive loss on their local data. Such an adaptive aggregation strategy alleviates the impact of data imbalance and speeds up global model convergence. The performance of FedLoss is validated in a COVID-19 detection task, where respiratory sounds (cough, breathing, and voice) and symptoms are leveraged to diagnose COVID-19. A dataset is crowd-sourced from around 3,000 users through a mobile application <cit.>. We learn a COVID-19 diagnostic classifier where the data stays on the devices, i.e., our experiments consider each user to be a single federated client. There are two main contributions in this paper. First, we propose a novel federated training algorithm to enable cross-device FL for mobile health diagnostics and tackle the challenge resulting from data imbalance. Further, we conduct extensive experiments in a real-world COVID-19 detection task. Results demonstrate the superiority of our method over the start-of-the-art baselines. § RELATED WORK Skewed label distribution across edge devices is natural in real-world applications, particularly in the healthcare domain <cit.>. It poses a challenge in FL: due to privacy constraints, class distribution cannot be handled by explicitly identifying the minority class <cit.> and thus it makes the solutions explored in classical centralised settings invalid. Some efforts have concentrated on client clustering <cit.>, adapting the global model based on auxiliary data <cit.>, and adaptive client training by monitoring the loss from a global perspective <cit.>. Yet, they either are inefficient when the number of clients is large or require additional centralised data. A close work to our study <cit.> (FedCluster) considered a cross-device setting in FL to diagnose arrhythmia from electrocardiograms. To improve the performance for the rare phenotype, FedCluster clusters the clients based on a global shared dataset. Then the local models are first merged within clusters and then cluster models are aggregated into the global model. On the contrary, we aim to solve the imbalance problem without any global data. Cross-silo FL has been explored for health diagnostics including COVID-19. For example, Feki et al. proposed FL frameworks allowing multiple medical institutions to screen COVID-19 from Chest X-ray images without sharing patient data <cit.>. Vaid et al. explored electronic medical records to improve mortality prediction across hospitals via FL <cit.>. In these settings, the number of clients is small and the size of the local data is relatively large. To the best of our knowledge, we are the first to propose a cross-device federated learning framework for detecting COVID-19 from personal sounds and symptoms. This is more challenging than cross-silo FL due to the extreme data heterogeneity from the thousands of clients. § METHODOLOGY §.§ Problem Formulation Consider a system with N federated clients with each client, n owning a private local dataset 𝒟^n= {(x^n_1,y^n_1),(x^n_2,y^n_2),...}, where x^n_j is a health signal sample and y^n_j denotes the health status, i.e., if the associated disease is identified in the sample, y^n_j=1, otherwise y^n_j=0. y^n_j is locally extremely imbalanced with most clients presenting a single class, and it is also globally imbalanced with y^n_j=0 (healthy) being the majority class. As shown in Fig. <ref>, we aim to train a federated model parameterised by θ that can predict y for any given x to achieve population health screening. §.§ Basics of Federated Learning Federated learning is an iterative process consisting of the following steps at every round: (1) At every round, t, each participating client, i receives a copy of the global model from the previous round, θ_t-1 and updates it using its private local data to θ_t^i. (2) Each participating client sends updated model parameters, g_t^i = θ_t^i - θ_t-1 to the server. (3) The server updates the global model to θ_t by aggregating g_t^is. (4) Steps (1) to (3) are repeated until the global model converges. The most popular aggregation strategy (step 3) is Federated Averaging (FedAvg) <cit.>, where the aggregation is an average of the model updates weighted by α^i_t, the fraction of the data samples at client i w.r.t. to the total samples available in the system, θ_t = θ_t-1 - η∑_i α^i_t g_t^i, where η is the global updating rate. [t] FedLoss Algorithm Global model update rate η, global training rounds T, local update rate λ, local training epochs E, the number of clients each round M. Global model θ_T. Server executes: Initialise θ_0 each round t = 1,2,...,T S_t ← A random set of M clients each client i ∈ S_t in parallel l_t^i, g_t^i ← i-th client executes w_t = softmax(l_t^1,...,l_t^M) # Different from FedAvg θ_t ← θ_t-1 - η∑_i=1^M w_t^i g_t^i Client executes: Received a global model θ_t-1 Initialise loss l^i_t = 0 sample j = 1,2,..., |𝒟^i| l^i_t ← l^i_t + CrossEntropy(θ_t-1;𝒟_j^i) # Returning loss Synchronise local model θ_t,0^i = θ_t-1 local epoch e = 1,2,...,E θ_t,e^i ←θ_t,e-1^i - λ∇_θ CrossEntropy(θ_t,e-1^i;𝒟^i) Calculate the overall update: g^i_t=θ_t,E^i - θ_t-1 Return l_t^i, g_t^i §.§ FedLoss FedAvg is vulnerable to class imbalance as α_t^i ignores the label imbalance among the clients. To overcome this, we propose FedLoss (Algorithm <ref>) to achieve adaptive aggregation. At each round of FedLoss, M clients are randomly selected to participate in training. Each selected client, i, optimises the received model for E epochs using the local data 𝒟^i. The major difference between FedLoss and FedAvg is that at each round t in addition to sharing models, client i provides the predictive loss, l_t^i to support a weighted aggregation. l_t^i denotes the total cross-entropy loss incurred by the global model, θ_t on its local data, D^i. Note that l_t^i is computed prior to the local training step and thus it does not suffer from over-fitting at a client with small data. Since unhealthy clients are under-represented (globally minority class), intuitively they are more likely to yield relatively higher predictive loss. Thus, FedLoss will assign a higher weight to their model updates, rendering the data on such clients to be more predictable by the global model. Finally, the server normalises the received losses using a softmax function to get the client-wise weights for aggregation. The adaptive aggregation in t-th round is denoted as, w_t = softmax(l_t^1,...,l_t^M), θ_t =θ_t-1- η∑_i=1^M w_t^i g_t^i, where w_t^i denotes the weight for the participating client i. The overall process is summarised in Algorithm <ref>. § EXPERIMENTAL SETUP This section empirically evaluates FedLoss for COVID-19 detection. §.§ Data Details We use the data collected by a crow-sourced mobile application, COVID-19 Sounds[<www.covid-19-sounds.org>]. At registration, the app assigns each user a unique anonymous ID. Users record their symptoms (cough, fever, etc.), three respiratory sound recordings (breathing, coughing, and speech), and the COVID-19 testing status on the corresponding day <cit.>. After data cleaning (i.e., excluding non-English speakers, samples without COVID-19 test results and poor audio quality samples), there are 482 users with positive status and 2,478 users with negative status with a total of 4,612 samples. An overview of the statistics of the data is in Fig. <ref>: (a) The data represents a typical demographic distribution in a population. (b) There are more negative than positive users, with many asymptomatic positive users while a great proportion of the negative users report respiratory disease-related symptoms. (c) User data is sparse with over 70% of users only recording one sample. (d) The data accumulation procession spanned one year. §.§ Backbone COVID-19 Detection Model Following the previous works <cit.>, a VGGish framework is employed to extract acoustic features from the spectrogram of audio samples. Additionally, Han et al. reported that fusing the symptoms and acoustic features in an early stage of the deep model can achieve better COVID-19 detection performance than using a single modality. Inspired by this, we use a multi-modal deep learning model to predict COVID-19 status from audio and symptoms jointly, as illustrated in Fig. <ref>. Symptoms are represented by a multi-hot vector, which is concatenated with the dense feature from VGGish network outputs. The concatenated feature vector is then fed to a multi-layer fully connected network for classification. The final layer outputs a Softmax based binary class probabilities. §.§ Settings This paper considers each app user as a federated client to examine FedLoss. Out of 2,960 users in the dataset we randomly held out 20% clients for testing and use the rest 80% of the clients for federated training. We experiment with two training settings: * Randomly: The recorded data is assumed to be kept on the client device during the whole training period. We run T=2000 federated rounds and M=30 clients are randomly selected at each round. * Chronologically: The recorded data is assumed to be cleared monthly by the user, which is practical. Regarding this, we design a multi-period training strategy: every month, only the clients with data recorded in this period can be selected and we run 100 rounds with each round sampling M=30 clients for training (100 rounds can guarantee the convergence of the model on the incremental data). All the experiments are implemented by Pytorch on a GPU with 64G memory. To avoid over-fitting on the client, a pre-trained VGGish is utilised <cit.>, and the local training epoch is set to E=1. A local learning rate of 0.008 for VGGish and 0.015 for the rest parameters are used for the SGD optimiser. The global update rate η=1. §.§ Baselines and Metrics In addition to FedAvg, we also compare with FedProx <cit.>. FedProx handles non-identically distributed data across federated clients by regularising the local training loss at the clients so that the local models incur limited divergence from the global model. For evaluation, we first use AUC-ROC (short for AUC) to show the overall rationality of the estimated diagnostic probability. Following the rule that for a sample if the predictive probability of being positive is larger than being negative, i.e., p_pos > p_neg, it will be diagnosed as positive, we also present sensitivity (SE) - the ratio between the correctly identified COVID-19 positive samples and overall positive samples, and specificity (SP) - the correct ratio for the healthy class. Additionally, we report sensitivity with a specificity of 80% (SE@80%SP) by tuning the decision threshold, i.e., a sample will only be diagnosed as positive when p_pos > p_neg + τ, where τ is searched to guarantee a SP of 80%. A 95% Confidence Interval (CI) for all metrics is reported by using bootstrap <cit.>. § RESULTS §.§ Results and Discussion under Randomly Training Setting COVID-19 Detection Performance. The overall performance comparison is summarised in Table <ref>. All federated learning based approaches achieve competitive AUC-ROC against centralised training. However, the federated baselines are unable to effectively detect COVID-19 positive users with sensitivity lower than 20%, although their specificity is very high. In contrast, our FedLoss yields a sensitivity of 50% while maintaining the specificity around 90%. In other words, FedLoss achieves the best trade-off for detecting positive and negative users, as proved by the highest average value of sensitivity and specificity (70%). When fixing the specificity of 80% uniformly, our FedLoss achieves sensitivity up to 62%, which is as good as the centralised model. All those validate the superiority of our weighted aggregation strategy in handling the data imbalance. Convergence Comparison. System efficiency is another important metric for cross-device FL. To compare the convergence speed of FedAvg, FedProx and FedLoss, we show the testing AUC-ROC during the training process in Fig. <ref>. It can be observed that the AUC-ROC of our FedLoss gets converged significantly faster than the baselines: FedLoss needs about 250 rounds while FedAvg and FedProx requires about 1000 rounds. Therefore, FedLoss is 4× more efficient than baselines. Note that fewer communication rounds to convergence saves both computation and communication costs at the resource constraint edge clients. Analysis of Weights. We conduct additional analysis on the adaptive weight during the training process. Since our FedLoss shows a superior sensitivity against the baselines, we particularly look at how the weights changed for COVID-19 positive and negative clients, for a comparison. Fig. <ref> displays the average weight for positive and negative clients in each round. It is observed that in the beginning 100 rounds, the weight of positive clients is 4∼6 times of negative clients. This suggests the system can detect the potentially minority class as those clients are more difficult to predict. In the later rounds, the weights for positive and negative clients gradually become more balanced, since the global model has already learned the COVID-19 features, to a great extent. §.§ Discussion under Chronologically Training Setting The second setting aims to evaluate the performance of long-term FL with limited client participation in batches. As illustrated by the SE@80%SP in different periods in Fig. <ref>, all methods are inaccurate and unusable at the early stage with SE@80%SP lower than 50%. The poor performance is mainly attributed to the limited number of clients (i.e., the limited data), which leads to poor generalisation. Gradually, with more training rounds, from November 2020 our FedLoss starts to show a convergence trend with the SE@80%SP reaching 60%. Finally, our model achieves an AUC-ROC of 79%, a sensitivity of 45% and specificity of 90%, as summarised in Table <ref>. On the contrary, SE@80%SP of FedAvg and FedProx has slower convergence rate, converging two months later than FedLoss. We also note that in November 2020, all three approaches present a remarkable performance gain, which is mainly because the quantity of data reaches a peak in that month (refer to Fig. <ref>(d)). Overall, our final SE@80%SP (62%) significantly surpasses that of FedAvg (56%) and FedProx (53%), and our SE (45%) is quite competitive compared with centralised model (46%). The above comparison further verifies that our proposed FedProx can achieve a more generalised global model with fewer clients involved. § CONCLUSION In this paper, we studied the feasibility of cross-device federated mobile health using a COVID-19 detection task as an example. To handle the natural challenge of data imbalance, a novel federated aggregation algorithm FedLoss has been proposed. Experimental results demonstrate the superiority of our approach in both effectiveness and efficiency. FedLoss aggregation scheme is general and can be extended to other mobile health applications, e.g., heart sound-based arrhythmia prediction, and smartwatch-enabled sleep quality monitoring. This paper also facilitates the change from traditional crowdsourcing of data to crowdsourcing of models on a large scale for privacy-preserving mobile health applications. While this study is a beginning of an exciting direction of cross-device federated mobile health, many challenges lie ahead, for example, the sparsity of labelled data at the devices, addressing which will be future work. IEEEbib
http://arxiv.org/abs/2303.07168v2
20230313151105
Hybrid Kinetic/Fluid numerical method for the Vlasov-Poisson-BGK equation in the diffusive scaling
[ "Tino Laidin", "Thomas Rey" ]
math.NA
[ "math.NA", "cs.NA" ]
Hybrid Kinetic/Fluid numerical method Univ. Lille, CNRS, Inria, UMR 8524 - Laboratoire Paul Painlevé, F-59000 Lille, France Hybrid Kinetic/Fluid numerical method for the Vlasov-Poisson-BGK equation in the diffusive scaling Tino Laidin 1 Thomas Rey1 March 30, 2023 ================================================================================================== This short note presents an extension of the hybrid, model-adaptation method introduced in [T. Laidin, arXiv 2202.03696, 2022] for linear collisional kinetic equations in a diffusive scaling to the nonlinear mean-field Vlasov-Poisson-BGK model. The aim of the approach is to reduce the computational cost by taking advantage of the lower dimensionality of the asymptotic model while reducing the overall error. It relies on two criteria motivated by a perturbative approach to obtain a dynamic domain adaptation. The performance of the method and the conservation of mass are illustrated through numerical examples. § THE MODEL In this work, we are interested in the kinetic description of a system of particles interacting via both mean-field electromagnetic interaction and collisions. Such system can be modeled using the Vlasov-Poisson-BGK equation. The unknown is the probability distribution function f=f(t,x,v)∈^+ solution to: { ∂/∂ t f^ + v_x/ε f^ + E^/ε ∂_v_xf^=1/ε^2𝒬(f^), f(0,x,v)=f_0(x,v), . where (t,x,v)∈^+×[0, x_*]×^d_v with periodic boundary conditions in the physical space and v = (v_x, v_y, v_z). The long range interactions are modeled via the self-consistent electrical field E=E(t,x) solution to the Poisson equation E^=ρ^-ρ with ρ=∬ f_0 x v. The short-range interactions between particles are taken into account through the linear BGK-like relaxation collision operator 𝒬(f^ε)(t,x,v)=ρ^(t,x)(v)-f^ε(t,x,v), ∀ (t,x,v)∈^+×[0, x_*]×^d_v, where the global Maxwellian and local density are respectively defined as (v)=e^-|v|^2/2/(2π)^d_v/2, ρ^ε(t,x)=∫ f^ε(t,x,v) v =: ⟨ f^(t,x,·)⟩. In (<ref>), the scaling parameter ε is related to the Knudsen number: the ratio between the mean free path of the particles and the length scale of observation. It is now well known <cit.> that the limit case ε=0 is described by a drift-diffusion equation on the density ρ: when → 0, the distribution function f^ converges towards a Maxwellian distribution ρ whose density ρ is solution to P{ ρ - J = 0, J=ρ - Eρ, ρ(0,x)=ρ_0(x), ∀ x ∈ [0, x_*]. . The approximation of solutions to (<ref>)-(<ref>) can be computationally expensive because of the high dimensionality of the kinetic phase space. Nevertheless, using the more accurate kinetic description of the system may not be necessary in the whole computing domain because of the local validity of the fluid description (the system being in a state of thermodynamic equilibrium). This latter is less accurate in describing the kinetic zones, but computationally less costly. The aim of this work is therefore to design a hybrid kinetic/fluid scheme with an automatic domain adaptation method. It relies on a robust numerical scheme for the kinetic equation, on relevant criteria to carefully determine fluid and kinetic regions and on a smart implementation. § MACROSCOPIC MODELS The aim of this section is to derive a higher-order macroscopic model from which we deduce a macroscopic coupling criterion. It generalizes the approach presented in <cit.>. Let us now introduce the truncated Chapman-Enskog expansion of the distribution function f^ε at order K∈^*: f^ε(t,x,v)=ρ^ε(t,x)(v) + ∑^K_k=1ε^k h^(k)(t,x,v). By inserting (<ref>) into the original equation (<ref>), one can identify powers of epsilon to obtain k=0: h^(1) = -(ρ^ε), k=1: h^(2) = -(ρ^ε) -(h^(1)), 2≤k≤K-1: h^(k+1) = -h^(k-1) - (h^(k)), where 𝒯f=v_x ∂_xf+E ∂_v_x f is the transport operator. To obtain a hierarchy of macroscopic models, one considers different truncation orders K, then plugs (<ref>) into (<ref>) and integrates in velocity. The order K=1 allows us to (formally) recover the asymptotic model (<ref>). Let us now present the idea behind the computations in a 1D/1D setting for the case K=3. Note that the same method can be applied up to the full 3D/3D setting. Integrating in velocity then yields ρ^+⟨ vh^(1)⟩+ε^2⟨ vh^(3)⟩=4. The set of equations (<ref>) allows us to compute the functions h^(k), k=1,2,3. Using the identity =-v, one has h^(1)=-v J^ε, J^= ρ^-E^ρ^. h^(2)=-ρ^ε+v^2 J^ε+(1-v^2) E^ε J^ε, and h^(3)= v J^ε+v(ρ^ε)-v^3 J^ε-(v-v^3)(E^ε J) -v E^ερ^ε -(2v-v^3) E^ε J^ε -(v^3-3v)(E^ε)^2J^ε. It remains to compute the quantities ⟨ vh^(1)⟩ and ⟨ vh^(3)⟩. By the definition of , one can explicitly compute its second and fourth moments: m_2=1 and m_4=3. It yields ⟨ vh^(1)⟩= J^ε. Moreover, to avoid some approximation of mixed derivatives, we observe from (<ref>) that ρ^= J^ + 2, and we deduce that J^= J^-E^ J^-ρ^ E^+2. Replacing the time derivatives by their approximations (<ref>) and (<ref>) yields ⟨ vh^(3)⟩= - J^ε+ρ^ε E^ε-ρ^ε( E^ε)+3 E^ε J^ε +E^ε J^ε+2J^ε( E)+2. Finally, using the Poisson equation (<ref>) and rearranging the terms, we obtain a higher order macroscopic model: ρ^ε- J^ε=-ε^2ℛ+4, where the remainder ℛ^ε is given by ℛ^ε=- J^ε + E J^ε + (2ρ^ε-3ρ) J^ε +2J^ερ^ε -ρ^ε E^ε. Furthermore, we emphasize the fact that this remainder term does not depend on the velocity variable but on the macroscopic quantities ρ and E. It quantifies very accurately the deviation from the thermodynamical equilibrium. § NUMERICAL SCHEME In this part, we briefly recall the derivation of the micro-macro model for (<ref>) introduced in <cit.>. Then, we present a micro-macro finite volume scheme that enjoys the property of being Asymptotic Preserving (AP), which is a crucial point of the hybrid method we present. Let us decompose the distribution f^ε as follows: f^ε = ρ^ε+g^ε. We introduce the orthogonal projector Π in L^2( x v^-1) on Ker(𝒬) defined for all f∈ L^2( x v^-1) by: Π f=⟨ f⟩. The so-called micro equation is obtained by plugging (<ref>) into (<ref>) and applying (I-Π). Moreover, plugging (<ref>) into (<ref>) and applying the projection Π yields the macro equation. The micro-macro model is then given by: Micro g^ε+1/ε( g^ε - ⟨ v_xg^ε⟩ + v_x J^ε) =-1/ε^2g^ε, Macroρ^ε+1/ε⟨ v_xg^ε⟩=0. Let us now present the discretization of the (<ref>)-(<ref>) model. We shall adopt a finite volume approach to discretize the phase space and present only the 1D/3D case that we shall consider in our numerical simulations. The mesh. The velocity domain is restricted to the bounded symmetric cube [-v_⋆,v_⋆]^3. We consider a Cartesian mesh of the phase space composed of N_v=2L velocity cells in each direction arranged symmetrically around v=0. Let 𝒥={ -L+1,…,L } and j=(j_x,j_y,j_z)∈𝒥^3 be a multi-index. The cells of the velocity mesh are denoted by 𝒱_j for j∈𝒥^3. Each cell 𝒱_j has a constant volume Δ v^3 and midpoint v_j. The physical domain, a torus 𝕋 of length x_*, is discretized into N_x primal cells 𝒳_i=(x_,x_), i∈ℐ=ℤ/N_xℤ, of constant length Δ x and centers x_i. We also define dual cells 𝒳_=(x_i,x_i+1) for i∈ℐ, of constant length Δ x and centers x_. This defines respectively the so-called primal and staggered meshes as K_ij= 𝒳_i×𝒱_j and K_,j= 𝒳_×𝒱_j, ∀(i,j)∈ℐ×𝒥^3. Finally, we set a time step Δ t>0 and define t^n=nΔ t for n∈ℕ. The Maxwellian is discretized as a product of 1-dimensional Gaussians in such a way that it satisfies discrete counterparts of its continuous properties, namely parity, positivity, and unit mass. The transport terms in (<ref>) are approximated using a first order upwind scheme and the time derivative is dealt with using a first order exponential time integrator. Regarding the macro equation, we take advantage of approximating the perturbation on the dual cells in position for the space derivative. The usual choice <cit.> to obtain an AP scheme is to implicit the stiff term of (<ref>). The equation on the electrical field is solved using a centered finite difference scheme. The numerical scheme reads as follows: Let n∈ℕ. Let (g_,j^ε,n)_ij and (ρ^ε,n_i)_i be given by the following micro-macro finite volume scheme: g_,j^ε,n+1 = g_,j^ε,ne^-Δ t/ ε^2 - ε(1-e^-Δ t/ ε^2)(T^ε,n_,j/Δ xΔ v^3+ξ_j_jJ^ε,n_), ρ_i^ε,n+1 = ρ_i^ε,n - Δ t/εΔ x(⟨ξ g^ε,n+1_⟩_Δ-⟨ξ g^ε,n+1_⟩_Δ), E^,n_-E^,n_ = (ρ_i^,n-ρ)Δ x, where ξ_j=ξ_(j_x,j_y,j_z)=v_j_x ∀ j∈𝒥^3 and T^ε,n_,j is the discretization of the transport terms. Assuming some uniform bounds in ε on ρ^ε and for a fixed mesh size Δ x, Δ v>0, the scheme enjoys the AP property in the diffusion limit. This property does not depend on the initial data, and the associated limit scheme reads ρ_i^n+1 = ρ_i^n + m_2^Δ vΔ t/Δ x(J_^n-J_^n), E^n_-E^n_ = (ρ_i^n-ρ)Δ x, with the limit flux J_^n = ρ^n_i+1-ρ^n_i/Δ x - E_ρ^n_, where m_2^Δ v is given by ∑_l∈𝒥v_l^2M_lΔ v_l. § HYBRID METHOD Let us now introduce the main contribution of this work, namely the hybrid method between kinetic and fluid schemes. It consists in a coupled solver that is faster than a full kinetic one to solve (<ref>) while still being accurate. Following <cit.> we first construct a hybrid kinetic/fluid solver with a dynamic domain adaptation method and present its implementation. §.§ Coupling criteria The idea of the dynamic domain adaptation method is twofold. On the one hand, the subdomains must accurately describe the state of the solution. In particular, the fluid model has to be used only where the solution is near the local velocity equilibrium. On the other hand, the method has to be dynamic, in the sense that the subdomains are adapted at each time step. To determine in which domain each cell lies, we use two criteria based on the higher order macroscopic model (<ref>) introduced in Section <ref> and the norm of the perturbation g^ε=f^ε-ρ^ε. Let ℛ_i^ε,n be a discretization of the remainder (<ref>) at time t^n in cell 𝒳_i. The coupling procedure will unfold as follows: ℛ_i^ε,n is computed using both the kinetic density ρ^ε in kinetic cells and the fluid density ρ in fluid cells. Cell changes happen when one of the following situations occurs, depending on a coupling threshold investigated in the previous work <cit.>: * If ℛ_i^ε,n is small (w.r.t. a fixed threshold), the solution (<ref>) is close to the limit model (<ref>) and one must use it; * If g^ε is small (w.r.t. another fixed threshold), the solution is close to the local equilibrium in velocity, and one must consider the fluid description. If any of those two conditions are not met then, depending on its current state, the cell either stays or becomes kinetic. Note that in a kinetic cell, the criterion on the norm of g^ε is mandatory. Indeed, the remainder ℛ^ε,n_i could be small because of small gradients, but the perturbation large. In this situation, one does not want to change from kinetic to fluid. As an example, one could take a distribution function at equilibrium in position and far from the Maxwellian in velocity (see <cit.> for details). §.§ Implementation The way the method is implemented is crucial. Indeed, the main goal of the method is to avoid the update of the perturbation which is the most computationally expensive part of the code. Therefore, from an implementation point of view, g^ε is not updated in fluid regions and is set to 0 only when needed. In particular, it occurs only when a fluid cell becomes kinetic and when saving data. The interface conditions between kinetic and fluid cells are treated in the same way as in <cit.>. Note that we want to start the resolution with the approach containing the full information on the system. Hence, the domain is initialized as fully kinetic. Moreover, let us emphasize that in practice the kinetic fluxes are explicitly computed. Therefore, the hybrid setting is an explicit method. § NUMERICAL RESULTS Let us now present some numerical simulations with our approach. We shall start with the validation of the AP property of the micro-macro Vlasov-Poisson-BGK solver with exponential integrator presented in Section <ref>. It is a combination of the methods presented in <cit.> that have never been implemented in any work, to the best of our knowledge. Figure <ref> presents the time evolution of the L^2 norm of the energy of solutions to equations (<ref>–<ref>) with different values of the relaxation parameter , for the seminal weak Landau damping initial data from <cit.>. We observe the convergence with respect to of the energy. The oscillations due to the Vlasov-Poisson transport term occur only in the kinetic regime, when is large. They are then damped by the linear BGK term for smaller values of , where exponential decay of the electric field occurs. We now turn our attention to the hybrid method. Figure <ref> assesses the validity of this new method by computing the time evolution of the density of a smooth solution. The initial condition is a Maxwellian distribution ρ, whose initial space dependent density is given by ρ(x) = 1 + 0.05cos(2x) for x_* = 2π with a fixed = 0.1. Although the solution is far from the fluid description because of this mild value of , we observe an almost perfect agreement between the fully kinetic and the hybrid kinetic-fluid solvers. We also observe the back-and-forth phenomenon between kinetic and fluid cells, resulting in large time in a full fluid (albeit accurate with the kinetic equation) solver for the global equilibrium. The speed-up tables are similar to those presented in <cit.>, where factors up to 400 have been observed between the hybrid and the fully kinetic solver. Then this domain adaptation is investigated in Figure <ref>. One can observe the precise domain adaptation during time. We notice in particular the quick vanishing of the kinetic cells in favor of the fluid ones (and hence a computational speedup). This adaptation phenomenon can bring mass variation as noticed in <cit.>, but we observe that it remains very close to the machine precision. Finally, we investigate again the case of the weak Landau damping using the new hybrid solver. We observe in Figure <ref> that this new method is able to accurately capture the oscillations induced by the transport operator in short time. Nevertheless, these oscillations are destroyed by the switch to a full fluid solver, which relax exponentially because of its relaxation structure. Acknowledgements. The authors were partially funded by Labex CEMPI (ANR-11-LABX-0007-01) and the MSCA DN-2022 program DATAHYKING. spmpsci
http://arxiv.org/abs/2303.07259v3
20230313163526
A novel approach of empirical likelihood with massive data
[ "Yang Liu", "Xia Chen", "Wei-min Yang" ]
stat.ME
[ "stat.ME" ]
plain 0.5mm semicolon,aysep=,yysep=,,notesep=: mythm1.5ex plus 1ex minus .2ex1.5ex plus 1ex minus .2ex 0.5em mythm lemLemma A. thmTheorem remRemark crlCorollary exExample thmsection crlsection remsection exsection ε ω γ ∂ φ ⟶ FH̋εdp→̊ T § [hang] 0.0ex §.§ [hang] 0.0ex* § 0pt10pt4pt A novel approach of empirical likelihood with massive data 4mm Yang Liu, Xia Chen[Corresponding author. E-mail: xchen80@snnu.edu.cn], Wei-min Yang School of Mathematics and Statistics, Shaanxi Normal University, Xi'an 710119, China 4mm Abstract Statistical analysis of large datasets is a challenge because of the limitation of computing devices' memory and excessive computation time. Divide and Conquer (DC) algorithm is an effective solution path, but the DC algorithm still has limitations for statistical inference. Empirical likelihood is an important semiparametric and nonparametric statistical method for parameter estimation and statistical inference, and the estimating equation builds a bridge between empirical likelihood and traditional statistical methods, which makes empirical likelihood widely used in various traditional statistical models. In this paper, we propose a novel approach to address the challenges posed by empirical likelihood with massive data, which is called split sample mean empirical likelihood(SSMEL), our approach provides a unique perspective for sovling big data problem. We show that the SSMEL estimator has the same estimation efficiency as the empirical likelihood estimator with the full dataset, and maintains the important statistical property of Wilks' theorem, allowing our proposed approach to be used for statistical inference. The effectiveness of the proposed approach is illustrated using simulation studies and real data analysis. Keywords Empirical likelihood; Massive data; Divide and Conquer; Parameter estimation; Statistical inference § INTRODUCTION With the development of science and technologies, the growth in the size of datasets is accelerating, large datasets are not unusual. The presence of massive data has presented new challenges for classical statistical methods, which can offer excellent theoretical properties for such data, yet are often difficult to implement in practice due to computation time and memory constraints. Additionally, when data is stored in a distributed manner, it may be infeasible to perform statistical analysis on the full dataset due to communication costs and privacy concerns. Thus, there is a growing need for a new statistical method to handle the challenges posed by massive data. In recent years, Divide and Conquer(DC) has been widely used to address the problems caused by massive data. The DC algorithms can be broadly classified into two categories, one is the one-shot approach<cit.>. Its basic idea is that one can randomly partition the full dataset into multiple subsets, perform the parallel computation of the relevant statistics on each, and eventually produce the estimator via a suitable aggregation function. <cit.> studied penalized regression models utilizing the one-shot approach; <cit.> developed the one-shot approach for estimation and hypothesis testing in high-dimensional sparse models; <cit.> discussed the statistical inference of symmetric statistics under the one-shot approach; <cit.> examined the properties of the one-shot estimators of empirical likelihood and exponentially tilted empirical likelihood; <cit.> proposed a novel statistical inference for the one-shot estimator by empirical likelihood. The one-shot approach has the advantage of easy implementation and low communication cost, however, it requires sufficiently large subsets to ensure the accuracy of the final estimator. In practice, it will limit to call of more computational resources to reduce the computation time. While the first-order error of the one-shot estimator is equivalent to that of the full dataset, the second-order error of the nonlinear statistic is not negligible<cit.>. To address this challenge, the iterative approach<cit.> has been proposed. It aims to generate a final estimator by the iterative comunication of the gradient information of subsets, this approach requires more communication cost compared to the one-shot approach. <cit.> achieved the one-step estimator through the Newton-Raphson algorithm to update the one-shot estimator. <cit.> proposed a general framework called Communication-efficient Surrogate Likelihood (CSL) that aggregates gradient information from subsets to construct a CSL function, which is then used to obtain the final estimator through multiple iterative and optimization procedures. The framework also establishes the theoretical properties of CSL for statistical inference. <cit.> incorporated a strictly convex quadratic term that can be adaptively adjusted at each iteration step. This addition helps the CSL converge faster, resulting in improved performance. The DC algorithms can effectively handle the challenges of parameter estimation under large datasets, but the statistical inference is still a complex task. General statistical inference methods construct test statistics based on the asymptotic distribution of the estimator, but the covariance matrix is difficult to estimate under the full dataset. For more details on the distributed statistics can refer to <cit.>. Empirical likelihood is a significant nonparametric and semiparametric statistical method, it inherits Wilks' theorem of parametric likelihood<cit.>. Therefore, it produces confidence regions with data-driven shapes and constructs test statistics without estimating the covariance matrix. <cit.> demonstrated that empirical likelihood resembles parametric likelihood with Bartlett correction. Due to these advantageous properties, and empirical likelihood can easily incorporate side information, so it has gained significant attention and has been extensively investigated and utilized, e.g. regression models<cit.>, estimating euqations<cit.>, partially linear models<cit.>, bayesian settings<cit.>, quantile regression models<cit.>, U-statistics<cit.>, time series models<cit.>, high-dimensional statistical inference<cit.>. Empirical likelihood is computationally intensive when the size of the dataset is large, which can limit the application of empirical likelihood to the large dataset. Because empirical likelihood is well adapted to traditional statistical models, it is necessary to address the challenges of empirical likelihood with massive data. Recently, <cit.> and <cit.> proposed split sample empirical likelihood (SSEL) and distributed empirical likelihood (DEL), respectively, to solve this problem. <cit.> constructed the empirical likelihood function with respect to each subset and defined the SSEL estimator as the maximizer of the product of these empirical likelihood functions. <cit.> obtained estimators for each subset and then averaged these estimators across all subsets to generate the DEL estimator. Both methods utilize parallel computing to tackle the challenges of massive data on empirical likelihood. Modern parallel computing structures have the potential to significantly reduce computation time. However, for large values of K (n=O(√(K))), the accuracy of estimation, particularly for non-linear statistics, cannot be ensured. Consequently, there are stringent limitations on the value of K required to obtain reliable estimators, and each parallel pool remains computationally expensive. On the other hand, the DEL is failing to meet Wilks' theorem, which eliminates the benefits of empirical likelihood and necessitates the exploration of alternative statistical inference methods. To address these issues, we propose a novel approach, which called split sample mean empirical likelihood (SSMEL). Under mild regularity conditions, we show that the SSMEL estimator retains the same asymptotic efficiency as that of the full dataset. Additionally, the SSMEL preserves the important property of Wilks' theorem, making it suitable for statistical inference. Different from other methods, the SSMEL does not require parallel computing and can be implemented efficiently with limited computational resources, making it more widely practical applicable. For distributed dataset, we designed the corresponding distributed algorithm for the SSMEL based on the algorithm in <cit.> which is a variant of the iterative approach. Simulations and real data analysis further demonstrate the efficiency of our proposed method. The remainder of this paper is organized as follows. In Section 2, we briefly review empirical likelihood and present the methodology of SSMEL. Section 3 investigates the theoretical properties of SSMEL. Section 4 designs a new algorithm applicable to the SSMEL. Sections 5 and 6 examine the performance of the proposed approach on simulated and real data analysis. Section 7 concludes the paper and discusses future work. § METHODOLOGY Suppose that 𝒳 = {x_1,⋯,x_n} are d-variate independent and identically distributed samples with common distribution function F. Let θ∈ℝ^p be a vector of the unknown parameter of interest, and θ_0 is the true value. For the sake of completeness, we first briefly review empirical likelihood. §.§ Empirical likelihood Assume that true value θ_0 satisfies constraints in the form of the r≥ p unbias estimating equation, i.e. 𝔼g(X,θ_0)=0, where g(X,θ_0)=(g_1(X,θ_0),⋯,g_r(X,θ_0)). Then, the empirical likelihood ratio function evaluated at θ be defined as R(θ)=sup{∏_i=1^nnp_i:p_i≥0,∑_i=1^np_i=1,∑_i=1^np_ig(x_i,θ)=0} By the Lagrange multiplier method, we have p_i=1/n·1/1+λ^Tg(x_i,θ) where λ(θ) solves 1/n∑_i=1^ng(x_i,θ)/1+λ^Tg(x_i,θ)=0. Thus, the empirical log-likelihood ratio defined as l(θ)=∑_i=1^nlog[1+λ^Tg(x_i,θ)] The maximum empirical likelihhod estimate θ̂_EL is calculated by θ̂_EL=argmin_θ∈Θmax_λ∈Λ̂_n(θ)∑_i=1^nlog[1+λ^Tg(x_i,θ)] where Λ̂_n(θ)={λ∈ℝ^r:λ^Tg(x_i,θ)∈𝒱,i=1,⋯,n} for θ∈Θ and 𝒱 is an open interval containing zero, and Θ is the convex hull of {g(x_i,θ),i=1⋯,n)}. Under mild regularity conditions, <cit.> showed that as n→∞, √(n)(θ̂_EL-θ_0)d⟶N(0,Σ), where Σ=[𝔼(∂ g(X,θ_0)/∂θ^T)^T(𝔼g(X,θ_0)g^T(X,θ_0))^-1𝔼(∂ g(X,θ_0)/∂θ^T)]^-1. Moreover, if Var(g(X,θ_0)) is finite and the rank p>0, then Wilks theorem is holded, i.e. 2l(θ_0)-2l(θ̂_EL)d⟶χ_p^2, as n→∞. §.§ Split sample mean empirical likelihood Empirical likelihood cannot generally be written in a closed form, so a numerical optimization algorithm is required for the solution, resulting in computational obstacles from massive data and distributed datasets. To address these challenges, we introduce our proposed SSMEL. Assume the size of full dataset n is very large, and randomly partition the full dataset 𝒳={x_1,⋯,x_n} into K subsets of size m=n/K. We denote S_k={x_i^(k),i=1,⋯,m} as kth subset, which x_i^(k) means ith sample in kth subset. Obviously, ⋃_k=1^KS_k=𝒳 and S_k⋂ S_t=∅, for any k≠ t. For each subset S_k,k=1⋯,K, we consider the following steps: * By inputting the samples x_i^(k) from subset S_k into the estimating equation, we can obtain the sequence of estimating equations g(x_i^(k),θ),i=1,⋯,m. * Taking the mean of estimating euqation sequence {g(x_1^(k),θ),⋯,g(x_m^(k),θ)}, i.e. g̅^(k)(θ)=1/m∑_i=1^mg(x^(k)_i,θ). With the aforementioned steps, we can derive mean estimating equations g̅^(k)(θ),k=1,⋯,K from K subsets. It can be easily seen that the mean estimating equation is still the estimating equation, i.e. 𝔼g̅(θ_0)=𝔼[1/m∑_i=1^mg(X_i,θ_0)]=1/m∑_i=1^m𝔼g(X_i,θ_0)=0, Thus, we can construct the split sample mean empirical likelihood(SSMEL) ratio function using the mean estimating equations, R_S(θ)=sup{∏_k=1^KKp_k:p_k≥0,∑_k=1^Kp_k=1,∑_k=1^Kp_kg̅^(k)(θ)=0} and the split sample mean empirical log-likelihood ratio function defined as l_S(θ)=∑_k=1^Klog(1+λ^Tg̅^(k)(θ)) The core approach of SSMEL is to compress the sample information and convert the large dataset into a small dataset. Therefore, the full dataset empirical likelihood is a special case of SSMEL, when K=n. Similar to Equation.(<ref>), the maximum split sample mean empirical likelihood estimator is θ̂_S=argmin_θ∈Θ̅max_λ∈Λ̂_K(θ)∑_k=1^Klog(1+λ^Tg̅^(k)(θ)) where Λ̂_K(θ)={λ:λ^Tg̅^(k)(θ)∈𝒱,k=1,⋯,K} for θ∈Θ̅ and 𝒱 is an open interval containing zero, and Θ̅ is the convex hull of {g̅^(k)(θ),k=1,⋯,K}. To solve Equation. (<ref>), a prerequisite is that Θ̅ have the zero vector as an interior point. Lemma 11.1 in <cit.> states that if Var(g(X,θ)) is finite and the rank p>0, then the zero vector must be contained in Θ. Obviously, because of Var(g̅(θ))=m^-1Var(g(X,θ)), if Var(g(X,θ)) satisfies this condition, then Var(g̅(θ)) also satisfies it. Figure <ref> shows the parameter space for partly subsets and the parameter space for SSMEL under the same segmentation. It can be seen from Figure <ref>(a) that when the subset size m is small, the convex hull consisting of g(x_i^(k),θ),x_i^(k)∈ S_k does not contain zero vectors with a higher probability, thus leading to poor estimation of SSEL and DEL when the value of K is taken to be large. In contrast, Figure <ref>(b) shows that the SSMEL has a much smaller parameter space and always contains zero vectors. § ASYPTOTIC PROPERTIES In this section, we establish the asymptotic properties of SSMEL. For the empirical likelihood, the critical aspect is to control the tail probabilities behavior of the estimating equation, i.e., to ensure ‖ n^-1∑_i=1^ng(x_i,θ)‖=O_p(n^-1/2). It is worth noting that K^-1∑_k=1^Kg̅^(k)(θ)=K^-1∑_k=1^Km^-1∑_i=1^mg(x_i^(k),θ)=n^-1∑_i=1^ng(x_i,θ). Therefore, the SSMEL and empirical likelihood have the same assumptions. The following assumptions are made. A.1θ_0∈ int(Θ̅) is unique solution to 𝔼g(X,θ)=0, where Θ̅ is a compact set and int(Θ̅) denotes the interior of Θ̅. A.2g(x_i,θ) is continuous with respect to θ at each θ∈Θ̅ with probability 1 and is continuously differentiable with respect to θ in a neighbourhood of 𝒩 of θ_0. A.3𝔼[sup_θ∈Θ‖ g(X,θ)‖^α]<∞ for some α>2, where ‖·‖ is the Euclidean norm for vector and the Frobenius norm for matrix. A.4Ω:=𝔼[g(X,θ_0)g(X,θ_0)^T] is nonsingular. A.5𝔼[sup_θ∈𝒩‖∂ g(X,θ)/∂θ^T‖]<∞, denotes 𝔼(∂ g(X,θ)/∂θ^T)=G, rank(G)=p. A.1-A.5 guarantees the existence and asymptotic normality of θ̂_S, further ensure Wilks' theorem holds. As discussed in the previous section, the assumption in A.1 of Θ̅ can be relaxed to Θ. These assumptions are similar to those found in <cit.>, which are the fundamental assumptions of empirical likelihood, and no additional assumptions are introduced in this paper. Under assumptions A.1-A.5, we have √(n)(θ̂_S-θ_0)d⟶N(0,Σ), as n→∞ where Σ=(G^TΩ G)^-1. Under the assumption of Theorem <ref>, we have 𝔼[‖θ̂_S-θ_0‖^2]≤tr(Σ)/n+o(n^-1) where tr(·) represents the trace of the matrix. Theorem <ref> shows that the asymptotic distribution of θ̂_S is the same as for θ̂_EL, and if the estimating equation g is the score function of the true parameter likelihood function, then the asymptotic distribution of θ̂_S is same as maximum likelihood estimator. Corollary <ref> shows that the mean squared error(MSE) upper bound for the SSMEL estimator, which is the same as the full dataset empirical likelihood, therefore they have the same estimation efficiency. Finally, we give the asymptotic behavior of SSMEL test statistic. Theorem <ref> summarizes the general conclusions, while Corollary <ref> provides the asymptotic distribution in the presence of nuisance parameters. The split sample mean empirical likelihood ratio test statistic for H_0:θ=θ_0 is 𝒲(θ_0)=2[l_S(θ_0)-l_S(θ̂_S)] Under assumptions of Theorem <ref>, 𝒲(θ_0)d⟶χ^2_p as n→∞, when H_0 is ture. Let θ^T=(ϕ,γ)^T, and ϕ is q×1 vector, γ is (p-q)×1 nuisance parameters. The profile split sample mean empirical likelihood ratio test statistic for H_0:ϕ=ϕ_0 is 𝒲(ϕ_0)=2[l_S(ϕ_0,γ̂(ϕ_0))-l_S(ϕ̂_S,γ̂_S)] where γ̂(ϕ_0) minimizes l_S(ϕ_0,γ) with respect to γ. Under H_0, 𝒲(ϕ_0)d⟶χ^2_q as n→∞. The theoretical results of SSMEL hold provided K→∞ as n→∞ , this means that m is a fixed positive integer. Related to the choice of K, there are some practical considerations. As we formally use K samples, the computation time grows as K increases, therefore it is necessary to ensure that K is not excessively large. On the other hand, empirical likelihood can only be applied when K is larger than p (the parameter dimension). In the general setting, from our own experiences, we recommend 100 to be a suitable value for K, this is further demonstrated in the subsequent simulation and real data analysis. § ALGORITHM FOR DISTRIBUTED DATASET The algorithms for solving empirical likelihood can be applied to the SSMEL, making the implementation of SSMEL estimation feasible on a single computing device. To extend SSMEL to the distributed dataset, we generalize the two-layer coordinate descent algorithm in <cit.>. The algorithm is briefly reviewed in the context of SSMEL. First, we define f(λ;θ) = 1/K∑_k=1^Klog_*{1+λ^Tg̅^(k)(θ)} f(θ) = max_λ∈Λ̂_K(θ)f(λ;θ) where log_*(x) is twice differentiable pseudo-logarithm function with bounded support adopted from <cit.>: log_*(x) = {[ log(x) if x≥ε; log(ε)-1.5+2x/ϵ-x^2/(2ε^2) if x≤ε ]. where ε is chosen as 1/K in this paper. The SSMEL estimaotr θ̂_S is calculated by minimizing the following objective function: θ̂_S = argmin_θ∈Θ̅f(θ) We apply the two-layer coordinate decent algorithm in <cit.> to solve the problem. The inner layer of the algorithm is to find λ by maximizing f(θ) for a fixed θ. The outer layer of the algorithm is to search for the optimal θ̂_S, and both layers can be solved using coordinate descent. The inner-layer involves maximizing f(λ,θ) as defined in Equation (<ref>) for a fixed θ. Assuming the initial value of λ is λ^(0), we fix the other coordinates and calculate the value of λ_j, where j=1,2,⋯,r in the (M+1)th iteration, the jth component of λ is given by λ̂_j^(M+1)=λ̂_j^(M)-∑_k=1^Klog_*^'(t_k^(M))·g̅_j^(k)(θ)/∑_k=1^Klog_*^”(t_k^(M))·{g̅_j^(k)(θ)}^2 where t_k^(M)=1+g̅^(k)(θ)^Tλ̂^(M), λ̂^(M)=(λ̂_1^(M),⋯,λ̂_r^(M))^T. The procedure cycles through all the r components of λ and is repeated until convergence. It is important to ensure that the objective function is optimized at each step. If not, continue halving the step size until the objective function is driven in the right direction. The procedure in Equation (<ref>) can be viewed as an optimization of a univariate sequence. The outer layer can also be solved using a coordinate descent algorithm. At a given λ, the algorithm updates θ_t, t=1,⋯,p by minimizing f(θ) defined in Equation (<ref>) with respect to θ_t with other θ_l is fixed. Assuming the initial value of θ is θ̂^(0), the (M+1)th Newton update for θ_t is given by θ̂_t^(M+1)=θ̂_t^(M)-∑_k=1^Klog_*^'(s_k^(M))[λ^T(∂g̅^(k)(θ̂^(M))/∂θ_t)]/∑_k=1^K{log_*^”(s_k^(M))[λ^T(∂g̅^(k)(θ̂^(M))/∂θ_t)]^2+log_*^'(s_k^(M))[λ^T(∂^2g̅^(k)(θ̂^(M))/∂θ_t^2)]} where s_k^(M)=1+λ^Tg̅^(k)(θ̂^(M)), θ̂^(M)=(θ̂^(M)_1,⋯,θ̂^(M)_p)^T. The SSMEL can be implemented following the pseudo-code in <cit.> on a single computing device. For the distributed dataset, we give the pseudo-code in Algorithm <ref>. It can be seen that the SSMEL only requires optimizing a single objective function, while other distributed methods require processing multiple optimization procedures in parallel. Thus, our approach is suitable for general computing devices. Algorithm <ref> is a simple implementation of SSMEL applied to distributed data that differs from the traditional iterative approach. Traditional iterative approaches generally require multiple optimization procedures, while this algorithm accomplishes a single optimization procedure through interaction between multiple computing devices. It is worth noting that the efficiency of SSMEL is not limited by the number of devices. The data stored on each machine can still be randomly partitioned and compressed and then transferred between machines. § SIMULATIONS In this section, we demonstrate the behavior of the proposed approach through some simulations. The first example evaluates the behavior of SSMEL in reducing computation time for massive data and compares the estimation accuracy of SSMEL, DEL, and SSEL under different settings. The second example shows the estimation accuracy of SSMEL, DEL, and SSEL for increasing the dimensionality of the growth parameters under three different partitioning conditions. The third example provides the results of the hypothesis testing of SSMEL, DEL, and SSEL under different partition numbers K. The centralized empirical likelihood(CEL) in these examples represents the empirical likelihood under the full dataset. All simulations were implemented in R. Example 1 We generate data X_1,⋯,X_n from a normal distribution N(μ,σ^2), where the unknown parameters μ and σ are randomly generated from the uniform distributions Unif(-2,2) and Unif(0.5,2), respectively. The random variable X of the normal distribution N(μ,σ^2) satisfies the following moment conditions: 𝔼[g(X,θ_0)]=𝔼[ μ - X; σ^2-(X-μ)^2; X^3-μ(μ^2+3σ^2) ] =0. Case 1 To assess the efficacy of the proposed approach in terms of reducing computation time for massive data, we choose the full dataset size at n=200000 and vary K=[10,50,100,500,1000, 5000], with K=200000 being equivalent to the CEL. This procedure with 500 replications, the mean square error (MSE) for μ and σ, and total computation time (TCT) were recorded in Table <ref>. Table <ref> shows that, with the proper K, our proposed approach can effectively reduce the computation time and achieve the estimation accuracy under the full dataset. This confirms the conclusion drawn in Corollary <ref>. A smaller value of K is not recommended, as this would over-compress the sample information, causing poor estimation accuracy and non-optimal computational efficiency. Case 2 In this case, the performance of CEL, SSMEL, DEL, and SSEL is compared by evaluating their accuracy in four different settings with 1000 repetitions. To further explore the sensitivity of each method with respect to K and m, we did not consider setting n extremely large, and the subsequent simulation settings were similarly based on this consideration. The logarithmic mean squared error (log-MSE) is shown in Figure <ref>. (a) Fixing the subset size m, the split size K increases with the size of the full dataset n. We consider m=[50,100] and vary n=[1000,2000,3000,4000,5000]. (b) Fixing the split size K, the subset size m increases with the size of full dataset n. We consider K=[10,50] and vary n=[1000,2000,3000,4000,5000]. (c) Fixing the size of full dataset at n=12000 and vary K=[10,20,40,80,100,120]. (d) Fixing the size of full dataset at n=12000 and vary m=[100,200,400,800,1000,1200]. From the first and second rows of Figure <ref>, we can see that for fixed K and m, the log-MSE of SSMEL on μ and σ are closer to the behavior of CEL when the total sample increases. The SSEL and DEL perform poorly for the nonlinear statistic σ. With a fixed n, it can be seen from the third row of Figure <ref> that when K increases to 100, the estimation of SSMEL achieves the estimation efficiency under the full dataset. When m is large i.e. K is small, the log-MSE of SSMEL tends to increase due to excessive compression of information. Overall, the SSMEL performs more robustly compared to other methods. Case 3 In this case, we compare the performance of each method in terms of the reduction of computation time. Due to limited knowledge regarding parallel optimization of the likelihood components of SSEL, direct optimization of SSEL functions did not result in a significant reduction in computation time. We have restricted our comparison to the DEL and SSMEL. We consider n=12000 and 500 repetitions, and the results are presented in Table <ref>. From Table <ref>, we clearly see that the SSMEL reduces the computation time more efficiently than the DEL. It is worth highlighting that the SSMEL exhibits superior computational efficiency without relying on parallel computing devices. In contrast, the DEL may leverage parallel computing to decompose computation time, but its estimation accuracy may deteriorate as K increases. Example 2 In this example, we consider estimating the coefficients of a linear regression model with a varying number of parameters, Y_i =Z_i^Tβ+ε_i, i=1,⋯,n where β=(β_0,β_1,⋯,β_p)^T, ε_i and Z_i=(1,X_i1,⋯,X_ip)^T are independent, εi.i.d∼N(0,1), and X_i=(1,X_i1,⋯,X_ip)^Ti.i.d∼N(0,Σ_p) with Σ_p= [ 1 ρ ⋯ ρ; ρ 1 ⋯ ρ; ⋮ ⋮ ⋱ ⋮; ρ ρ ⋯ 1; ]_p× p we refer to the setting in <cit.> that p=[4,8,18], β_0=(1,5,4,3,2,1_p-4^T)^T with 1_p-4^T=(1,⋯,1)^T for p>4, and β_0=(1,5,4,3,2) for p=4. ρ=[0,0.2,0.5,0.8] in Σ_p. We fix the full dataset size at n=20000 and K=[10,50,100]. We compare the performance of SSMEL, DEL, and SSEL estimators in terms of empirical MSE, i.e. the mean of ‖β̂ - β_0 ‖^2. Table <ref> summarizes these results base on 500 replications. From Table <ref>, we can see that the MSE corresponding to SSMEL is very close to that of the CEL in most cases. The SSMEL exhibits poor performance when K is close to p due to the fact that the approach formally uses only K samples. When K is significantly greater than p, the SSMEL is computationally simple and the estimation is robust compared to other methods in various cases. Due to the fact that a plane can only be formed by three points in two dimensions, the parameter space of SSMEL is the convex hull of {g̅^(k)(θ), k=1,⋯, K}. Therefore, when K is close to p, the convex hull formed by K points is unable to effectively encompass p-dimensional vectors, resulting in poor estimation performance. Example 3 In this example, we examine the performance of the hypothesis test for the SSMEL. We generate data (X,Y) from the bivariate normal distribution N(μ_1,σ_1^2,μ_2,σ_2^2,ρ). We use a dataset size of 10000 and 500 replications with parameter values μ_1=μ_2=0, σ_1=σ_2=1, and ρ=0.5. The random vector (X,Y) of the N(μ_1,σ_1^2,μ_2,σ_2^2,ρ) satisfies the following moment conditions: 𝔼[g(X,Y;θ_0)]=𝔼[ μ_1 - X; μ_2 - Y; σ_1^2-(X-μ_1)^2; σ_2^2-(Y-μ_2)^2; (X-μ_1)(Y-μ_2)-ρσ_1σ_2 ] The hypothesis testing of DEL is challenging due to the failure to meet Wilks' theorem. To address this problem, <cit.> recently presented a statistical inference method for the one-shot estimator of average aggregation. The primary objective is to test the mean of the estimators of each subset using empirical likelihood. We applied the method to the DEL for hypothesis testing and compared it with the SSMEL, SSEL, and CEL. We consider the following null hypothesis: 1.H_0:θ = (μ_1,μ_2,σ_1,σ_2,ρ) = (0,0,1,1,0.5) 2.H_0:ψ = (μ_1,σ_1) = (0,1) 3.H_0:ρ=0.5 We choose K=[5,10,20,40,80,100], the false rejection rate at nominal levels α=0.05 for each method are recorded in Table <ref> and the empirical frequencies of ρ∉{ρ:𝒲(ρ)=2(l_S(ρ)-l_S(ρ̂))≤χ^2_1,0.95} for a sequence of ρ values in Table <ref>. From Table <ref>, we can see that the false rejection rate when using the SSMEL is also affected by the choice of K. The false rejection rate of SSMEL closes the nominal level and the results of the full dataset as K increases, and the change becomes subtle when K grows to a certain level (K=100). In contrast to the SSMEL, the SSEL is negatively impacted by larger values of K, as the false rejection rate deviates further away from the nominal level. The DEL is a more complex method compared to others, as it involves a trade-off between the one-shot estimation accuracy and the error of the asymptotic χ^2 distribution of the empirical log-likelihood function. From Table <ref> we can see that the test power of SSMEL has a consistent performance with the empirical likelihood under the full datasets. Therefore, the SSMEL is an effective alternative to the CEL to address the challenges of statistical inference with massive data. § REAL DATA ANALYSIS §.§ Protein dataset Physicochemical properties of protein tertiary structure dataset[<https://archive.ics.uci.edu/ml/datasets/Physicochemical+Properties+of+Protein+Tertiary+Structure>] are taken from CASP 5-9. There are 45730 decoys and sizes varying from 0 to 21 armstrong, which aims to predict the size of the residue(RSMD). The explanatory variables are as follows: X_1, total surface area; X_2, non polar exposed area; X_3, fractional area of exposed non polar residue; X_4, fractional area of exposed non polar part of residue; X_5, molecular mass weighted exposed area; X_6, average deviation from standard exposed area of residue; X_7, euclidian distance; X_8, secondary structure penalty; X_9, spacial distribution constraints (N,K Value). We randomly partition the dataset into a training set and a test set according to 7:3, where the training set has 32,010 samples and the test set has 13,720 samples. In this example, we use the training set to fit a linear regression model and the test set to evaluate the prediction performance of SSMEL under the K=[50,100,500]. We recorded the mean squared prediction error (MSPE) and computation time(CT) of CEL, DEL, and SSMEL under the different number of splits in Table <ref>. From Table <ref> we can see that the MSPE of SSMEL is very close to the CEL when K is close to 100, and the computation time is significantly reduced. §.§ the United Stated airline dataset In this section, we use the SSMEL to analyze the United States airline dataset, which is publicly available on the American Statistical Association (ASA) website[<http://stat-computing.org/dataexpo/2009>]. This airline dataset is very large, with nearly 120 million records. Each record contains information on every commercial flight detail in the United States from October 1987 to April 2008. The dataset is partitioned into 22 files based on year, each file containing 13 continuous variables and 16 categorical variables. However, due to the massive size of the dataset, a typical personal computer may not have sufficient memory to load the full dataset for statistical analysis. In this paper, we concentrate on the analysis of the 13 continuous variables, and only 5 have missing rates less 10%: ActualElapsedTime(actual elapsed time), CRSElapsedTime(scheduled elapsed time), Distance, DepDelay(departure) and ArrDelay(arrival delay). Therefore, we study these 5 variables. For more detailed information on the variables, refer to the ASA official website. Due to these variables being so heavy-tailed that the existence of finite moments becomes questionable. Similar to <cit.>, we perform a signed-log-transformation: log|x|· sign(x) on these variables. For each transformed variable, we examine the mean, standard deviation, skewness, and kurtosis, denoted as μ, σ, ξ, and κ. These statistics satisfy the following moment conditions: 𝔼[g(X;θ_0)]=𝔼[ μ - X; σ^2-(X-μ)^2; ξ - (X-μ)^3/σ^3; κ-(X-μ)^4/σ^4 ] =0 To handle the large dataset used in this study, we implemented a strategy of loading one year's worth of data at a time while retaining only the relevant variables in memory and discarding the irrelevant ones. Due to the size of the dataset, using the empirical likelihood method was not feasible due to its impractical computation time. As a solution, we partitioned the data into 5 subsets for each year, resulting in a total of 110 subsets, and calculated the DEL for comparison with the SSMEL. The estimators and computation time for each variable are presented in Table <ref>. From Table <ref>, we can see that the estimators of the two methods are consistent for most variables, while the SSMEL has a better computation time than the DEL. § DISCUSSION In this paper, we propose a novel and straightforward methodology for calculating the empirical likelihood with massive data which we refer to as split sample mean empirical likelihood (SSMEL). The approach employs split and compression strategies to address the obstacles in empirical likelihood with massive data. We show that the SSMEL preserves the statistical properties of the original empirical likelihood, and thus can be used for parameter estimation and statistical inference. Our approach's efficacy is confirmed through extensive simulation and real data analysis. It is worth noting that our method does not involve parallel computation, making it applicable to a broad range of computing devices and more feasible for real-world applications. Furthermore, in order to facilitate the processing of distributed dataset, we have developed a corresponding distributed algorithm for the SSMEL. To conclude this paper, we discuss several interesting directions for future research. First, this paper has only studied the case of fixed dimensionality, high-dimensional massive data are prevalent in real-world applications, so extending the approach to the case where both n and p are large is an important direction. Second, it would be of interest to develop a similar idea to more general M estimators. Finally, although we have designed an algorithm for distributed dataset for the SSMEL, the algorithm is a simple extension in <cit.>, which has a high communication cost, so it would be an interesting direction to design a more efficient distributed algorithm for this approach. cas-model2-names § APPENDIX: PROOFS The following Lemmas are similar from <cit.>. Under the assumption A.1- A.3, for any ξ with 1/α<ξ<1/2 and Λ_n={λ:‖λ‖≤ n^-ξ}, sup_θ∈Θ̅,λ∈Λ_n,1≤ k≤ K|λ^Tg̅^(k)(θ)|P⟶0, with probability tending to 1, Λ_n⊂Λ̂_K(θ) for all θ∈Θ̅. By Assumptions A.3 and Markov inequality, we have sup_θ∈Θ̅‖ g(x_i,θ)‖= O_p(n^1/α) And on the other hand, max_1≤ k≤ Ksup_θ∈Θ̅‖g̅^(k)(θ)‖ =max_1≤ k≤ Ksup_θ∈Θ̅‖1/m∑_i=1^mg(x_i^(k),θ)‖ ≤max_1≤ k≤ Ksup_θ∈Θ̅1/m∑_i=1^m‖ g(x_i^(k),θ)‖ ≤max_1≤ k≤ Ksup_θ∈Θ̅1/m∑_i=1^mmax_1≤ i≤ m‖ g(x_i^(k),θ)‖ =max_1≤ i≤ nsup_θ∈Θ̅‖ g(x_i,θ)‖ So it is obvious that max_1≤ k≤ Ksup_θ∈Θ̅‖g̅^(k)(θ)‖=O_p(n^1/α) Then by Cauchy-Schwarz inequality, sup_θ∈Θ̅,λ∈Λ_n,1≤ k≤ K|λ^Tg̅^(k)(θ)|≤ n^-ξmax_1≤ k≤ Ksup_θ∈Θ̅‖g̅^(k)(θ)‖=O_p(n^-ξ+1/α)p⟶0 Under Assumpitons A.1-A.4, if θ̂∈Θ̅, θ̂p⟶θ_0, and 1/K∑_k=1^Kg̅^(k)(θ̂)=O_p(n^-1/2), then with probability tending to 1, λ̂=argmax_λ∈Λ̂_n(θ̂)l_S(λ,θ̂) exists, and max_λ∈Λ̂_n(θ̂)l_S(λ,θ̂)≤ O_p(n^-1). Then the existence of λ̂∈Λ_n follows the statement in <cit.> by noting from Lemma A.<ref>, max_1≤ k≤ K|λ^Tg̅^(k)(θ)|p⟶0 for λ∈Λ_n. Then by a Tyloy expansion around λ=0, where λ̇ satisfy ‖λ̇‖≤‖λ̂‖, K· l_S(θ̂,λ̂)=∑_k=1^Kλ̂^Tg̅^(k)(θ̂)-1/2λ̂^T[∑_k=1^K{1+λ̇^Tg̅^(k)(θ̂)}^-2g̅^(k)(θ̂)g̅^(k)(θ̂)^T]λ̂ By Lemma A.<ref>, (1+λ̇g̅^(k)(θ̂))^-2>1/2 for all k with probability tending to 1. In addition by uniform weak law of large numbers ‖1/K∑_k=1^Kg̅^(k)(θ̂)g̅^(k)(θ̂)^T-1/mΩ‖p⟶0, as n→∞. Because λ̂ is the maximizer, we have with probability tending to 1, 0=l_S(θ̂,0)≤ l_S(θ̂,λ̂)≤‖λ̂‖‖1/K∑_k=1^Kg̅^(k)(θ̂)‖-c/4‖λ̂‖^2 This concludes ‖λ̂‖=O_p(n^-1/2) because ‖1/K∑_k=1^Kg̅^(k)(θ̂) ‖ = O_p(n^-1/2). Since ξ≤1/2, we have λ̂∈Λ̂_K(θ̂) with probability tending to 1. And this is easy to get max_λ∈Λ̂_K(θ̂)l_S(λ,θ̂)≤ O_p(n^-1) from (<ref>). Under Assumpitons A.1-A.4, we have ‖1/K∑_k=1^Kg̅^(k)(θ̂)‖=O_p(n^-1/2). It is worth noting that 1/K∑_k=1^Kg̅^(k)(θ̂)=1/K∑_k=1^K1/m∑_i=1^mg(x_i^(k),θ̂)=1/n∑_i=1^ng(x_i,θ̂) Let 1/K∑_k=1^Kg̅^(k)(θ̂)=1/n∑_i=1^ng(x_i,θ̂)=g̅(θ̂), and for ξ in Lemma A.<ref>, λ̃=n^-ξg̅(θ̂)/‖g̅(θ̂)‖. By Lemma A.<ref>, max_1≤ k≤ K|λ̃^Tg̅^(k)(θ̂)|p⟶0 and λ̃∈Λ̂_K(θ̂) with probability tending to 1. Also, by Cauchy-Schwarz inequality and uniform weak law of largr numbers, ∑_kg̅^(k)(θ̂)g̅^(k)(θ̂)^T/K≤(∑_k‖g̅^(k)(θ̂)‖^2/K)Ip⟶CI, so that the largest eigenvalue of ∑_kg̅^(k)(θ̂)g̅^(k)(θ̂)^T/K is bounded above with probability tending to 1. By Tylor expansion, where λ̇ satisfy ‖λ̇‖≤‖λ̃‖, it holds with probability tending to 1, l_S(θ̂,λ̃) =1/K∑_k=1^Kλ̃^Tg̅^(k)(θ̂)-1/2λ̃^T[1/K∑_i=1^K{1+λ̇^Tg̅^(k)(θ̂)}^-2g̅^(k)(θ̂)g̅^(k)(θ̂)^T]λ̃ ≥ n^-ξ‖g̅(θ̂)‖-Cn^-2ξ{1+o_p(1)} By the Lindeberg-Lévy central limit theorem the hypotheses of Lemma A.<ref> are satisfied by θ̂=θ_0. By θ̂ and λ̂ being a saddle point, this equation and Lemma A.<ref> give n^-ξ‖g̅(θ̂)‖-Cn^-2ξ≤ l_S(θ̂,λ̃)≤max_λ∈Λ̂_K(θ̂)l_S(θ̂,λ) ≤ O_p(n^-1) Also, by ξ<1/2, ξ-1<-1/2<-ξ. Solving Equation(<ref>) for ‖g̅(θ̂) ‖ then gives ‖g̅(θ̂) ‖≤ O_p(n^ξ-1)+Cn^-ξ = O_p(n^-ξ) We consider any ε_n→0. Let λ^*=ε_ng̅(θ̂), then λ^*=o_p(n^-ξ), so that λ^*∈Λ_n with probability tending to 1. Using the same arguments above, we can obtain ϵ_n‖g̅(θ̂)‖^2-Cϵ_n^2≤ O_p(n^-1) Then ϵ_n‖g̅(θ̂)‖^2=O_p(n^-1). Notice that we can select arbitrary slow ε_n→0, following a standard result form probability theroy, that if ε_nY_n=O_p(n^-1), for all ε_n→0, then Y_n=O_p(n^-1). So, we have ‖g̅(θ̂)‖=O_p(n^-1/2). Under Assumpitons A.1-A.4, we have θ̂_Sp⟶θ_0, 1/K∑_k=1^Kg̅^(k)(θ̂_S)=O_p(n^-1/2), λ̂_S=argmax_λ∈Λ̂_K(θ̂_S)l_S(θ̂_S,λ) exists with probability tending to 1, and λ̂_S=O_p(n^-1/2). Let g(θ)=𝔼[g(x,θ)], by Lemma A.<ref>, g̅(θ̂_S)p⟶0, and by uniform weak law of large numbers, sup_θ∈Θ̅‖g̅(θ)-g(θ)‖p⟶0 and g(θ) is continuous. By triangle inequlity, ‖g̅(θ̂_S)‖-‖ g(θ̂_S)‖≤‖g̅(θ̂_S)-g(θ̂_S)‖≤sup_θ∈Θ̅‖g̅(θ)-g(θ)‖ We have g(θ̂_S)p⟶0. Since g(θ)=0 has a unique zero at θ_0, ‖ g(θ)‖ must be bounded away from zero outside any neighborhood of θ_0. Therefore, θ̂_S must be inside any neighborhood of θ_0 with probability tending to 1, i.e. θ̂_Sp⟶θ_0, giving the first conclusion. The second conclusion follows by Lemma A.<ref>. And by the first two conclusions, the hypotheses of Lemma A.<ref> are satisfied, so that the last conclusion follows from Lemma A.<ref>. Under Assumpitons A.1-A.4, θ̂_S and λ̂_S satisfy Q_1K(θ̂_S,λ̂_S)=0, Q_2K(θ̂_S,λ̂_S)=0 where Q_1K(θ,λ) =1/K∑_k=1^K1/1+λ^Tg̅^(k)(θ)g̅^(k)(θ) Q_2K(θ,λ) =1/K∑_k=1^K1/1+λ^Tg̅^(k)(θ)(∂g̅^(k)(θ)/∂θ)^Tλ The conclusion can be obtained from Lemma A.<ref> and Lemma A.<ref>, more details refer the proof of Lemma 1 of <cit.> or the proof of Theorem 3.2 of <cit.>Proof of Theorem <ref> By LemmaA.<ref>, we have Q_1K(θ_S,λ_S) =1/K∑_k=1^K1/1+λ_S^Tg̅^(k)(θ_S)g̅^(k)(θ_S)=0, Q_2K(θ_S,λ_S) =1/K∑_k=1^K1/1+λ^T_Sg̅^(k)(θ_S)(∂g̅^(k)(θ_S)/∂θ)^Tλ_S=0 As n→∞, ∂ Q_1K(θ_0,0)/∂θ =1/K∑_k=1^K∂g̅^(k)(θ_0)/∂θ^T =1/K∑_k=1^K1/m∑_i=1^m∂ g(x_i^(k),θ_0)/∂θ^T =1/n∑_i=1^n∂ g(x_i,θ_0)/∂θ^Tp⟶𝔼(∂ g/∂θ^T)=G ∂ Q_1K(θ_0,0)/∂λ^T =-1/K∑_k=1^Kg̅^(k)(θ_0)g̅^(k)(θ_0)^T =-1/K∑_k=1^K1/m^2(∑_i=1^mg(x_i^(k),θ_0)∑_i=1^mg(x_i^(k),θ_0)^T) =-1/m1/n∑_i=1^ng(x_i,θ_0)g(x_i,θ_0)^T -1/n∑_k=1^K(2/m∑_i≠ s^mg(x_i^(k),θ_0)g(x_s^(k),θ_0)^T) p⟶-1/m𝔼(gg^T)+o_p(n^-1/2)=-1/mΩ+o_p(n^-1/2) ∂ Q_2K(θ_0,0)/∂λ^T =1/K∑_k=1^K(∂g̅^(k)(θ_0)/∂θ^T)^T=1/K∑_k=1^K1/m∑_i=1^m∂ g(x_i^(k),θ_0)/∂θ^T^T =1/n∑_i=1^n∂ g(x_i,θ_0)^T/∂θ^Tp⟶𝔼(∂ g/∂θ^T)^T=G^T By Tylor expansion around (θ_0,0), we can show 0 =Q_1K(θ̂_S,λ̂_S)=Q_1K(θ_0,0)+∂ Q_1K(θ_0,0)/∂θ(θ̂_S-θ_0)+∂ Q_1K(θ_0,0)/∂λ^Tλ̂_S+o_p(δ_K) 0 =Q_2K(θ̂_S,λ̂_S)=Q_2K(θ_0,0)+∂ Q_2K(θ_0,0)/∂θ(θ̂_S-θ_0)+∂ Q_2K(θ_0,0)/∂λ^Tλ̂_S+o_p(δ_K) where both Q_2K(θ_0,0) and ∂ Q_2K(θ_0,0)/∂θ are 0, δ_K=‖θ̂_S-θ_0‖+‖λ̂_S‖, so 0 =∂ Q_2K(θ_0,0)/∂λ^T×(-∂ Q_1K(θ_0,0)/∂λ^T)^-1×[Q_1K(θ_0,0)+∂ Q_1K(θ_0,0)/∂θ(θ̂_S-θ_0)+o_p(δ_K)]+o_p(δ_K) =G^T(1/mΩ)^-1Q_1K(θ_0,0)+G^T(1/mΩ)^-1G(θ̂_S-θ_0)+o_p(mn^-1/2) θ̂_S-θ_0 =-Σ G^TΩ^-1 Q_1K(θ_0,0)+o_p(n^-1/2) Because -√(n)Ω^-1/2Q_1K(θ_0,0) converges to standard multivariate normal distribution, i.e. -√(n)Ω^-1/2Q_1K(θ_0,0)=-√(n)Ω^-1/2g̅(θ_0)d⟶N(0,I), therefore as n→∞, we have √(n)(θ̂_S-θ_0)d⟶N(0,Σ) Proof of Corollary <ref> See literature Lemma 1 of <cit.>. Proof of Theorem <ref> The split sample mean empirical likelihood ratio test statistic is 𝒲(θ_0)=2{∑_k=1^Klog[1+λ_0^Tg̅^(k)(θ_0)]-∑_k=1^Klog[1+λ̂_S^Tg̅^(k)(θ̂_S)]} By LemmaA.<ref>, we have Q_1K(θ̂_S,λ̂_S)=0, and by Tylor expansion λ̂_S =[1/K∑_k=1^Kg̅^(k)(θ̂_S)g̅^(k)(θ̂_S)^T]^-1(∑_k=1^Kg̅^(k)(θ̂_S))+o_p(1) =(1/mΩ)^-1Q_1K(θ̂_S,0)+o_p(1) Also by the Taylor expansion and Euqation (<ref>), Q_1K(θ̂_S,0) =Q_1K(θ_0,0)+∂ Q_1K(θ_0,0)/∂θ^T(θ̂_S-θ_0)+o_p(1) =Q_1K(θ_0,0)+G(θ̂_S-θ_0)+o_p(1) =Q_1K(θ_0,0)-GΣ G^TΩ^-1Q_1K(θ_0,0)+o_p(1) Further Taylor expansion for l_S(θ̂_S,λ̂_S), and by Equation (<ref>) and (<ref>) we have 2l_S(θ̂_S,λ̂_S) =2∑_k=1^Klog[1+λ̂_S^Tg̅^(k)(θ̂_S)] =2∑_k=1^Kλ̂^T_Sg̅^(k)(θ̂_S)-2∑_k=1^K[λ̂^T_Sg̅^(k)(θ̅_S)]^2+o_p(1) =KQ_1K^T(θ̂_S,0)[1/K∑_k=1^Kg̅^(k)(θ_S)g̅^(k)(θ_S)^T]^-1Q_1K(θ̂_S,0)+o_p(1) =KQ_1K^T(θ̂_S,0)(1/mΩ)^-1Q_1K(θ̂_S,0)+o_p(1) =nQ^T_1K(θ_0,0)Ω^-1(I-GΣ G^TΩ^-1)Q_1K(θ_0,0)+o_p(1) Under H_0 is ture, similarly λ_0=Ω^-1Q_1K(θ_0,0)+o_p(1), and l_S(θ_0,λ_0)=nQ^T_1K(θ_0,0)Ω^-1Q_1K(θ_0,0)+o_p(1) Thus 𝒲(θ_0) =nQ^T_1K(θ_0,0)[Ω^-1-Ω^-1(I-GΣ G^TΩ^-1)]Q^T_1K(θ_0,0)+o_p(1) =nQ^T_1K(θ_0,0)Ω^-1GΣ G^TΩ^-1Q_1K(θ_0,0)+o_p(1) =[Ω^-1/2√(n)Q_1K(θ_0,0)]^T[Ω^-1/2GΣ G^TΩ^-1/2][Ω^-1/2√(n)Q_1K(θ_0,0)]+o_p(1) Note that Ω^-1/2GΣ G^TΩ^-1/2 converges to a standard multivariate normal distribution and that Ω^-1/2GΣ G^TΩ^-1/2 is symmetric idempotent, with trace equal to p. Hence the SSMEL ratio test statistic 𝒲(θ_0) converges to χ_p^2. Proof of Corollary <ref> See literature Corollary 5 of <cit.>.
http://arxiv.org/abs/2303.07383v1
20230313180152
Phylogenomic Models from Tree Symmetries
[ "Elizabeth A. Allman", "Colby Long", "John A. Rhodes" ]
q-bio.PE
[ "q-bio.PE", "92B10, 92D15, 62R01" ]
Phylogenomic Models from Tree Symmetries Elizabeth S. Allman, Colby Long, and John A. Rhodes March 30, 2023 ======================================================= A model of genomic sequence evolution on a species tree should include not only a sequence substitution process, but also a coalescent process, since different sites may evolve on different gene trees due to incomplete lineage sorting. Chifman and Kubatko initiated the study of such models, leading to the development of the SVDquartets methods of species tree inference. A key observation was that symmetries in an ultrametric species tree led to symmetries in the joint distribution of bases at the taxa. In this work, we explore the implications of such symmetry more fully, defining new models incorporating only the symmetries of this distribution, regardless of the mechanism that might have produced them. The models are thus supermodels of many standard ones with mechanistic parameterizations. We study phylogenetic invariants for the models, and establish identifiability of species tree topologies using them. Funding: ESA and JAR were partially supported by NSF grant 2051760 and NIH grant P20GM103395. § INTRODUCTION The SVDquartets method of Chifman and Kubatko <cit.> initiated a novel framework for species tree inference from genomic-scale data. Recognizing that individual sites may evolve along different “gene trees" due to the population-genetic effect of incomplete lineage sorting, their method is designed to work with site pattern data generated by the multispecies coalescent model of this process combined with a standard model of site-substitution. However, rather than try to associate particular gene trees to sites, they regard the observed site pattern distribution as a coalescent mixture. This effectively integrates the individual gene trees out of the analysis and allows them to formulate statistical tests based on an algebraic understanding of the site pattern frequencies. These tests detect the unrooted species tree topology in the case of four taxa. For a larger set of taxa, species trees can be found by inferring each quartet and then applying some method of quartet amalgamation. This leads to their SVDquartets method of species tree inference, which is implemented in PAUP* <cit.> and which continues to be an important tool for practical phylogenetic inference (e.g., <cit.>). The inference of unrooted 4-taxon species tree topologies in the SVDquartets approach is based on an algebraic insight that a certain flattening matrix built from the site pattern distribution should have low rank on a distribution exactly arising from the model. The mathematical arguments for this in <cit.> are based on the existence of a rooted cherry (i.e., a 2-clade) on an ultrametric species tree, leading to a symmetry in the site pattern distribution. Since any rooted 4-taxon tree with unrooted topology ab|cd must display at least one of the clades {a,b} or {c,d}, detecting that one or both of these clades is present is equivalent to determining the unrooted tree. The SVDquartets method tests precisely this, without determining which of the clades is present. In this work, we examine the algebraic framework underlying the work of Chifman and Kubatko and its subsequent extensions. We observe that the symmetry conditions implied by the Chifman-Kubatko model are key to their inference approach. Based on this observation, we formulate several statistical models, encompassing those of <cit.> as well as several more general mechanistic models, which capture the fundamental assumptions needed to justify SVDquartets. In contrast with the sorts of models generally used in empirical phylogenetics, which have a mechanistic interpretation (e.g., generation of gene trees by the coalescent process, generation of sequences by site-substitution models on the gene trees), the models here have only a descriptive interpretation, as they are defined algebraically by constraints on site pattern distributions. One consequence of defining our models in this way is that it becomes more clear that SVDquartets can give consistent species tree inference for mechanistic mixture models more general than that described in <cit.> (as hinted by results in <cit.>). In fact, it is easy to formulate plausible mechanistic models with many parameters (e.g. mixtures with many different base substitution processes) for which many of the numerical parameters must be non-identifiable, but for which SVDquartets inference of the species tree topology is statistically consistent. Such generality can be viewed as a strength of SVDquartets, as model misspecification arising from assumption of a simple substitution process across the entire genome is avoided. A second consequence is that our models highlight a symmetry in the site pattern distribution that reflects the rooted species tree, a symmetry that is present even for 3-taxon trees. Methods for inference of the species tree root in the same framework were proposed in <cit.>, but both of these works considered four taxa at a time, which is the smallest unrooted tree size in which topologies may differ. Since rooted trees are determined by their rooted triples, focusing on the 3-taxon case offers clear advantages for developing new inference methods. Unfortunately, in doing so, we lose the ability to naturally base statistical inference on rank conditions on matrices of the sort that underlie SVDquartets. Indeed, the possible flattening matrices for DNA site pattern data from the Chifman-Kubatko model in the 3-taxon case are all 4× 16 with full rank, so rank alone cannot distinguish them. As a consequence, the matrix Singular Value Decomposition (SVD) of the flattening matrix, which is used to determine approximate rank in the SVDquartets method, has no obvious role. However, we present an alternative matrix that must satisfy certain rank conditions in the 3-taxon case, which suggests it may be possible to develop a 3-taxon method analagous to SVDquartets. Our work here is theoretical, dealing primarily with model definitions and algebraic consequences of those models. We suggest its implications for data analysis, but do not explore possible methods based on these results in depth. We begin the next section with a review of the model of <cit.> and use it to motivate the introduction of our first model, the ultrametric exchangeable model. We then discuss a number of its submodels on ultrametric trees, and show in Section <ref> that the species tree parameter of these models is generically identifiable and species tree inference by SVDquartets is justified for all. In Section <ref>, we give a recursive formula for computing the dimension of the ultrametric exchangeable model, in terms of the dimensions of its subtree models joined at the root. This indicates that the dimension depends on the topology of the tree, which has implications for inference methods. In Section <ref>, we drop the assumption of an ultrametric species tree, reviewing the model of <cit.> in this setting and using it to motivate our second model, the extended exchangeable model. In Section <ref>, we explore the extended exchangeable model in more depth by restricting to 3-taxon trees and determining several algebraic invariants of this model. Finally, in Section <ref>, we show that the species tree parameter of the extended exchangeable model, as well as those of several mechanistic models that it contains, are generically identifiable. § A GENOMIC MODEL OF SITE PATTERNS ON ULTRAMETRIC TREES We begin by reviewing the simplest mechanistic model of Chifman and Kubatko <cit.>. For emphasis, we call this model (and others) mechanistic since it incorporates models of both incomplete lineage sorting and of site substitution (e.g., GTR) in its formulation. Many mechanistic models, including that of <cit.>, will be included as submodels of the more general non-mechanistic models we define below and for which the theory underlying SVDquartets applies more broadly. Specifically, let σ^+=(ψ^+,λ) be an ultrametric rooted species tree on a set of taxa X, with rooted leaf-labelled topology ψ^+ and edge lengths λ in number of generations. Let N be a single constant population size for all populations (i.e., edges) in the species tree, and μ a single scalar mutation rate for all populations. For a DNA substitution model fix some GTR rate matrix Q with associated stable base distribution π. These parameters determine a DNA site pattern distribution as follows: a site is first assigned a leaf-labelled ultrametric gene tree T sampled under the multispecies coalescent model on σ^+ with populations size N, with one gene lineage sampled per taxon. Then a site evolves on T according to the base substitution model with root distribution π and rate matrix μ Q. Site patterns thus have a distribution which is a coalescent independent mixture of site pattern distributions arising from the same GTR model on individual gene trees. We denote this model by CK=CK(σ^+,N,μ,Q,π). (While has a mild non-identifiability issue in that λ, N, and μ are not separately identifiable, this will not be of concern in this work since our focus is on inferring the topology ψ^+.) A key feature of the model is an exchangeability property that it inherits from the multispecies coalescent, due to the nature of the substitution model. Specifically, suppose {a,b}⊆ X is a 2-clade displayed on σ^+. Then for any metric gene tree T, let T' be the gene tree obtained from T by switching the labels a and b. Then the ultrametricity of σ^+ together with exchangeability of lineages under the coalescent model implies T and T' are equiprobable. Now consider any site pattern z=(z_1,z_2,…, z_n) for X, where z_i∈{A,G,C,T} is the base for taxon x_i∈ X, and let z' be the site pattern with the a and b entries interchanged. Then under the base substitution model the probability of z on T equals the probability of z' on T'. Thus, with 𝒯 denoting the space of all metric gene trees T on X, (z |σ^+,N,μ,Q,π) =∫_𝒯(z| T,μ,Q,π) (T|σ^+,N) dT =∫_𝒯(z'| T',μ,Q,π) (T'|σ^+,N) dT' =(z' |σ^+,N,μ,Q,π). Thus any 2-clade on the species tree produces symmetry in the site pattern frequency distribution. Moreover, since both the multispecies coalescent model and the sequence substitution model are well behaved with respect to marginalizing over taxa, it immediately follows that 2-clades on the induced subtrees σ^+|_Y on subsets Y⊂ X will produce symmetries in the marginalizations of the site pattern distribution to Y. This motivates the following definition of an algebraic model of site pattern probabilities. In this definition and in what follows, it will be convenient to regard a site pattern probability distribution P from a κ-state model on an n-leaf tree as an n-way site pattern probability tensor. That is, we regard P=(p_i_1 … i_n) as a κ×⋯×κ array with non-negative entries adding to 1, where p_i_1 … i_n denotes the probability that the n (ordered) taxa are in state (i_1, …, i_n). Let ψ^+ be a rooted binary topological species tree on X, and κ≥2. Then the κ-state ultrametric exchangeable model, _κ(ψ^+), is the set of all |X|-way site pattern probability tensors P, such that for every Y⊆ X, and every 2-clade {a,b} on ψ^+|_Y, the marginal distribution P_Y of site patterns on Y is invariant under exchanging the a and b indices. The collection of all distributions as ψ^+ ranges over rooted binary topological trees on X is the UE model (or the UE_κ model to avoid ambiguity). Although this model has `ultrametric' in its name, note that the tree ψ^+ is a topological rooted tree, with no edge lengths. `Ultrametric' here refers to the motivation for the model, generalizing the model on an ultrametric species tree discussed above. While one can contrive mechanistic models on non-ultrametric trees that lead to distributions in the _κ(ψ^+) model, we do not find them very natural, and prefer to highlight the ultrametricity that a plausible mechanistic model is likely to require to lie within _κ(ψ^+). It is important to note that unlike most models in phylogenetics, including the model above, the model is not defined through mechanistically-interpretable parameters. Rather it has a descriptive form relating entries of the model's joint distributions, chosen to reflect certain implicit features of the model. The model then can be viewed as a relaxation, or supermodel, of that more restrictive model. Let ψ^+ be the rooted 3-taxon tree (a,(b,c)) and consider a 2-state substitution model with states {0,1}. A probability distribution for the ( (a,(b,c)) ) model is P = (p_ijk), a 2 × 2 × 2 array with entries the joint probabilities for assignments of states to the taxa, p_ijk = (a = `i', b =`j', c=`k'). Since the constraints on the model arise only from subsets Y⊆{a,b,c} that contain at least two taxa, there are four subsets of interest: {a,b,c}, {b,c}, {a,b}, {a,c}. Then _2(ψ^+) is a subset of the probability simplex Δ^7⊂ℝ^8 defined by the following linear equations. {a,b,c} : p_010 = p_001 p_101 = p_110 {b,c} : p_001 + p_101 = p_010 + p_110 {a,b} : p_010 + p_011 = p_100 + p_101 {a,c} : p_001 + p_011 = p_100 + p_110 The first two constraints, for {a,b,c}, express that slices on the first index of probability tensors in _2(ψ^+) are symmetric. Specifically, if P_z ·· denotes the conditional distribution of b,c when a is in state z, then the 2× 2 matrix P_z ·· is symmetric for each z ∈{0,1}. These imply the third equation, for {b,c}, expressing that marginalizing over the first index gives a symmetric matrix. The fourth equation, for {a,b}, is independent of the first three, but with them implies the fifth one, for {a,c}. Taking into account the probabilistic requirement that ∑_i,j,k∈{0,1}p_ijk=1, we see the model is a restriction of a 4-dimensional affine space to the simplex Δ^7 with 0≤ p_ijk≤ 1. It is clear that far more complicated models of site pattern evolution on a species tree than the model give rise to distributions which also lie within the model, since the only requirement is that the resulting site pattern distributions reflect the symmetries of the species tree. For instance, in <cit.>, an extension is given to allow for Γ-distributed rate variation across sites. A further generalization, allowing for edge-dependent variation of the population size N = N_e, as well as time-dependent variation in the mutation rate μ across the species tree, can also easily be seen to produce distributions lying within . Since the symmetry conditions arising from the species tree are linear constraints on the site pattern probability distributions, arbitrary mixtures of models exhibiting the same symmetries will again exhibit these symmetries. Thus, the mechanistic models in <cit.> on ultrametric trees that allow for variation in the substitution rate matrix across sites also are submodels of . Similarly, it has been shown that a model of gene flow on a 3-taxon ultrametric species tree will produce site pattern probability distributions that reflect the symmetry in the 2-clade of the species tree <cit.>. In focusing on the model we obtain results that apply to all these models, and possibly more to be formulated in the future. § GENERIC IDENTIFIABILITY OF TREES UNDER THE MODEL To use a statistical model for valid inference, it is necessary that any parameter one wishes to infer be identifiable; that is, a probability distribution from the model must uniquely determine the parameter. For phylogenetic models, this strict notion is generally too strong to hold, but one can often establish a similar generic result, that the set of distributions on which identifiability fails is of negligible size (measure zero) within the model. The following theorem is in this vein. The rooted binary topological tree ψ^+ is identifiable from a generic probability distribution in the model. Fix κ and a taxon set X. Since for each binary species tree topology ψ^+ the symmetry conditions are expressible by linear equations, the model for ψ^+ is the intersection of a linear space with the probability simplex. We establish the result by showing that the linear model spaces for different ψ^+ are not contained in one another, since then their intersection is of lower dimension and hence of measure zero within them. That the linear spaces are not contained in one another will follow by establishing that for each ψ^+ there is at least one distribution in _κ(ψ^+) that fails to have any `extra symmetry' required for it to be in the model for a different tree. To construct such a distribution, assign positive edge lengths to ψ^+ so that the tree is ultrametric, and consider on it the κ-state analog of the (non-coalescent) Jukes-Cantor (henceforth denoted JC) model. The resulting site pattern distribution P is easily seen to have the necessary symmetries to lie in the UE model. To show P has no extra symmetries, suppose to the contrary that there is a Y⊂ X containing two taxa a,c where P|_Y is invariant under exchanging the a and c indices, yet a,c do not form a cherry on ψ^+|_Y. Then, after possibly interchanging the names of a,c, there is a third taxon b such that the rooted triple ((a,b),c) is displayed on ψ^+|_Y. Moreover, by further marginalizing to Y'={a,b,c}, we have that P|_Y' arises from a Jukes-Cantor model on a 3-taxon ultrametric tree with positive edge lengths and rooted topology ((a,b),c), and exhibits a,c symmetry. To see that this is impossible, note that if P|_Y' has both a,b and a,c symmetry, then it also exhibits b,c symmetry. Thus, all marginalizations of P|_Y' to two taxa are equal. This implies all JC distances between taxa, which can be computed from these marginalizations, are equal. This contradicts that the tree was binary. Note that the proof above did not consider a coalescent process in any way in order to show that extra symmetries do not generically hold in (ψ^+). However, since applications may consider submodels of the UE model, such as the CK model, it is necessary to ensure they do not lie within the exceptional set of non-generic points in the UE model where tree identifiability may fail. To address this issue, we seek an identifiability result for more general mechanistic models that have an analytic parameterization, by which we mean that for each topology ψ^+ there is an analytic map from a full-dimensional connected subset of ℝ^k, for some k, to the set of probability distributions comprising the model. For example, if σ^+ is a rooted metric species tree with shape ψ^+, and site pattern frequency distributions are generated on gene trees arising under the coalescent using the GTR+I+Γ model, then the collection of such distributions is given by an analytic parameterization, and as such is a submodel of (ψ^+). Consider any submodel of the model with an analytic parameterization general enough to have the JC model as a limit. Then for generic parameters the rooted topological tree ψ^+ is identifiable. Let f:Θ→ UE(ψ^+) denote the parameterization map for the submodel on tree ψ^+. Then f(Θ) cannot lie entirely in UE(ϕ^+) for any ϕ^+ψ^+, since, as shown in the previous proof, there are points from the JC model in the closure of f(Θ) which are not in the closed set UE(ϕ^+). Thus the set f^-1(UE(ψ^+) ∩ UE(ϕ^+)) is a proper analytic subvariety of Θ, and hence of measure zero in it. Since there are only finitely many ϕ^+, for generic points in Θ the resulting distribution lies in the UE model for ψ^+ only. Note that the CK model, which is analytically parameterized, has the JC model as a limit, since after choosing a JC substitution process one can let the population size N→0^+. This effectively “turns off" the coalescent process, as small population sizes result in rapid coalescence. Geometrically, the model on a particular tree is a convex set, since it can be expressed as the solution set for a system of linear equations and inequalities. It immediately follows that mixtures of instances of the UE model on the same tree, whether defined by integrals such as typical rates-across-sites models (e.g., the ultrametric GTR+Γ coalescent mixture of <cit.>) or as sums (e.g., an ultrametric mixture of coalescent mixtures, as in <cit.>), or both, are also submodels of on that tree. Provided the model has an analytic parameterization, as all these examples do, Theorem <ref> then says that the tree topology is generically identifiable. Even in cases of mixtures which have so many numerical parameters that dimension arguments show they cannot all be individually identifiable, the species tree topology remains so. This is a potentially valuable observation, as a scheme designed for inference of a tree under the model may avoid some issues of model misspecification that might arise with a more standard approach of restricting to very simple models (e.g. constant population size) so that all numerical parameters are identifiable as well. The above theorems of course imply the weaker statement that for the model (and many analytic submodels of the model) on four or more taxa, the unrooted species tree topology is identifiable. As SVDquartets is designed to infer unrooted 4-taxon trees, this gives hope that it might also be able to infer the unrooted tree topology for distributions from the more general model. For this to be possible, it is necessary to prove that the specific flattening matrices considered in the SVDquartets method satisfy certain rank conditions, the content of the next theorem. Recall that if a κ×κ×κ×κ array P has indices corresponding to taxa a,b,c,d, then the flattening _ab|cd(P) is a κ^2×κ^2 matrix with row and column indices in κ×κ and ((i,j),(k,l))-entry P(i,j,k,l). For P∈_κ(ψ^+), and ab|cd any unrooted quartet induced from the tree ψ^+, let P̃=P|_{a,b,c,d} denote the marginalization to the taxa a,b,c,d. Then for all such P, _ab|cd(P̃) has rank at most κ+12, while for generic P, _ac|bd(P̃) and _ad|bc(P̃) have rank κ^2. Since ψ^+|_{a,b,c,d} has at least one cherry, assume one is formed by a,b. Then symmetry under exchanging the a,b indices of P̃ shows that for each 1≤ i<j≤κ, the (i,j) and (j,i) rows of _ab|cd(P̃) are identical. Thus that flattening has at most κ^2-κ2=κ+12 distinct rows, and its rank is at most κ+12. We prove the second statement for _ac|bd(P̃), noting that the argument for _ad|bc(P̃) is similar. To show that for generic P∈_κ(ψ^+), _ac|bd(P̃) has full rank, it suffices to construct a single P for which this flattening matrix is full rank. To see that this is the case, consider the algebraic variety V_ac|bd = { P ∈ℝ^κ^|X|| (_ac|bd(P̃)) = 0}. This variety is defined by a single degree κ^2 polynomial and contains all of the points P for which _ac|bd(P̃) is singular. If there is a single point P ∈_κ (ψ^+) for which _ac|bd(P̃) ≠ 0, then the affine space _κ (ψ^+) is not contained in V_ac|bd. Thus, the intersection of _κ (ψ^+) with V_ac|bd is a proper subvariety of _κ (ψ^+), and hence of measure zero within it. Thus, generically, _ac|bd(P̃) is full rank. To construct such a probability distribution, assign any positive lengths to the edges of ψ^+ so that it becomes ultrametric, and consider the κ-state JC model on it (with no coalescent process). This leads to a distribution P ∈_κ(ψ^+). Then P̃ arises from the Jukes-Cantor model on the induced rooted 4-taxon tree. Since the JC model is time reversible, P̃ is also obtained by rooting the quartet tree at the MRCA of a and b, with non-identity JC Markov matrices on each of the 5 edges of this rerooted tree. Let M_a,M_b,M_c,M_d denote the Markov matrices on the pendant edges and M_int on the internal edge, so that F=(1/κ) M_int is the distribution of pairs of bases at the endpoints of the internal edge. Let N_ac=M_a⊗ M_c and N_bd=M_b⊗ M_d denote the Kronkecker products. Then, following the details of <cit.>, the flattening matrix may be expressed as _ac|bd(P̃)=N_ac^T D N_bd, where D is a κ^2×κ^2 diagonal matrix formed from the entries of F. Since M_int is assumed to be a non-identity JC matrix, F has no zero entries, so D has rank κ^2. Similarly, the JC transition matrices M_a,M_b,M_c,M_d are non-singular, and since the Kronecker product of non-singular matrices is non-singular, so are N_ac^T and N_bd. Thus _ac|bd generically has full rank. The argument in this proof, that generically the ranks of “wrong” flattenings of quartet distributions are large, proceeded by constructing an element of the model using a parameterized model in the absence of a coalescent process. However, just as was done in Theorem 3.2, we can extend the conclusion to analytic submodels of the model, such as those incorporating the coalescent. For instance, since the CK model has the non-coalescent JC model as a limit, this implies that there are points in the model that are arbitrarily close to the point P constructed in the proof, which therefore must also have rank κ^2 flattenings, as matrix rank is lower semicontinuous. We can thus obtain the following generalization of a result from <cit.>. Consider any submodel of the (ψ^+) model with an analytic parameterization general enough to have the JC model as a limit. If ψ^+ displays the quartet ab|cd, then for all distributions P in the model, with P̃=P|_{a,b,c,d}, _ab|cd(P̃) has rank at most κ+12, while for generic P, _ac|bd(P̃) and _ad|bc(P̃) have rank κ^2. We note that our proof of this theorem has avoided the explicit calculations and more intricate arguments that appear in <cit.> while also establishing the result in a more general setting. This is possible because of our use of a tensor P in the closure of the model, but not in the model, as well as adopting the viewpoint of <cit.> on flattenings as matrix products. Using the two preceding theorems on identifiability, the statistical consistency of the SVDquartets method can be obtained. When Chifman and Kubatko <cit.> proved essentially the same result on ranks of flattenings for the model, they highlighted it as an identifiability result, but did not explicitly make a claim of consistency. The consistency result for SVDquartets was then unambiguously stated and proved in this setting in <cit.>, which also gave an analysis of the convergence rate. Here we show that their argument for the consistency of SVDquartets applies more generally to site patterns generated under the model, as well as many submodels. In particular, it validates the consistency of inference under models allowing mixtures of coalescent mixtures which may have different substitution processes across the genome, as described in <cit.>. To be precise, we must first specify some method of quartet amalgamation M, which takes a collection of one quartet tree for each 4-taxon subset of X and produces an unrooted topological tree on X. In order to establish consistency, we require that if all quartet trees in the collection given to the method M are displayed on a common tree T on X, then M returns T. Following <cit.>, we say such a method is exact while recognizing that for large sets X one generally must use a heuristic method M' that seeks to approximate M. The SVDquartets method, using an exact method to construct a tree from a collection of quartets, gives a statistically consistent unrooted species tree topology estimator for generic parameters under the model, and under any submodel with an analytic parameterization general enough to have the JC model as a limit. To simplify notation in the argument, let _ac|bd(P) denote the ac|bd flattening of the marginalization P|_{a,b,c,d}. By Theorems <ref> and <ref> for generic parameters giving a probability distribution P in the model and any four taxa a,b,c,d such that ab|cd is displayed on the unrooted tree ψ, _ab|cd(P) has rank at most κ+12, while _ac|bd(P) and _ad|bc(P) have rank κ^2. This implies that _ab|cd(P) will have at least κ 2 singular values of 0, while _ac|bd(P) and _ad|bc(P) have all positive singular values. For a finite sample of s sites from the model, denote the empirical distribution by P̂_s. Then for any ϵ>0 and any norm lim_s→∞Pr(|P̂_s-P|<ϵ) =1. Since the vector σ(M) of ordered singular values of a matrix M is a continuous function of the matrix, this implies that for each q ∈{ab|cd, ac|bd, ad|bc} lim_s→∞Pr( σ(_q(P̂_s))-σ(_q(P))<ϵ) =1 where · denotes any vector norm. With the SVD score μ(M) defined as the sum of the κ 2 smallest singular values of a κ^2×κ^2 matrix M, we know 0=μ( _ab|cd(P) )<min{μ (_ac|bd(P) ), μ(_ad|bc(P) ) }. But it then follows that lim_s→∞Pr( μ(_ab|cd(P̂_s) )<min{μ(_ac|bd(P̂_s)),μ(_ad|bc(P̂_s))}) = 1. Thus, as the sample size s grows, the probability that choosing the quartet tree on a,b,c,d minimizing μ gives the quartet tree displayed on ψ approaches 1. Since this probability approaches 1 for each of set of four taxa, and there are only finitely many such sets, the probability that all quartet trees inferred by minimizing μ are displayed on the species tree approaches 1. Thus with probability approaching 1, the method M will return the correct species tree. § DIMENSION OF MODELS ON LARGE TREES Although the symmetry conditions of the model have been expressed as linear constraint equations, these constraints are not in general independent, as was shown for a particular 3-taxon species tree in Example <ref>. In that example, it was easy to determine a basis of constraints, and thus the dimension of the model. In this section we investigate larger trees and determine the model dimension. Knowledge of dimension is important for several reasons. First, it gives us a basic insight into how restrictive the model on a particular tree topology is. Second, if one is to use these models for tree inference, the dimension is important for judging how close a data point is to fitting the model. Intuitively, data is conceptualized as coming from a true model point with `noise' added, and if a model has high dimension the noise tends to do less to move that data from the model than if it had lower dimension. Such dimensionality considerations are made rigorous in many model selection criteria, for instance the Akaike Information Criterion and Bayesian Information Criterion. For a rooted topological tree ψ^+ on taxa X we consider the model _κ(ψ^+). Let d_κ(ψ^+) denote the dimension of the affine space V(ψ^+)⊂^κ^|X| of all tensors satisfying the linear equations expressing the symmetry conditions defining the model, as well as that all entries of the distribution tensor sum to 1 (i.e., the affine, or Zariski, closure of the model). By dropping the condition that tensor entries sum to 1, we pass to the cone over the model, a linear space L(ψ^+) of dimension c_κ(ψ^+)=d_κ(ψ^+)+1. We now give a recursive formula for computing the dimension c_κ(ψ^+). For a rooted binary topological tree ψ^+ on a taxon set X, let ψ_A^+ and ψ_B^+ be the rooted subtrees descendant from the child nodes of the root of ψ^+, on taxa A and B respectively, so that X=A⊔ B and ψ^+=(ψ_A^+,ψ_B^+). Then c_κ(ψ^+) = c_κ(ψ_A^+)c_κ(ψ_B^+) - κ2. For a topological rooted species tree ψ^+ on X, we can construct a set of equations defining the cone L(ψ^+) by considering every subset Y ⊆ X and every 2-clade {a, b} of each ψ^+_|Y as was done in Example <ref>. However, as we saw in that example, the equations we obtain in this way are not necessarily independent. As a first step towards proving Theorem <ref>, we construct a smaller (though still not necessarily independent) set of linear equations defining the cone L(ψ^+). This set is defined by associating a set of linear equations to each vertex of the topological rooted tree ψ^+ on X. Specifically, for each internal vertex v of ψ^+ choose two taxa a ,b with v=(a,b). Let P be a |X|-dimensional κ×⋯×κ tensor of indeterminates, with indices corresponding to taxa in X and let P_a b denote the marginalization of P over all indices corresponding to taxa in (v)∖{a ,b}. Each choice of the indices corresponding to taxa in X ∖(v) determines a matrix slice of P_a b, with indices corresponding to a ,b. Expressing that each of these slices is symmetric yields a collection of linear equations. Denote this set of equations by 𝒮_v=𝒮(ψ^+,{a,b}). Though the set 𝒮_v will depend on the particular pair of taxa (a,b) chosen, for our purposes the particular pair is irrelevant, so one can designate any consistent rule for selecting the pair (a,b) so that the 𝒮_v are well-defined. If v is not an internal vertex of ψ^+, define S_v to be the empty set. Let ψ^+ be a topological rooted tree on X. Then the set 𝒮 = ⋃_v ∈ V(ψ^+)𝒮_v defines the cone L(ψ^+). It is enough to show that if v=(a, b)=(a,c), then the linear equations expressing symmetry of slices of P_ac are contained in the span of those expressing symmetry of slices of P_ab together with those equations in 𝒮 arising from nodes descended from v. We show this inductively, proceeding from the leaves of the tree to the root. The base case, when v has only two leaf descendants, is trivial. Assume the result holds for the internal nodes descended from v. Let the children of v be v_1, which is ancestral to or equal to a, and v_2, which is ancestral to b,c since ψ^+ is binary. Then w=(b,c) is a descendent of v_2. The equations arising from w express that any entry of the marginalization of P over all descendants of w except b, c is invariant under exchanging the b, c indices. Since the entries of P_ab arise from further marginalization, the equations expressing symmetry of the ab-slices together with those arising from w imply those expressing the ac-slices of P_ac are symmetric. The proof of the previous lemma explains the dependence of the equations we see in Example <ref>. The {a,b,c} constraints are the equations arising from MRCA(b,c), which in that example, required no marginalization of P. The {a,b} constraints are the equations arising from the root of the tree that express symmetry of P_ab which are obtained by marginalizing P over c. Together, these constraints imply the {b,c} and {a,c} constraints, the latter of which express symmetry in the slices of P_ac. Let n_A=|A| and n_B=|B|. With U= ℝ^κ^n_A and V=ℝ^κ^n_B, we identify W=U⊗ V=ℝ^|X| with the space of k^n_A× k^n_B real matrices. In particular, we have L(ψ_A^+)⊂ U, L(ψ_B^+)⊂ V, and L(ψ^+)⊂ W. We first claim that L(ψ_A^+)⊗ L(ψ_B^+) is the subspace Z⊂ W defined by the subset 𝒮' of 𝒮 = 𝒮(ψ^+) of Lemma <ref> containing only those equations arising from non-root internal nodes of ψ^+. To see L(ψ_A^+)⊗ L(ψ_B^+)⊆ Z, consider an equation in 𝒮' associated to a non-root node v and its descendant taxa a,b as in the lemma. Without loss of generality, we may assume v is a node of ψ_A. Then, ordering the taxa so that a,b are the first two, this equation in 𝒮' has the form ∑_ α_1 x_(i,j,α_1,α_2),β -∑_ α_1 x_(j,i,α_1,α_2),β =0 where the summation over α_1∈ [k]^m runs through all assignments of states to taxa descended from v other than a,b , α_2∈ [k]^n_A-2-m is a fixed choice of states for taxa in A not descended from v, β∈ [k]^n_B is a fixed choice of states for the taxa in B, and i j. This equation expresses that column β of a matrix in W satisfies an equation associated to v, a, and b in the definition of L(ψ_A^+). Thus it holds on all of L(ψ_A^+)⊗ L(ψ_B^+), and we obtain the desired inclusion. To see L(ψ_A^+)⊗ L(ψ_B^+)⊇ Z, note that equation (<ref>) has shown that every column of z∈ Z lies in L(ψ_A^+), and likewise every row of z lies in L(ψ_B^+). But from the singular value decomposition of z, z=∑_i c_i⊗ r_i where the c_i form a basis for the column space of z and the r_i form a basis for the row space of z. Since c_i∈ L(ψ_A^+) and r_i∈ L(ψ_B^+), it follows that z∈ L(ψ_A^+)⊗ L(ψ_B^+), establishing the stated inclusion and that Z = L(ψ_A^+)⊗ L(ψ_B^+). Now the space L(ψ^+) is the subset of Z=L(ψ_A^+)⊗ L(ψ_B^+) defined by the equations in 𝒮∖𝒮', associated to the root of ψ. To conclude that c_κ(ψ^+) = c_κ(ψ_A^+)c_κ(ψ_B^+) - κ 2, it is enough to show that we can obtain an independent set of equations defining L(ψ^+) by taking an independent set defining Z and augmenting it by κ 2 additional independent equations associated to the root. Let ℒ be any independent subset of equations in 𝒮' that define Z, and ℳ=𝒮∖𝒮' the set of κ 2 equations associated to the root of ψ^+ (and the choice of a∈ A and b∈ B). Then ℒ∪ℳ defines L(ψ^+). To see that ℒ∪ℳ is independent, first order indices so that a and b indices are listed first among A and B. Then, using `+' in an index to denote the sum over the assignment of all states [κ] = {1, 2, …, κ} in that index, for any 1 ≤ i<j ≤ k, x_i+…+, j+…+ - x_j+…+, i+…+=0 must be the unique element of ℳ that involves the variable x_ii⋯ i, jj⋯ j (noting that each equation in ℒ involves variables that have at least two distinct entries in the indices for A or two distinct entries in the indices for B). Since ℒ is an independent set, this implies ℒ∪ℳ is independent. The theorem gives insight into model dimensions for families of `extreme' topologies: rooted caterpillars and fully balanced shapes. Suppose ψ^+ is a rooted caterpillar tree on n taxa. Then the dimension of the _κ(ψ^+) model is d_κ(ψ^+)=κ^n+κ/2 -1. If n=1, then the model is simply a base distribution for the sole taxon, so d_κ(ψ^+)=κ -1, consistent with the stated formula. Now inductively assume the stated formula for the rooted caterpillar on n-1 taxa. Then by Theorem <ref>, for n taxa c_κ(ψ^+)=(κ^n-1+κ/2)κ -κ2= ( κ^n+κ^2/2) -(κ^2-κ/2)= κ^n+κ/2, and the claim follows. Also from Theorem <ref> we can compute that the dimension of the model on the 4-taxon balanced tree ((a,b),(c,d)) is d_κ = ( κ^2+κ/2)^2-κ 2-1= κ(κ^3+2κ^2-κ+2)/4 -1. By comparing the dimensions for the 4-taxon caterpillar and balanced trees, we see that d_k depends on the rooted tree topology, and not only on the number of taxa. More generally, for a fully balanced tree ψ^+ on n=2^ℓ taxa, Theorem <ref> yields that d_κ(ψ^+)= ( ( κ(κ+1)/2 )^n/2 ). Thus for fully balanced trees the dimension is o(κ^n/2), while for rooted caterpillars on n taxa, Corollary <ref> shows the dimension is asymptotic to κ^n/2. For a fixed number of taxa n = 2^ℓ, it follows that the dimension of the balanced tree model will be smaller than that of the caterpillar. This comparison of model dimension for caterpillars and balanced trees is intuitively plausible, as cherries on the full tree lead to more symmetry requirements on a tensor than do cherries on subtrees. In general, the more balanced a tree is, the smaller one might expect the model dimension to be. This leads us to pose the following conjectures, where RB(n) denotes the set of rooted binary n-leaf trees. For all κ, there exists an m, such that for n ≥ m, d_κ(ψ^+) is maximized over ψ^+ ∈ RB(n) when ψ^+ is the n-leaf caterpillar tree. For all κ, there exists an m, such that for ℓ≥ m, d_κ(ψ^+) is minimized over ψ^+ ∈ RB(2^ℓ) when ψ^+ is the 2^ℓ-leaf balanced tree. § A GENOMIC MODEL OF SITE PATTERNS ON GENERAL TREES In this section, we examine a generalization of the CK model to non-ultrametric trees to motivate an algebraic model that encompasses it. Marginalizations (respectively, slices) of a site pattern probability tensor will be denoted by placing a `+' (resp. k) in the index summed over (resp. conditioned on). The transpose operator will be denoted with an exponent `T.' For example, we can generalize the equations derived in Example <ref> for the model on the ultrametric 3-leaf rooted tree (a, (b,c)) for any value of κ using this notation as follows: 4cm (1) P_k ··=P_k ··^T, (2) P_+··=P_+··^T. 4cm (3) P_··+=P_··+^T, (4) P_·+·=P_·+·^T. In the definition of the model, these constraints arise from the taxon subsets (1) {a,b,c}, (2) {b,c}, (3) {a,b} and (4) {a,c}, and it is not hard to see that the equations in (1) and (3) imply those in (2) and (4), just as in Example <ref>. §.§ The Extended Exchangeability Model In <cit.>, the model is extended to permit non-ultrametricity of the species tree. This extension allows, for instance, the modeling of relationships between species when generation times or scalar mutation rates differ across populations in the tree. In this same work, flattening matrices are used to establish the generic identifiability of the unrooted species tree topology of the extended model from which it follows that SVDquartets is still a statistically consistent method of inference of the unrooted species tree topology for these models when combined with any exact method of quartet amalgamation. In order to motivate our algebraic model, first consider a model obtained from the by dropping the ultrametricity requirement on the species tree. Suppose a and b are taxa in a 2-clade on σ^+, and let v be their common parental node. In the special case that the edge lengths of e_a=(v,a) and e_b=(v,b) equal, then the lineages a and b would be exchangeable under this site pattern model as shown for the model. Thus, for this particular tree the site pattern distribution can be viewed as a tensor with symmetry in the a and b coordinates. On a general species tree, however, where e_a and e_b may have different lengths and mutation rates may not be consistent, all sites evolve over those edges according to the transition matrices M_a =exp (s_a Q ), s_a=∫_0^ℓ(e_a)μ_e_a(t)dt, M_b =exp (s_b Q ), s_b=∫_0^ℓ(e_b)μ_e_b(t)dt, where ℓ(e) is the length of edge e and μ_e_a(t) and μ_e_b(t) are time dependent mutations rates. Supposing, without loss of generality, that s_a≤ s_b, define the Markov matrix M=M_bM_a^-1=exp ((s_b-s_a) Q ). Then the site pattern distribution can be viewed as one obtained from a tensor with symmetry in a and b that has been acted on by M in the b-index. More specifically, we imagine that on the edges leading toward both a and b, the Markov matrix M_a describes an initial substitution process, but on the edge to b there is a subsequent mutation process described by M. If we introduce an additional action by M on the edge to a, then in the resulting distribution we would regain symmetry in a and b. Since no coalescent events occur in these pendant edges, there are no complications arising from the coalescent events that do occur. To formalize this mathematically, suppose P is an N-way κ×κ×⋯×κ tensor. Define the action of a κ×κ matrix M in the kth index of P by Q=P*_k M where Q(i_1,i_2,…,i_k,…, i_N)=vM, with v the row vector determined by fixing the ℓth index of P to be i_ℓ for all ℓ k. For example, for n = 3 and k=1, the tensor P*_1M is specified by (P*_1M)_ijk = (P_· j k M)_i. Given an n-tuple of matrices (M_1,M_2,… M_n), let P*(M_1,M_2,…, M_n)=(… ((P*_1M_1)*_2M_2)… *_nM_n) denote the action in each of the indices of P. Let ψ^+ be a rooted topological species tree on X with |X|=n. Then the extended exchangeable model, _κ(ψ^+), is the set of all n-way site pattern probability tensors P, such that there is an n-tuple M=(M_1,M_2,…, M_n) of κ×κ non-singular Markov matrices M_i and a non-negative array P̃ in the model _κ(ψ^+) such that P*M=P̃. We note that is a submodel of : any distribution in _κ(ψ^+) is seen to lie in _κ(ψ^+) by taking all matrices M_i to be the identity. Also, to ensure that the model does not include all distributions, it is important that the M_i be non-singular in this definition: Otherwise, if the M_i describe processes where all states transition to the same state with probability 1, then for any tensor P, P*(M_1,M_2,… M_n)=P̃, a tensor with a single diagonal entry equal to 1 that is in UE. While the model on a 2-leaf tree imposes constraints on the probability distribution of site patterns, the 2-leaf model is dense among all probability distributions. Indeed, the model on such a tree simply requires that the site pattern distribution have the form of P= M_1^-TSM_2^-1 with S a symmetric probability matrix and the M_i Markov. But a dense subset of all probability distributions can be expressed as P=DM for a diagonal matrix D with entries from the row sums of P and an invertible Markov matrix M. We can thus take M_1=M, S=M^TDM, and M_2=I. For a 3-taxon tree, though, the model is typically not the full probability simplex Δ^κ^3-1. For κ≥ 4, this follows from a simple dimension bound. The UE(ψ^+) model for a 3-taxon tree ψ^+ has, from Corollary 4.3, dimension d_κ = κ^3+κ/2 -1. Moreover, the affine closure of the UE model on a 3-taxon tree is mapped to itself by the * action of (M^-1,M^-1,M^-1) for any Markov matrix M. Thus the dimension of the EE(ψ^+) model can be at most (UE(ψ^+)+2κ(κ-1), where the second term is the number of parameters specifying two Markov matrices. Thus (EE(ψ^+)≤κ^3+4κ^2-3κ/2 -1< κ^3-1 for all κ≥ 4. As we address in the remark following Corollary <ref>, we can confirm computationally that for a 3-taxon tree and κ = 3, EE(ψ^+) is of lower dimension than the probability simplex Δ^26 and that for κ = 2, the Zariski closure of EE(ψ^+) is equal to Δ^7. A more restrictive variant of the model, that is closer to the mechanistic models of <cit.> model, could be defined by requiring that all the `extension' matrices M_i arise as exponentials of the same GTR rate matrix. While this common exponential condition is not expressible purely through algebra, there are other algebraic relaxations of it that one could impose instead, such as that the extension matrices M_i are symmetric and commute. § THE MODEL ON 3-TAXON TREES By Definition <ref>, the model on a 3-leaf rooted tree ψ^+ is the set of κ×κ×κ probability tensors of the form P=P̃ *(M_a^-1,M_b^-1,M_c^-1), for some P̃∈ (ψ^+) and invertible Markov matrices M_a,M_b, and M_c. Because of the matrix actions, this model has a non-linear structure. This makes it more difficult to fully characterize the model in terms of constraints than it was for the affine linear model. It also means that the optimization problem for maximum likelihood may not be a convex one, making direct use of constraints for inference more appealing than attacking the optimization problem inherent to maximum likelihood. While determining all equality constraints satisfied by the model (i.e., generators of the ideal of model invariants) is difficult computationally, here we focus on determining some of them. We will use these in Section <ref> in our proof of tree identifiability under the model. Noting that only a few constraints are utilized in the SVDquartets method, future work should investigate whether the constraints found here are useful for rooted tree inference. Let P be a tensor in the EE model on ψ^+=((a,b),c), and (A) denote the matrix of cofactors of a square matrix A. Then for all k ∈ [κ] the matrices Q^a_·· k=P_+··(P_·+·)^T P_·· k and Q^b_·· k=P_·· k(P_+··)P_·+·^T are symmetric: that is, Q^a_·· k= ( Q^a_·· k) ^T and Q^b_·· k=( Q^b_·· k)^T. If P is in the model, then P=P̃ *(M_a^-1,M_b^-1,M_c^-1), with P̃∈ and M_a,M_b,M_c Markov. Then P_·+·=M_a^-TP̃_·+· M_c^-1 and P_+··=M_b^-TP̃_+·· M_c^-1=M_b^-TP̃_·+·M_c^-1 since P̃∈ implies P̃_·+· = P̃_+··. Then, assuming necessary inverses exist, P_·+·^-TP_+··^T=M_aM_b^-1, Thus P*_a(P_·+·^-TP_+··^T)=P̃*(M_b^-1,M_b^-1,M_c^-1). But it is straightforward to check that every slice with fixed c-index of P̃*(M_b^-1,M_b^-1,M_c^-1) is symmetric, since that is true for P̃. Thus (P_·+·^-TP_+··^T)^T P_·· k=P_+·· P_·+·^-1 P_·· k is symmetric for every k. Using the cofactor formula for the inverse of a matrix, and clearing denominators by multiplying by a determinant yields (<ref>). The assumption of invertibility used in this argument can be justified for a dense set of choices of P̃. Indeed, it is enough to exhibit one such choice, since that indicates the subset leading to non-invertibility is a proper subvariety (defined by certain minors vanishing), and hence of lower dimension. Such a choice is obtained with the Markov matrices being the identity, and P̃ having non-zero diagonal entries, and zero elsewhere. Since the claim is established on a dense set, it holds everywhere by continuity. The claim (<ref>) can be shown either in a similar way, or by conjugating (in the sense of multiplying by a matrix and its transpose) Q^a_·· k by P_· + · P_+··^-1 and removing determinant factors. Since Q^a_·· k and Q^b_·· k are conjugate for any tensor P (even one not in the model), checking that one is symmetric implies the other is as well, provided the appropriate inverse exists. If these are used as necessary conditions for membership in the model, when applied to data it may still be desirable to check that both are approximately symmetric, since it is unclear how conjugation will effect the way we measure the inevitable stochastic error leading to violation of perfect symmetry. The model on ψ^+=((a,b),c) is contained in the algebraic variety defined by the degree κ+1 polynomials given by the entries of the 2κ matrix equations P_+··(P_·+·)^T P_·· k - P_·· k^T (P_·+·) P_+··^T, P_·· k(P_+··) P_·+·^T -P_·+·(P_+··)^T P_·· k^T. The polynomials of this corollary also arise as phylogenetic invariants for the general Markov (GM) model of sequence evolution <cit.> with no coalescent process. In the setting of that work, the tensors of interest are those in the orbits of 3-way diagonal tensors under actions of GL_κ in each index, while here they are the orbits of tensors symmetric in two indices under the same GL_κ actions. Since diagonal tensors display this symmetry, the invariants above must also apply to the GM model. However, the GM model on a 3-taxon tree has additional invariants of this form, for every pair of taxa, not just those in the cherry. Using the computational algebra software Singular <cit.>, we are able to show that for κ = 2, there are no non-trivial polynomials vanishing on the model. Thus, the polynomial invariants implied by Corollary <ref> are identically zero. For κ = 3, we verified computationally that these invariants are not identically zero. As demonstrated by methods such as SVDquartets, reframing model constraints in terms of rank conditions can be useful for developing practical methods of phylogenetic inference. With this in mind, we can reinterpret the results of Corollary <ref> as rank conditions for the model. To do so, we use the following lemma, which follows a construction of G. Ottaviani that was suggested to us by L. Oeding. Let A,B,C,D,E, F be six κ×κ matrices, with B,E invertible, satisfying CB^-1A+DE^-1F=0. Then the 3κ× 3κ matrix [ 0 A B; D 0 C; E F 0 ] has rank 2κ. Observe [ 0 A B; D 0 C; E F 0 ]=[ I 0 0; 0 I D; 0 0 E ][ 0 0 I; 0 -(CB^-1A+DE^-1F) CB^-1; I E^-1F 0 ][ I 0 0; 0 I 0; 0 A B ]. Tensors in the model on ψ^+=((a,b),c) are contained in the algebraic variety defined by the degree 2κ+1 polynomials given by the (2κ+1)× (2κ+1) minors of each of the 2κ matrices [ 0 P_·· k P_·+·; -P_·· k^T 0 P_+··; -P_·+·^T -P_+··^T 0 ] and [ 0 P_· + ·^T P_+··^T; -P_·+ · 0 P_·· k; -P_+·· -P_·· k^T 0 ]. Choosing A,B,C,D,E,F in Lemma <ref> as shown in these matrices makes the equation CB^-1A+DE^-1F=0 express that Q^a_·· k and Q^b_·· k are symmetric, which was shown in Proposition <ref>. The result of Corollary <ref> allows one to formulate necessary conditions for EE model membership on the 3-taxon tree in terms of rank conditions on matrices, much as the SVDquartets method is based on rank conditions on matrices in the 4-taxon case. § TREE IDENTIFIABILITY UNDER THE MODEL The model invariants of the previous section enable us to prove that the rooted tree topology is generically identifiable under the model. We establish these results for κ≥ 4, which includes the cases most relevant for phylogenetic analysis. To establish identifiability, we use the following non-identifiability result. Consider a 2-taxon species tree (a x,b (ℓ-x) ), with 0≤ x≤ℓ with constant population size N above the root and any GTR rate matrix Q with stationary distribution π. Then the probability distribution matrix F of site patterns under the model is symmetric and independent of x. Using time reversibility, the distribution can be expressed as F=∫ _t=0^∞diag(π) M_x M_2t M_ℓ-xμ_N(t) dt where μ_N(t) is the density function for coalescent times, and M_z=exp(Qz). Since the integrand, a GTR distribution, is a symmetric matrix, then so is F. Since the M_z commute, and M_xM_ℓ-x=M_ℓ, F= diag(π) M_ℓ∫ _t=0^∞ M_2tμ_N(t) dt has no dependence on x. The rooted topological tree ψ^+ is identifiable from generic probability distributions in the _κ(ψ^+) model for κ≥ 4. We first suppose κ=4. For the 3-taxon trees ϕ^+=((a,b),c) and ψ^+=((a,c),b), we show that (ψ^+)∩(ϕ^+) has measure zero within (ψ^+). To do this, it is enough to construct one point in (ψ^+) that is not in the Zariski closure of (ϕ^+), since that implies the Zariski closure of the intersection of (ψ^+) and (ϕ^+) is of lower dimension than (ψ^+). Let N be an arbitrary effective population size and let ϕ^+ = ((a 2, c 0) 1,b 1), with distances in coalescent units (number of generations divided by 2N). Let μ = 1/2N and define Q to be the Kimura 2-parameter (K2P) rate matrix [ -4 1 2 1; 1 -4 1 2; 2 1 -4 1; 1 2 1 -4; ] with equilibrium distribution π =(1/4, 1/4, 1/4, 1/4). Finally, let P be the probability tensor that arises from this choice of parameters in the model. Then letting M=exp(2Q), we see that P=P*(I,M,M) lies in (ψ^+), which implies that P∈(ψ^+). To see that P does not belong to the Zariski closure of EE(ϕ^+) by Corollary <ref> it suffices to show that for some k P_+··(P_·+·)^T P_·· k - P_·· k^T (P_·+·) P_+··^T 0. Note that P_+·· and P_·+· are probability distribution matrices for the same model on the 2-leaf species trees (b 1, c 1) and (a 2, c0). But, by Lemma <ref>, P_+·· = P_·+· = P_+··^T = P_·+·^T, so P_+··P_·+·^-T = P_·+·^-1 P_+··^T = I_4. To show (<ref>), it is thus enough to show that some P_..k is not symmetric. This can be verified without appealing to numerical computation: For example, (P_..1)_12 - (P_..1)_21= 110530e^-20- 122230e^-25- 120007e^-29. If this were zero, then multiplying by e^29 would show e is a root of a rational polynomial, contradicting its transcendence. Thus (ψ^+)∩(ϕ^+) has measure zero within (ψ^+). Interchanging taxon names then shows the intersection of any two resolved 3-taxon tree models is of measure zero within them, and thus that a generic distribution in any single 3-taxon model lies only in that 3-taxon model. This establishes the theorem for 3-taxon trees when κ=4. For larger trees ψ^+, each displayed rooted triple determines a measure zero subset of (ψ^+) containing all points where that rooted triple may not be identifiable from marginalizations of P to those 3 taxa. Since there are a finite number of such sets, for a generic P∈ (ψ^+), all displayed rooted triples are identifiable, and hence so is the tree ψ^+. For κ>4, the proof follows by embedding the 4-state rate matrix above in the upper left corner of a κ-state GTR rate matrix and setting the remaining entries to 0. Several comments are in order about the method of proof in Theorem <ref>. First, if the matrix Q is chosen to be a Jukes-Cantor rate-matrix, then one finds that the same construction of P leads to a point on which the invariants for (ϕ^+) vanish. That is, P is not `sufficiently generic' to identify the rooted tree. This is explored more thoroughly in the Appendix. Second, since the argument used an instance of the model with a K2P rate matrix, it also establishes the following, which directly applies to models used for phylogenetic inference. For κ =4, consider any submodel of such that each ψ^+ has an analytic parameterization general enough to contain the Kimura 2-parameter coalescent mixture model with constant population size. Then for generic parameters the rooted topological tree ψ^+ is identifiable. Finally, while our proof of identifiability of a rooted tree under the model fails for the Jukes-Cantor model, unrooted trees are still identifiable under that model. To establish this, note that a probability distribution for a 4-taxon tree on taxa a,b,c,d under the model has the form P=P̃*(M_a,M_b,M_c,M_d), with P̃ in the UE model and the Markov matrices invertible. As a result, its flattenings can be expressed as _ab|cd(P) =(M_a⊗ M_b)^T _ab|cd(P̃) (M_c⊗ M_d), _ac|bd(P) =(M_a⊗ M_c)^T _ac|bd(P̃) (M_b⊗ M_d), _ad|bc(P) =(M_a⊗ M_d)^T _ad|bc(P̃) (M_b⊗ M_c). Since M_a,M_b,M_c, and M_d have full rank, this implies the rank of each flattening of P is equal to the rank of the corresponding flattening of P̃. It is then straightforward to obtain the following analog of Theorem <ref>. The SVDquartets method, using an exact method to construct a tree from a collection of quartets, gives a statistically consistent unrooted species tree topology estimator for generic parameters under the EE model, and under any submodel with an analytic parameterization general enough to contain the CK K2P model. § PSEUDO-EXCHANGEABILITY FOR THE JUKES-CANTOR MODEL The proof of Theorem <ref>, on the generic identifiability of the tree topology under the model, used a particular point in the model arising from the Kimura 2-parameter model. Here, we show that it is not possible to use similar arguments with a point in the Jukes-Cantor model. We do this by specifically considering the Jukes-Cantor model, and showing that the model always has `extra symmetries' that prevent the identification of the rooted triple tree by these invariants. Consider the Jukes-Cantor model on the tree ((aℓ_a,bℓ_b)ℓ_ab, c ℓ_c ). If ℓ_a = ℓ_ab + ℓ_c then the resulting probability tensor P = (p_ijk) exhibits a,c exchangeability, that is, p_ijk = p_kji. Let P = (p_ijk) be a probability tensor from the Jukes-Cantor model on a 3-leaf tree. While P has 64 entries, because the site substitution model is the Jukes-Cantor model, it has at most five distinct entries. Thus, we may group the coordinates of P into five equivalance classes, which we represent by [p_AAA], [p_AAC],[p_ACA],[p_ACC],[p_ACG]. For any representative of the equivalence class [p_AAA], [p_ACA], or [p_ACG], swapping the first and third indices produces another representative of the same equivalence class. However, for representatives of the equivalence class [p_AAC], swapping the first and third indices produces a representative of the equivalence class [p_ACC], and vice versa. Therefore, to prove the proposition, it suffices to show that for P, [p_AAC] and [p_ACC] are equal. To establish this, we prove that p_AAC = p_ACC. Restricting to the leaf set {a,b}, we obtain the 2-leaf rooted tree (aℓ_a,bℓ_b) and the probability of observing state ij from the Jukes-Cantor model on this tree is P_ij+ = p_ijA + p_ijC + p_ijG + p_ijT. Likewise, by restricting to the leaf set {b,c}, we obtain the 2-leaf rooted tree (bℓ_b + ℓ_ab,c ℓ_c) and the probability of observing state jk from the Jukes-Cantor model on this tree is P_+jk = p_Ajk + p_Cjk + p_Gjk + p_Tjk. Note that since ℓ_a = ℓ_ab + ℓ_c, the 2-leaf species trees obtained by restricting to {a,b} and {b,c} differ only by the location of the root. By Lemma <ref>, since the Jukes-Cantor model is a submodel of GTR, the probability distribution matrices for the JC models on these trees are symmetric and equal. Therefore, we have P_ij+ = P_ji+= P_+ji = P_+ij. Specifically, this implies P_AC+ = P_+CA, or p_ACA + p_ACC + p_ACG + p_ACT = p_ACA + p_CCA + p_GCA + p_TCA. Under the JC model, p_ACG, p_ACT, p_GCA, and p_TCA all belong to the equivalence class of coordinates with three distinct indices, which is to say, p_ACG = p_ACT = p_GCA = p_TCA. Thus, by cancellation, the equation above reduces to p_CCA = p_ACC. Since p_CCA and p_AAC are in the same JC equivalence class, this implies p_AAC = p_ACC. The invariants of Corollory <ref> associated to all of the trees ((a,b),c), ((a,c),b) and ((b,c),a) vanish on all probability tensors P arising from the Jukes-Cantor model on any of these trees. First consider P̃ arising from the Jukes-Cantor model on the tree ((aℓ,bℓ)ℓ, c 0 ). By the proposition, this tensor is fully-symmetric, that is, invariant under any permutation of the indices, for any positive value of ℓ. It thus lies in the model for all three trees. Now the probability tensor P from the JC model on ((aℓ_a,bℓ_b)ℓ, c ℓ_c ), where ℓ_a,ℓ_b≥ℓ and ℓ_c≥ 0 can be expressed as P=P̃*(M_a,M_b,M_c), where M_a, M_b, M_c are Jukes-Cantor matrices for edges of length ℓ_a-ℓ, ℓ_b-ℓ, ℓ_c-ℓ, respectively. Thus P lies in the model for all three trees. Therefore the invariants associated to all three trees vanish on it. Moreover, since the entries of probability tensors in the model are parametrized by analytic functions of the edge lengths, composing these function with the invariants gives analytic functions that vanish on a full-dimensional subset of the parameter space, which must therefore be zero on the entire parameter space. Thus the invariants vanish on the model even when the terminal edge lengths do not satisfy the assumed inequalities. alpha
http://arxiv.org/abs/2303.06731v1
20230312192226
A note on the physical process first law of black hole mechanics
[ "Antoine Rignon-Bret" ]
gr-qc
[ "gr-qc" ]
equationsection
http://arxiv.org/abs/2303.07331v1
20230313175143
On the full Kostant-Toda hierarchy and its $\ell$-banded reductions for the Lie algebras of type $A, B$ and $G$
[ "Yuji Kodama", "Yuancheng Xie" ]
nlin.SI
[ "nlin.SI", "math-ph", "math.CO", "math.DS", "math.MP", "math.RT" ]
This paper concerns the solutions of the full Kostant-Toda (f-KT) hierarchy in the Hessenberg form and their reductions to the ℓ-banded Kostant-Toda (ℓ-KT) hierarchy. We also study the f-KT hierarchy and the corresponding ℓ-KT hierarchy on simple Lie algebras of type A, B and G based on root space reductions with proper Chevalley systems. Explicit formulas of the polynomial solutions for the τ-functions are also given in terms of the Schur functions and Schur's Q-functions. Lifted particles from the fast spinning primary of the Near-Earth Asteroid (65803) Didymos Paula G. Benavidez^1,4 March 30, 2023 ========================================================================================== § INTRODUCTION We study reductions and rational solutions of the full Kostant-Toda (f-KT) hierarchy in the Hessenberg form in this paper. In the last fifty years, there have been several publications (c.f. <cit.>) which studied the classical tri-diagonal Toda lattice and the full Kostant-Toda lattice on the semisimple Lie algebra 𝔤=𝔫_-⊕𝔟_+ in the standard notation (c.f. <cit.>). These sytems can be viewed as Toda flows on the minimal and maximal symplectic leaves inside the dual space 𝔟_+^*, respectively (c.f. <cit.>). It is natural to investigate the Toda flows on all the other symplectic leaves, however intermediate Toda lattices which sit between the tri-diagonal Toda lattice and the full Kostant-Toda lattice were rarely mentioned in the literature (c.f. <cit.>). One of the main goals in this paper is to give a clean characterization for the special intermediate Toda lattices possessing the banded structures in the Hessenberg form based on a root space decomposition <cit.>. The geometry of the Hessenberg matrices however naturally leads to a further motivation for the current project which we now explain. Let 𝖷 be a linear map 𝖷: ℂ^M →ℂ^M and h: {1, 2, …, M}→{1, 2, …, M} a non-decreasing function satisfying h(i) ≥ i for 1 ≤ i ≤ M. The Hessenberg variety associated to X and h is defined as Hess(𝖷, h) := {V_∙∈ Fl(ℂ^M) | 𝖷V_i ⊆ V_h(i) for all 1 ≤ i ≤ M}, where Fl(ℂ^M) is the complete flag variety of ℂ^M consisting of sequences V_∙ = (V_1 ⊂ V_2 ⊂⋯⊂ V_M = ℂ^M) of the linear subspaces of ℂ^M with dim V_i = i for 1 ≤ i ≤ M. The following two examples of Hessenberg varieties are especially relevant here. Consider the linear map on ℂ^M associated with the regular nilpotent matrix 𝖭 = [ 0 1 ; 0 1 ; ⋱ ⋱ ; 0 1; 0 ]. For h = (M, M, …, M), Hess(𝖭, h) is the flag variety Fl(ℂ^M) itself, and for h = (2, 3, 4, …, M, M), Hess(𝖭, h) is the so-called Peterson variety. These two varieties are associated with the maximal and minimal Hessenberg functions respectively (c.f. <cit.> and the reference therein for more information on the Hessenberg varieties). Putting the stories of f-KT hierarchy and Hessenberg varieties side by side, it is hard to believe that these beautiful things are not related in a deep and essential way. Indeed, another way to define the Peterson variety is as follows (c.f. <cit.>). Let SL_M(ℂ)^𝖭 be the centralizer of 𝖭 in SL_M(ℂ) where 𝖭 is the nilpotent matrix defined in (<ref>), then Peterson variety is the following M-1 dimensional subvariety of the flag variety SL_M(ℂ)^𝖭·𝔟_-⊂ SL_M(ℂ) ℬ^-, where ℬ^- is the Borel subgroup of lower triangular matrices and 𝔟_-=Lie(ℬ^-). It may be easy to recognize from this definition that Peterson variety consists of exactly those points in the flag variety which parameterize rational solutions of the tri-diagonal Toda hierarchy (c.f. <cit.> and below). This correspondence can actually be used to study geometry of the Peterson variety. As an example we note that in <cit.> (Theorem 2.5) Flaschka and Haine essentially proved in the Toda lattice setting that the Peterson variety intersects with Bruhat cells corresponding to the longest Weyl group elements generated by the reflections with respect to the hyperplanes orthogonal to a subset of simple roots, and this fact was only proved later in the Hessenberg variety setting by Harada and Tymoczko in <cit.> (Proposition 5.8). As we also proved in <cit.> that there is a one-to-one correspondence between rational solutions of the f-KT hierarchy and points in the corresponding flag variety, it is natural to anticipate a more precise correspondence between sub-hierarchies of the f-KT hierarchy and sub-Hessenberg varieties of the flag variety and to use results from one side to gain insights on the other. Such initial attempts had already been made in <cit.>, and our humble goal in this paper is to push the story on the f-KT hierarchy side a little bit by studying solutions of the banded f-KT hierarchy while leaving the investigation of the precise correspondence in a future publication. The f-KT hierarchy can be defined on any semisimple Lie algebra (c.f. <cit.>) and an immediate reason for our restriction to the Hessenberg form Lax matrix (which includes Lie algebras of type A, B, C, G etc.) L = ∑_i=1^M-1E_i,i+1+∑_1≤ j≤ i≤ Ma_i,j()E_i,j is that all the matrix elements a_i, j() can be neatly expressed in terms of τ-functions where = (t_1, t_2, …). Let Δ_N() denote the N-th leading principal minor of the matrix exp(Θ_L()()), Δ_N():=[exp(Θ_L()()))]_N for N=1,2,…,M, where Θ_L()() := ∑_n = 1^∞(L())^nt_n. Then we have the following proposition (Proposition <ref>): The elements a_i,j() for the f-KT hierarchy can be expressed as a_i,j()=p_i-j+1(D̃)Δ_j()∘Δ_i-1()/Δ_j()Δ_i-1() for 1≤ j≤ i≤ M, where D̃ is defined by D̃:=(D_1, 1/2D_2, 1/3D_3,… ) with D_nf∘ g=(∂/∂ t_n-∂/∂ t'_n)f()g(')|_='. In particular, we have a_N,N()=∂/∂ t_1lnΔ_N()/Δ_N-1(), 1 ≤ N ≤ M. For f-KT hierarchy defined on semisimple Lie algebras, the matrix elements can actually all be expressed as polynomials in a_N, N's and their derivatives, and thus in terms of τ-functions (Proposition <ref>), but in general we do not have a clean formula like (<ref>). The formula (<ref>) was derived in <cit.> for the discrete KP hierarchy in terms of the vertex operator formalism and we give an elementary proof in Appendix A for the f-KT hierarchy based on the iso-spectral deformation method <cit.>. The ℓ-banded Kostant-Toda (ℓ-KT) hierarchy is the f-KT hierarchy constrained by the condition that the subdiagonals of the Lax matrix L lower than the ℓ-th diagonal are all zero. This condition is consistent with the Toda flows in the sense that if the initial condition L() is ℓ-banded, then it stays ℓ-banded for all under the Toda flows. Note that for the ℓ-KT hierarchy the elements on the ℓ-th diagonal can be directly integrated (Proposition <ref>): The elements a_i,j in the ℓ-th diagonal of the ℓ-KT hierarchy are given by a_k+ℓ, k()=a_k+ℓ,k^0Δ_k+ℓ()Δ_k-1()/Δ_k+ℓ-1()Δ_k() for 1≤ k≤ M-ℓ, where a_k+ℓ,k^0 is a constant. Comparing (<ref>) with (<ref>), we obtain the first characterization of the ℓ-KT hierarchy in terms of the bilinear relations, p_ℓ+1(D̃)Δ_k∘Δ_k+ℓ-1()=a_k+ℓ,k^0Δ_k+ℓ()Δ_k-1() for 1≤ k≤ M-ℓ. When ℓ=1, we recover the bilinear equation for the original tridiagonal Toda lattice (1-KT lattice), p_2(D̃)Δ_k∘Δ_k=1/2D_1^2Δ_k∘Δ_k=Δ_k∂_1^2Δ_k-(∂_1Δ_k)^2=a_k+1,k^0Δ_k+1Δ_k-1. Our second characterization of the ℓ-KT hierarchy is in terms of the singular structure of their solutions, that is which Bruhat cells the complex solutions might hit. Note that when the Toda flows become singular and hit the boundary of a Schubert cell at time _*, then we have exp(Θ_L(0)(_*))=n_*ẇ_*b_* for some w_*∈S_M, where n_*∈𝒩^-, b_*∈ℬ^+ and ẇ_* ∈ GL_M is a representative of w_* ∈S_M, the symmetric group of order M. Set →+_*, we have the following expansion of τ-functions near _* (Theorem <ref>): The τ-function Δ_N(; w_*) has the Schur expansion, Δ_N(; w_*)=S_λ()+∑_μ⊃λc_μS_μ(), where S_λ(t) is the Schur polynomial associated with the Young diagram λ, which is determined by w_* as follows: Let {i_1,i_2,…,i_N} be defined by {i_1,i_2,…,i_N}={w_*(1),w_*(2),…, w_*(N)}, with i_1<i_2<⋯<i_N. Then the Young diagram λ=(λ_1,λ_2,…,λ_N) is given by λ_k=i_k-k for 1≤ k≤ N. Our second characterization constraints which Bruhat cells solutions of the ℓ-KT hierarchy may hit, equivalently Theorem <ref> in the following shows how the corresponding symplectic leaves for the ℓ-KT hierarchy may be compactified in the flag variety (Proposition <ref>): Let w_* be an element in S_M satisfying the following conditions, (a) w_*(i) w_*(i+k)+1 for any k > ℓ, and (b) for some 1≤ i≤ M-ℓ, there is a relation, w_*(i)=w_*(i+ℓ)+1. Then the corresponding τ-functions give a solution to the ℓ-KT hierarchy, that is, for each m with ℓ+1≤ m≤ M-1, the elements a_i,j in the Lax matrix L satisfy a_m+k,k()=0 for 1≤ k≤ M-m, and a_ℓ+k,k() 0 for some 1≤ k≤ M-ℓ. When ℓ = 1, we recover the classical result of <cit.> in type A of the Lie algebra 𝔤, we mentioned before for the tri-diagonal KT lattice. We then apply the above machinery to f-KT hierarchy defined on simple Lie algebras of type A, B, G, and for that we give explicitly the Chevalley basis and root space decompositions so that we can put the corresponding Lax matrices into the Hessenberg form. We also embed their Weyl groups into the symmetric group 𝔖_M so that the second characterization of the ℓ-KT hierarchy can be applied. When L() is nilpotent, the τ-functions become polynomials of . We construct all polynomial solutions for f-KT hierarchy in type A, B and G. It is worth mentioning that the last τ-function in type B possesses a Pfaffian structure (Theorem <ref>, Proposition <ref>, Proposition <ref>, Proposition <ref>): The τ-function associated with w_* denoted by τ^B_n(_B; w_*) is given by τ^B_n(_B, w_*)=√(Δ_n(_B))=∑_r∈𝔑_Bϕ_r(_B)η_r(ξ; w_*), where 𝔑_B ≅ℤ_2^n is the normal subgroup of the Weyl group 𝔚_B = 𝔖_n ⋉ℤ_2^n in type B. The coefficients (η_r(ξ; w_*))_r ∈𝔑_B form a spinor and the ϕ_r(_B)'s are exponential functions. For rational solutions, the ϕ_r(_B)'s are given by Q-Schur polynomials. As the Lie algebra of G_2-type could be embedded into a Lie algebra of B_3-type, the Pfaffian structure pertains in the τ-functions of G_2. The rest of the paper is organized as follows. In Section <ref> we introduce our main object f-KT hierarchy in the Hessenberg form and their τ-functions. In Section <ref> we give Schur expansion of the τ-function Δ_N(). In Section <ref>, we give the two characterizations for the ℓ-KT hierarchy in the Hessenberg form. In Section <ref> we define f-KT hierarchy and its τ-functions on simple Lie algebras and present some of their basic properties. In Sections <ref>, <ref> and <ref>, we choose proper Chevalley basis to put the f-KT hierarchy in type A, B, G in the Hessenberg form and study their solutions especially the rational solutions and their banded structures. § THE FULL KOSTANT-TODA LATTICE The full Kostant-Toda (f-KT) lattice was first introduced in <cit.>, and it takes the following form, dL/dt=[(L)_≥ 0,L], where the Lax matrix L is the M× M Hessenberg matrix, L =∑_i=1^M-1E_i,i+1+∑_1≤ j≤ i≤ Ma_i,jE_i,j = [ a_1,1 1 0 ⋯ 0; a_2,1 a_2,2 1 ⋯ 0; ⋮ ⋮ ⋱ ⋱ ⋮; a_M-1,1 a_M-1,2 ⋯ ⋯ 1; a_M,1 a_M,2 ⋯ ⋯ a_M,M ], and (L)_≥ 0 denotes the weakly upper triangular part of L. The E_i,j is the standard basis of the set of M× M matrices defined by E_i,j=(δ_i,kδ_j,l)_1≤ k,l≤ M. In terms of the entries a_i,j=a_i,j(t), the f-KT lattice is defined by the system of equations da_ℓ+k,k/dt=a_ℓ+k+1,k-a_ℓ+k,k-1+(a_ℓ+k,ℓ+k-a_k,k)a_ℓ+k,k for k=1,…,M-ℓ and ℓ=0,1,…,M-1. Here we use the convention that a_i,j=0 if j= 0 or i= M+1. Note that the index ℓ represents the ℓ-th subdiagonal of the matrix L, that is, ℓ=0 corresponds to the diagonal elements a_k,k and ℓ=1 corresponds to the elements a_k+1,k of the first subdiagonal, etc. The f-KT hierarchy consists of the symmetries of the f-KT lattice generated by the Chevalley invariants I_k=1/k+1tr(L^k+1) for k=1,…,M-1 (c.f. <cit.>). Each symmetry is given by the equation ∂ L/∂ t_k=[(L^k)_≥0, L], for k=1,2,…, M-1. In this paper, we formally use a set of infinitely many symmetries, whose flow parameter is denoted by 𝐭:=(t_1,t_2,…). We call the set of all symmetries in the form (<ref>) the f-KT lattice hierarchy, or simply f-KT hierarchy. §.§ Matrix factorization and the τ-functions of the f-KT lattice To find the solution L(t) of the f-KT lattice in terms of the initial matrix L(0), it is standard to consider the LU-factorization (Gauss decomposition) of the matrix exp(tL(0)): exp(tL(0))=u(t)b(t) with u(t)∈𝒩^-,  b(t)∈ℬ^+. where 𝒩^- is the set of lower triangular matrices with 1's on the diagonal, and ℬ^+ is the set of invertible upper triangular matrices. Note here that u(0)=b(0)=I, the identity matrix. It is known and easy to show that this factorization exists if and only if the principal leading minors are all nonzero. Under this assumption, we let Δ_N(t) denote the N-th leading principal minor, the determinant of the N× N upper left corner of the matrix exp(tL(0)), Δ_N(t):=[exp(tL(0))]_N for N=1,2,…,M. Let b(t)=h(t)n(t) be the decomposition with h(t) a diagonal matrix and n(t)∈𝒩^+, a unipotent upper triangular matrix. Then writing h(t)=exp(∑_i=1^Mc_i(t)E_i,i), we have Δ_N(t)=exp(∑_i=1^Nc_i(t)), which gives c_N(t)=lnΔ_N(t)/Δ_N-1(t). This formula gives a key to express the solution of the f-KT lattice as explained below. With the factorization (<ref>), we first have the following result (c.f. <cit.> which deals with the original Toda lattice). The solution L(t) of (<ref>) is given by L(t)=u^-1(t)L(0)u(t)=b(t)L(0)b(t)^-1. Taking the derivative of (<ref>), we have d/dtexp(tL(0))=L(0)ub=ubL(0)=u̇b+uḃ, where ẋ means the derivative of x(t). This equation can also be written as u^-1L(0)u=bL(0)b^-1=u^-1u̇+ḃb^-1. We denote this as L̃, and show L̃=L. Using 𝔤=𝔫_-⊕𝔟_+, we decompose L̃ as u^-1u̇=(L̃)_<0 and ḃb^-1=(L̃)_≥ 0. To show L̃=L, we first show that L̃ also satisfies the f-KT lattice. Differentiating L̃=bL(0)b^-1, we have dL̃/dt=ḃb^-1L̃-L̃ḃb^-1=[ḃb^-1,L̃] = [(L̃)_≥0,L̃]. Here we have used d/dtb^-1=-b^-1ḃb^-1. Since L̃(0)=L(0), i.e. the initial data are the same, the uniqueness theorem of the differential equation implies that L̃(t)=L(t). This completes the proof. We also have an explicit formula for the diagonal elements of L(t). The diagonal elements of the matrix L=L(t) can be expressed by a_N,N(t)=d/dtlnΔ_N(t)/Δ_N-1(t), 1 ≤ N ≤ M, where Δ_N(t)=[exp(tL(0))]_N is defined in (<ref>). First recall from the proof of Proposition <ref> that ḃb^-1=(L)_≥ 0, i.e. (L)_≥ 0=∑_i=1^Ma_i,iE_i,i+∑_i=1^M-1E_i,i+1. The decomposition b(t)=h(t)n(t) and h(t)=exp(∑_i=1c_i(t)E_i,i) gives ḃb^-1=ḣh^-1+hṅn^-1h^-1, where ḣh^-1=∑_i=1^Mċ_iE_i,i. This completes the proof. For the hierarchy, we consider the notation with multi-time variables 𝐭=(t_1,t_2,…) Θ_A(𝐭):=∑_n=1^∞ A^n t_n for a matrix  A. Then Proposition <ref> can be easily extended to the f-KT hierarchy. Consider the LU-factorization exp(Θ_L^0(𝐭))= u(𝐭)b(𝐭) with u(𝐭)∈𝒩^-,  b(𝐭)∈ℬ^+. The solution L(𝐭) of the f-KT hierarchy is then given by L(𝐭)=u(𝐭)^-1 L^0u(𝐭)= b(𝐭)L^0b(𝐭)^-1, where L^0=L(0), the initial matrix of L(𝐭). This leads to the following definition of the minors Δ_N, 1 ≤ N ≤ M for the f-KT hierarchy, Δ_N(𝐭)=[exp(Θ_L^(𝐭))]_N with 𝐭=(t_1,t_2,…). As before, the LU-factorization (<ref>) exists if and only if each Δ_k(𝐭) is nonzero. In this paper, we study the cases where some of the minors Δ_N() vanishes, and the set of zeros _* with Δ_N(_*)=0 is referred to as the Painlevé divisor in <cit.>. If one identifies t_1=x, t_2=y and t_3=t, the determinant Δ_N() in (<ref>) gives so-called τ-function for the KP equation, which plays a key role in classifying solutions (c.f. <cit.> and below). There the Δ_N is associated with a point of the Grassmannian Gr(N,M), and the set (Δ_1,…,Δ_M-1) is associated with a point of the flag variety of GL_M. The solution space of the f-KT hierarchy is naturally given by the complete flag variety of type-A in this case (c.f. <cit.> and below). §.§ The Schur functions and the τ-functions One of the main objectives in this paper is to discuss the Schur function expansion of the minors Δ_N(). The Schur functions are generated by the functions p_n(), sometimes called the elementary Schur polynomials. These p_n() are defined by exp(∑_i=1^∞ k^it_i)=∑_n=0^∞ p_n()k^n, which gives p_n()=∑_i_1+2i_2+⋯+ni_n=nt_1^i_1t_2^i_2⋯ t_n^i_n/i_1! i_2! ⋯ i_n!. The functions p_n() satisfy ∂_kp_n()=∂_1^kp_n()=p_n-k(), where ∂_i^j=∂^j/∂ t_i^j, and we also have p_i()=0 if i<0. Let λ be a Young diagram with λ=(λ_1,λ_2,…,λ_N) where λ_1≥λ_2≥⋯≥λ_N≥ 0. The Schur function associated with the Young diagram λ=(λ_1,λ_2,…,λ_N) is define by S_λ()=det(p_λ_i-i+j())_1≤ i,j≤ N. Note that the S_λ() can be written in the Wronskian form with respect to t_1, S_λ()=Wr(p_λ_N,p_λ_N-1+1,…,p_λ_1+N-1)=det(p_λ_N-j+1-i+j())_1≤ i,j≤ N. The minors Δ_N() in (<ref>) can also be expressed in the Wronskian form. First recall that there exists a unique n_0∈𝒩^- such that L^0=n_0^-1C_K n_0, where C_K is the companion matrix associated with L^0, i.e. C_K=[ 0 1 0 ⋯ 0; 0 0 1 ⋯ 0; ⋮ ⋮ ⋱ ⋱ ⋮; 0 0 ⋯ 0 1; (-1)^M σ_M (-1)^M-1σ_M-1 ⋯ σ_2 -σ_1 ], where the σ_i's are defined by det(κ I-L^0)=∑_i=0^M(-1)^iσ_iκ^n-i=∏_i=1^M(κ-κ_i), that is, σ_i is the elementary symmetric polynomial of degree i of {κ_1,…,κ_M}. We also have C_K=VK V^-1 when K=diag(κ_1,…,κ_M) is invertible, where V is the Vandermonde matrix V=(κ_j^i-1)_1≤ i,j≤ M. Then we write Δ_N() in the determinant form, Δ_N() =⟨ e_1∧⋯∧ e_N, n_0^-1e^Θ_C_K()n_0· e_1∧⋯∧ e_N⟩=det(⟨ e_i, e^Θ_C_K() n_0· e_j⟩)_1≤ i,j≤ M. Then setting, f_j():=⟨ e_1, e^Θ_C_K()n_0· e_j⟩ =⟨ e_1, Ve^Θ_K()V^-1n_0· e_j⟩ for j=1,…, N, we have ⟨ e_i, Ve^Θ_K()V^-1n_0· e_j⟩=∂_1^i-1f_j() for i=1,…,N. Thus, each Δ_N() can be expressed in the Wronskian form, Δ_N()=Wr(f_1,f_2,…,f_N). One should also note that each f_j() satisfies the heat hierarchy, ∂_n f_j()=∂_1^n f_j() n=1,2,…. The formula (<ref>) is the τ-function of the KP hierarchy (c.f. <cit.>). Also as shown below, the minors Δ_N() for 1≤ N≤ M-1 give the τ-functions of the f-KT hierarchy of type A. Let {l_0,l_1,…, l_N-1} be a set of integers with 0≤ l_0<l_1<⋯<l_N-1. Then we define [l_0,l_1,…,l_N-1]:=|[ f_1^(l_0) f_1^(l_1) ⋯ f_1^(l_N-1); f_2^(l_0) f_2^(l_1) ⋯ f_2^(l_N-1); ⋮ ⋮ ⋱ ⋮; f_N^(l_0) f_N^(l_1) ⋯ f_N^(l_N-1) ]|, where f_j^(l)=∂_1^lf_j. Note that the determinant Δ_N() in (<ref>) is then given by Δ_N()=[0,1,2,…,N-1]. We define the Young diagram λ associated with the set {l_0,l_1,…,l_N-1} as follows: The southeast boundary of the Young diagram gives a path labeled by consecutively increasing integers from 0, so that the indices {l_0,l_1,…,l_N-1} appear on the vertical edges in the boundary path as shown below. (160,60) (5,55)(1,0)160 (5,45)(1,0)110 (5,35)(1,0)90 (5,25)(1,0)90 (5,15)(1,0)70 (5,5)(1,0)70 (5,5)(0,1)50 (31,5)(0,1)50 (18,5)(0,1)50 (75,5)(0,1)10 (62,5)(0,1)10 (95,25)(0,1)10 (82,25)(0,1)10 (115,45)(0,1)10 (102,45)(0,1)10 (-11,29)n (98,29)l_n (-20,49)N-1 (-10,37)⋮ (-10,17)⋮ (65,37)⋮ (10,37)⋮ (24,37)⋮ (60,48)⋯ (55,28)⋯ (47,17)⋮ (10,17)⋮ (24,17)⋮ (-10,8)0 (45,8)⋯ (78,8)l_0 (118,48)l_N-1 ⋯ ⋯ ∞ (10,-3)0 1 ⋯ (60,-3)l_0-1 The Young diagram λ=(λ_1,λ_2,…,λ_N) is expressed by λ_k=l_N-k-(N-k) for 1≤ k≤ N. Let Δ_λ() denote the determinant (<ref>). Then the Δ_N() in (<ref>) is denoted by Δ_N()=Δ_∅(), since (l_0,l_1,…,l_N-1)=(1,2,…,N). We then have the following useful formula (c.f. <cit.>), S_λ(∂̃)Δ_∅()=Δ_λ(), where ∂̃ is defined by ∂̃=(∂_1, 1/2∂_2, 1/3∂_3, …). In particular, if we choose Δ_∅()=S_λ() as in (<ref>), we have S_μ(∂̃) S_λ() =det(p_λ_N-i+1-μ_N-j+1+i-j)_1≤ i,j≤ N =det(p_λ_i-μ_j-i+j)_1≤ i,j≤ N=: S_λ/μ(), which is the skew Schur polynomial. Note here that S_λ/μ0 iff μ⊆λ, and in particular, S_λ/μ=1 when λ=μ. This then defines the orthogonality, S_μ(∂̃)S_λ()|_==δ_λ,μ. We then have the Schur function expansion of Δ_N() in the form (c.f. <cit.>), Δ_∅ (+𝐬)=∑_λΔ_λ(𝐬)S_λ(), where the sum is over all possible Young diagrams. Note here that the coefficients Δ_λ(𝐬) are all determinants and satisfy all the Plücker relations (this is an important result of the Sato theory of the KP hierarchy, c.f. <cit.>). In this paper, we are interested in the points _* so that for some λ_0, Δ_μ(_*)=0 for μ<λ_0. hence, the Δ_∅() has the expansion, Δ_∅(+_*)=S_λ_0()+∑_λ_0<λΔ_λ(_*)S_λ(). Here we have normalized Δ_λ_0(_*)=1. § THE SCHUR EXPANSION OF Δ_N() If a leading principal minor of the matrix exp(Θ_L^0()) vanishes at a fixed multi-time =_*, then the LU-factorization of exp(Θ_L^0(𝐭_*)) fails, i.e. exp(Θ_L^0(𝐭_*))∈𝒩^-ẇℬ^+ for some w ∈_M, the symmetric group of order M, such that w ≠ e and ẇ denotes a representative of w in SL_M. This means that the f-KT flow becomes singular and hits the boundary of a Schubert cell marked by w∈_M (c.f. <cit.>). The set of times _* is called the Painlevé divisor. Now we express the τ-functions near the Painlevé divisors. Set →+_*, where Δ_N(_*)=0 for some 1≤ N≤ M-1. Then we have exp(Θ_L^0(_*))=n_*ẇ_*b_* for some w_*∈S_M, where n_*∈𝒩^- and b_*∈ℬ^+. In particular, the unipotent matrix n_* for each w_* will be constructed explicitly below. Then, using L^0=n_0^-1VKV^-1n_0 (see (<ref>)), we have Δ_N()=d_N⟨ e_1∧⋯∧ e_N, Ve^Θ_K()V^-1n_0n_*ẇ_* · e_1∧⋯∧ e_N⟩, where the constant d_N is given by b_* · e_1∧⋯∧ e_N= d_N e_1∧⋯∧ e_N, but note that the solution of the hierarchy does not depend on d_N. Now expanding Ve^Θ_K(), we have Ve^Θ_K()= [ 1 p_1 p_2 ⋯ ⋯ ⋯ ⋯; 0 1 p_1 p_2 ⋯ ⋯ ⋯; ⋮ ⋱ ⋱ ⋱ ⋱ ⋱ ⋮; 0 ⋯ 0 1 p_1 p_2 ⋯ ] V_∞=: 𝒫()V_∞, where V_∞ is the ∞× M Vandelmonde matrix V_∞=(λ_j^i-1) for 1≤ i and 1≤ j≤ M. We also note that (V_∞ V^-1)^T=[ 1 0 … 0 (-1)^M-1 c_(0|M-1) (-1)^M-1c_(1|M-1) (-1)^M-1c_(2|M-1) ⋯; 0 1 ⋯ 0 (-1)^M-2c_(0|M-2) (-1)^M-2c_(1|M-2) (-1)^M-2c_(2|M-2) ⋯; ⋮ ⋮ ⋱ ⋮ ⋮ ⋮ ⋮ ⋮; 0 0 ⋯ 1 c_(0|0) c_(1|0) c_(2|0) ⋯ ], where c_(a|b)=c_(a|b)(λ) is the Schur polynomial of λ=(λ_1,…,λ_n) associated with the hook Young diagram λ of (a|b) type, i.e. λ=(1+a,1,…,1_b), e.g. (3|2) is [4,1,1][5], λ=(4,1,1). This is nothing but the Giambelli formula. For each w_* ∈S_M, we note ẇ_*· e_1∧ e_2∧⋯∧ e_N= e_w_*(1)∧ e_w_*(2)∧⋯∧ e_w_*(N). Then each ∞-vector v_w_*(j):=V_∞ V^-1n_0n_*ẇ_* e_j has the following structure v_w_*(j)=(0,…,0,1,*,*,⋯)^T, where the first nonzero term with 1 is located at w_*(j). We then have the following formula of the minor Δ_N(), Δ_N(; w_*)= ⟨ e_1∧⋯∧ e_N, 𝒫()· v_w_*(1)∧⋯∧ v_w_*(N)⟩. Now we have the following theorem. The τ-function in (<ref>) has the Schur expansion, Δ_N(; w_*)=S_λ()+∑_μ⊃λc_μS_μ(), where S_λ(t) is the Schur polynomial associated with the Young diagram λ, which is determined by w_* as follows: Let {i_1,i_2,…,i_N} be defined by {i_1,i_2,…,i_N}={w_*(1),w_*(2),…, w_*(N)}, with i_1<i_2<⋯<i_N. Then the Young diagram λ=(λ_1,λ_2,…,λ_N) is given by λ_k=i_k-k for 1≤ k≤ N. Apply the Cauchy-Binet lemma to expand τ_N(). The number of free parameters in the τ-function is given by the dimension of the corresponding Schubert cell, which is defined by dim(𝒩^-ẇ_*ℬ^+/ℬ^+)=ℓ( w_0)-ℓ(w_*), where w_0 is the longest element of S_M. Here the spectrum (eigenvalues) are fixed. In particular, if we fix all the eigenvalues to be zero, i.e. in the nilpotent limit, we have the polynomial solutions, Δ_N(; w_*)=⟨ e_1,∧⋯∧ e_N, 𝒫_M() n_*ẇ_* · e_1∧⋯∧ e_N⟩, where 𝒫_M() is the M× M matrix associated with a regular nilpotent matrix L^0=𝖭 in (<ref>), 𝒫_M()=e^Θ_𝖭()=∑_k=0^M-1p_k()𝖭^k with 𝖭=∑_i=1^M-1E_i,i+1. We note the following property of the Schur expansion of Δ_N(;w_*). Let [N] be the set of numbers given by {1,2,…, N}. Then we have the following lemma. If w_*[N]=[N], then Δ_N(0; w_*)=±1. The minor Δ_N() is given by Δ_N(; w_*) =⟨ e_1∧⋯∧ e_N, 𝒫()· v_w_*(1)∧⋯∧ v_w_*(N)⟩ =±⟨ e_1∧⋯∧ e_N, 𝒫()· v_1∧⋯∧ v_N⟩=± 1+h.o.t., where we recall v_j=(0,⋯,0,j1,*⋯)^T. Notice that this lemma can be restated as Δ_N(0; w_*) 0 if and only if w_*[N] [N]. From this lemma, the following is obvious. If w_0 is the longest element in S_M, then Δ_N( 0; w_0)=0 for all N=1,…, M-1. § THE ℓ-KT HIERARCHY For an explicit expression of the elements a_i,j, we have the following proposition, which can be found in <cit.> (see also Appendix A). The elements a_i,j() for the f-KT hierarchy can be expressed as a_i,j()=p_i-j+1(D̃)Δ_j()∘Δ_i-1()/Δ_j()Δ_i-1() for 1≤ j≤ i≤ M, where D̃ is defined by D̃:=(D_1, 1/2D_2, 1/3D_3,… ) with D_nf∘ g=(∂/∂ t_n-∂/∂ t'_n)f()g(')|_='. We consider the special case of L, which has the following banded structure: For each ℓ+1≤ m≤ M-1, the elements in the lower triangular part satisfy a_k+m,k()=0 for 1≤ k≤ M-m. That is, the subdiagonals lower than the ℓ-th diagonal are all zero. We call the f-KT hierarchy with this banded Lax matrix the ℓ-KT hierarchy (see below for the details). Note that the 1-banded KT hierarchy is the original tridiagonal Kostant-Toda (KT) lattice hierarchy, and the (M-1)-banded KT hierarchy is the f-KT hierarchy. Then we have the following proposition: The elements a_i,j in the ℓ-th diagonal of the ℓ-KT hierarchy are given by a_k+ℓ, k()=a_k+ℓ,k^0Δ_k+ℓ()Δ_k-1()/Δ_k+ℓ-1()Δ_k() for 1≤ k≤ M-ℓ, where a_k+ℓ,k^0 is a constant. Since a_ℓ+k+1,k=a_ℓ+k,k-1=0 for all 1≤ k≤ M-ℓ, the equations (<ref>) become da_k+ℓ,k/dt=(a_k+ℓ,k+ℓ-a_k,k)a_k+ℓ,k. Using the expression (<ref>) for a_i,i, we can integrate the equations and obtain the formula in the proposition. Note here that the constants a_k+ℓ,k^0 can be normalized as 1, if it is not zero. Using Proposition <ref>, we have the bilinear equation for the ℓ-KT hierarchy, p_ℓ+1(D̃)Δ_k∘Δ_k+ℓ-1()=a_k+ℓ,k^0Δ_k+ℓ()Δ_k-1() for 1≤ k≤ M-ℓ. When ℓ=1, we see the bilinear equation of the original tridiagonal Toda lattice, p_2(D̃)Δ_k∘Δ_k=1/2D_1^2Δ_k∘Δ_k=Δ_k∂_1^2Δ_k-(∂_1Δ_k)^2=a_k+1,k^0Δ_k+1Δ_k-1. §.§ The τ-functions of the ℓ-KT hierarchy We start with the following proposition on some properties of the ℓ-th diagonal elements in the Lax matrix. Let w_* be an element in S_M satisfying the following conditions, (a) w_*(i) w_*(M-j+1)+1 for any 2≤ i+j≤ M-ℓ, and (b) for some 1≤ i≤ M-ℓ, there is a relation, w_*(i)=w_*(i+ℓ)+1. Then the corresponding τ-functions Δ_N(; w_*), 1 ≤ N ≤ M-1 give a solution to the ℓ-KT hierarchy, that is, for each m with ℓ+1≤ m≤ M-1, the elements a_i,j in the Lax matrix L satisfy a_m+k,k()=0 for 1≤ k≤ M-m, and a_ℓ+k,k() 0 for some 1≤ k≤ M-ℓ. We first note that a_M,1() satisfies ∂ a_M,1/∂ t_1=(a_M,M-a_1,1) a_M,1, which gives a_M,1()=a_M,1^0Δ_MΔ_0/Δ_M-1()Δ_1(), where Δ_0=1 and Δ_M is a constant. From (<ref>), we have p_M(D̃)Δ_1∘Δ_M-1=a_M,1^0Δ_MΔ_0=constant. The Δ_1 and Δ_M-1 are given by Δ_1() =⟨ e_1, 𝒫()· v_w_*(1)⟩=S_μ_1()+h.o.t, Δ_M-1() =⟨ e_1∧⋯∧ e_M-1, 𝒫()· v_ w*(1)∧⋯∧ v_w_*(M-1)⟩=S_μ_M-1()+h.o.t., where the Young diagram μ_1 and μ_M-1 are given by S_μ_1() =p_|μ_1|() with |μ_1|=w_*(1)-1, S_μ_M-1() =(-1)^|μ_M-1|p_|μ_M-1|(-) with |μ_M-1|=M-w_*(M), that is, μ_1 consists of |μ_1| horizontal boxes, and μ_M-1 consists of |μ_M-1| vertical boxes. The degree of the left hand side of (<ref>) is given by deg(Δ_1)+deg(Δ_M-1)-M=(w_*(1)-1)+(M-w_*(M))-M=w_*(1)-w_*(M)-1. Since the right hand side of (<ref>) has degree zero, if w_*(1) w_*(M)+1, then a_M,1^0 must be zero. This confirms the case (a) with i=j=1 and ℓ=M-2. Suppose that a_M-a+k,k=0 for all 1≤ a≤ m-1 and 1≤ k≤ a. Then we have p_M-m+1(D̃)Δ_k∘Δ_M-(m-k)-1=a_M-m+k,k^0Δ_k-1Δ_M-(m-k). The order of the left hand side of (<ref>) is then given by (k_1+⋯+k_k-k(k+1)/2)+(M(m+1-k)-(l_1+⋯+l_m+1-k)-(m-k)(m-k+1)/2)-(M-m+1), where we denote w_*(i)=k_i and w_*(M-j+1)=l_j. The order of the right hand side of (<ref>) is (k_1+…+k_k-1-k(k-1)/2)+(M(m-k)-(l_1+⋯+l_m-k)-(m-k)(m-k-1)/2). The condition that these orders are different is given by k_k l_m+1-k+1, which is w_*(k) w_*(M-m+k)+1. So if this is true, then we have a_M-m+k,k^0=0. That is, a_M-m+k,k()=0. Continuing this argument up to m=M-ℓ-1 gives the proof. The two conditions on w_* in Proposition <ref> have the following more symmetric form (a) w_*(i) w_*(i+k)+1 for any k > ℓ, and (b) for some 1≤ i≤ M-ℓ, there is a relation, w_*(i)=w_*(i+ℓ)+1. Condition (a) means that no elements on the k-th off-diagonal is allowed to be nontrivial for k > ℓ and condition (b) means some elements on the ℓ-th off-diagonal are non-trivial. These two conditions can be used independently. For example if the definition of ℓ-KT hierarchy is inclusive, that is ℓ - 1-banded KT hierarchy is thought to be a sub of the ℓ-KT hierarchy, then only condition (a) is needed to be satisfied for all such w_*. Let w_*=w_0 be the longest element in S_M. Then the corresponding τ-functions give a solution to the classical tridiagonal KT hierarchy. It is obvious that w_0 satisfies the conditions in Proposition <ref> for ℓ = 1. § THE F-KT HIERARCHY ON SIMPLE LIE ALGEBRAS The definition of f-KT lattice (hierarchy) in Section <ref> in the Hessenberg form can be extended to a system defined on some simple Lie algebras. Let be a connected simply connected complex semisimple Lie group with Lie algebra Lie() = 𝔤. Let {H_i, X_i, Y_i} be the Chevalley basis of the Lie algebra g of rank n, which satisfy [H_i, H_j]=0, [H_i, X_j]=C_j,iX_j, [H_i, Y_j]=-C_j,iY_j, [X_i,Y_j]=δ_i,jH_i, where C_i,j is the Cartan matrix of g. Let Σ^+ denote a set of positive roots, and let Π={α_1,…,α_n} be the set of simple roots. Note that X_i=X_α_i and Y_i=Y_α_i=X_-α_i and C_i,j=α_i(H_j). The negative root vectors Y_α are generated by [Y_α, Y_β]=N_-α,-βY_α+β, if α+β∈Σ^+, where N_-α,-β are constants. The Lie algebra g admits the decomposition, g=n_-⊕h⊕n_+=n_-⊕b_+, where h is a Cartan subalgebra, n_± are nilpotent subalgebras defined by n_±=⊕_α∈Σ^+ℂX_±α, and b_+ = n_+⊕h is the Borel subalgebra. We also fix a split Cartan subgroup ℋ with Lie(ℋ) = 𝔥 and a Borel subgroup ℬ with Lie(ℬ) = b_+ with ℬ = ℋ𝒩 where 𝒩 is a Lie group having the Lie algebra 𝔫_+. We also denote Lie groups ℬ^- and 𝒩^- with Lie(ℬ^-) = 𝔟_- and Lie(𝒩^-) = 𝔫_-. Then the full Kostant-Toda (f-KT) hierarchy on the Lie algebra 𝔤 is defined as follows. Let L_g be the element defined by L_g =∑_i=1^n a_i()H_i+∑_i=1^nX_i+∑_α∈Σ^+b_α()Y_α, =∑_i=1^n (a_i()H_i+X_i+b_i()Y_i)+∑_α∈Σ^+∖Πb_α()Y_α, which is called the Lax matrix. Here a_i() and b_α() are functions of the multi-time variables =(t_m_k:k=1,2,…,n) where m_k is defined below. For each time variable, we have the generalized Toda hierarchy defined by ∂ L_g/∂ t_m_k=[P_k, L_g], with P_k=Π_b_+∇ I_k+1, where ∇ is the gradient with respect to the Killing form, i.e. for any x∈g, dI_k(x)=K(∇ I_k,x), and Π_𝔟_+ represents the 𝔟_+-projection. Here the functions I_k=I_k(L_g) are the Chevalley invariants which, for example in type A are defined by I_k+1(L_g)=1/k+1tr(L_g^k+1), which gives ∇ I_k+1=L_g^k. In the case of the Lie algebra 𝔤 of type D, the recent paper <cit.> shows that one of the Chevalley invariants is given by a Pfaffian of the ring of polynomials [𝔤]. Note here that I_k is a weighted homogeneous polynomial of (a_i,b_α) of weight k, where the weights are defined as wt(a_i)=1, wt(b_α)=ht(α)+1. Here ht(α) represents the height of α, which is defined by ∑_i=1^nc_i for α=∑_i=1^nc_iα_i. The index m_k of the time variable in (<ref>) is then defined by m_k=wt(I_k+1)-1. For example, in the case of k=1, the f-KT lattice gives the following set of differential equations for the variables {(a_i,b_α):1≤ i≤ n, α∈Σ^+}, ∂ a_i/∂ t_1=b_i (1≤ i≤ n), ∂ b_α/∂ t_1=-∑_i=1^n (α(H_i)a_i) b_α+∑_i=1^nN_α_i,-α-α_ib_α+α_i, where b_i=b_α_i, [H_i,Y_α]=-α(H_i)Y_α and [X_α_i, Y_α+α_i]=N_α_i, -α-α_iY_α for α+α_i∈Σ^+. Notice that wt(∂/∂ t_1)=1, and the f-KT lattice consists of the weighted homogeneous equations. Then one can see that the solutions b_α() of weight ht(α)+1 are determined by the functions a_i() of weight 1. The Kostant-Toda lattice hierarchy is then a special case with all b_α()=0 for α∈Σ^+∖Π, that is, the Lax matrix L_𝔤 is a Jacobi element of 𝔤. The hierarchy of this type is also referred to as the tri-diagonal KT hierarchy. In this case, Flaschka and Heine in <cit.> introduced the so-called τ-functions which express the variables a_i() by a_i()=∂/∂ t_1lnτ_i(), (1≤ i≤ n), (see also <cit.>). Then b_i() are expressed by b_i()=∂/∂ t_1a_i()=b_i^0∏_j=1^n(τ_j())^-C_i,j, where C_i,j is the Cartan matrix and b_i^0 are constants. In general, the τ-function is defined as follows (c.f. <cit.>). Let V(λ) be the irreducible highest weight representation of the group 𝒢 with highest weight λ and the highest weight vector v_λ. Then there exists a unique bilinear form ⟨·,·⟩: V(λ)× V(λ)→ with the normalization ⟨ v_λ,v_λ⟩_λ=1, and a matrix coefficient c_λ(g) for the 𝒢-orbit of the highest weight vector g· v_λ for g∈𝒢 is given by c_λ(g)=⟨ v_λ, g· v_λ⟩_λ. Then the τ-functions are defined as the matrix coefficient for g()=exp(Θ_L^0()) with the fundamental weight ϖ_i (c.f. <cit.>), τ_i():=c_ϖ_i()=⟨ v_ϖ_i,g()· v_ϖ_i⟩_ϖ_i. The following lemma for the matrix coefficient is useful (the proof can be found in <cit.>). (1) If { u_1, …, u_r } is an orthonormal basis of V(λ), then we have for v, w ∈ V(λ), ⟨ v, gh · w ⟩_λ = ∑_i=1^r ⟨ v, g · u_i ⟩_λ⟨ u_i, h · w ⟩_λ. (2) If g ∈ GL_n+1 is written as g = n^- h n^+ with n^- ∈𝒩^-, h ∈ and n^+ ∈𝒩^+, then we have c_λ(n^- h n^+) = χ^λ(h), where χ^λ: →^× is the character corresponding to λ. (3) For dominant weights λ and μ, we have c_λ(g) · c_μ(g) = c_λ+μ(g) (g ∈ GL). We now show that the solutions of the f-KT hierarchy (<ref>) are described in terms of the τ-functions given by (<ref>). We also give a remark on the banded f-KT hierarchy. First we note that the coefficients b_α of a solution to (<ref>) are uniquely determined by a_1, …, a_n. If L = L() is a solution of the form (<ref>) to the full Kostant–Toda hierarchy (<ref>), then b_α's (α∈Σ^+) are expressed as polynomials in a_i's and their derivatives. In particular, we have b_α_i = ∂ a_i/∂ t_1 (1 ≤ i ≤ n). Recall that the height ht(α) of a root α = ∑_i=1^n c_i α_i ∈Σ is defined by ht(α) = ∑_i=1^n c_i. For a nonzero integer k, let _k be the span of root vectors X_α with (α) = k. And we put _0 =. Then we have = ⊕_k ∈_k, [_k, _l] ⊂_k+l. If we put L_1 = ∑_i=1^n X_α_i, L_0 = ∑_i=1^n a_i(t) H_i, L_-k = ∑_(α) = k b_α(t) X_-α (k > 0), then we have L = L_1 + L_0 + L_-1 + L_-2 + ⋯, L^≥ 0 = L_1 + L_0, L_k ∈_k. By comparing the graded components of (<ref>) with m_k=1, we obtain ∂ L_0 /∂ t_1 = [L_1, L_-1], ∂ L_-k/∂ t_1 = [L_1,L_-k+1] + [L_0, L_-k] (k>0). Since [L_1, L_-1] = ∑_i=1^n b_α_i H_i, we obtain (<ref>) from (<ref>) by comparing the coefficients of H_i. We prove by induction on (β) that b_β can be uniquely expressed as a linear combination of a_i b_α and ∂ b_α/∂ t_1 with 1 ≤ i ≤ n and (α) = (β)-1. Suppose k>0. Equating the coefficients of X_-α with (α) = k in (<ref>), we obtain ∂ b_α/∂ t_1 = - (∑_i=1^nα(H_i) a_i) b_α + ∑_(β)=k+1 N_β-α,-β b_β ((α) = k), where N_β-α,-β = 0 unless β-α is a simple root. We regard (<ref>) as a system of linear equations in the unknown variables b_β ((β)=k+1) and consider the coefficient matrix M = ( N_β-α,-β)_(α) = k, (β)=k+1. On the other hand, it can be shown that M is the representation matrix of the linear map L_1 : _-(k+1)→_-k. Since L_1 = ∑_i=1^n X_α_i, we can find a principal _2-triple { h, e, f } with e = L_1 such that [h,e] = 2e, [h,f] = -2f and [e,f] = h, and we have _k = { X ∈ : [h,X] = 2k X } (see <cit.>). By appealing to the representation theory of _2, we see that L_1 : _-(k+1)→_-k is injective. Hence the matrix M has a full rank and the system (<ref>) of linear equations has a unique solution in (b_β)_(β) = k+1. We then define the l-KT hierarchy on 𝔤 by imposing the following constraints (or reduction, see <cit.>), b_α = 0 with (α) ≥ℓ+1. Thus, the ℓ-KT hierarchy is a reduction of the f-KT hiersrchy based on the root space decomposition with particular height, which we refer to as a root space reduction. §.§ Coordinates for the flag varieties The τ-functions near the Painlevé divisors can be expressed as follows. Assume that the matrix g() at a Painlevé divisor =_* has the Bruhat decomposition, g(_*) = n_*ẇ_*b_* for some w_* ∈𝔚, where 𝔚 is the Weyl group of 𝒢. Let {u_1, …, u_r} be an orthonormal basis of V(ϖ_i), and set → + _*, then by (<ref>) we have τ_i() = ⟨ v_ϖ_i,g() n_*ẇ_*b_*· v_ϖ_i⟩_ϖ_i = ∑_i = 1^r ⟨ v_ϖ_i, g() · u_i⟩_ϖ_i⟨ u_i, n_*ẇ_*b_* · v_ϖ_i⟩_ϖ_i = d_i ∑_i = 1^r ⟨ v_ϖ_i, g() · u_i⟩_ϖ_i⟨ u_i, n_*ẇ_* · v_ϖ_i⟩_ϖ_i, where d_i defined by b_* · v_ϖ_i = d_iv_ϖ is an overall non-essential constant which we set it to be 1 in the following. Note that ⟨ u_i, n_*ẇ_* · v_ϖ_i⟩_ϖ_i is certain matrix coefficient of a point in the flag variety 𝒢ℬ, and we recall some useful construction of coordinates on the flag varieties in the following. The datum {ℋ, ℬ, ℬ^-, X_i, Y_i (1≤ i≤ n)} is called a pinning in <cit.>. It is known that pinning is unique up to conjugation under 𝒢. For α_i ∈Π, let x_i: ℂ→𝒢 and y_i: ℂ→𝒢 be the one-parameter subgroups given by x_i(ξ) = exp (ξ X_i), y_i(ξ) = exp(ξ Y_i), ξ∈ℂ. For α_i ∈Π, a choice of representative of s_i ∈𝒲 in 𝒢 can be taken as ṡ_i = x_i(-1)y_i(1)x_i(-1). For w ∈𝒲, the ℬ-orbit 𝒪^+_w = ℬwℬℬ and ℬ^--orbit 𝒪^-_w = ℬ^-wℬℬ in 𝒢ℬ are called the Bruhat cell and opposite Bruhat cell corresponding to w, respectively. Let 𝒩_w = 𝒩∩ẇ𝒩^-ẇ^-1 and 𝒩^-_w = 𝒩^- ∩ẇ𝒩^-ẇ^-1, then we have the following isomorphisms 𝒩_w →ℬwℬℬ, a ↦ aẇℬ, a ∈𝒩_w, 𝒩^-_w →ℬ^-wℬℬ, b ↦ bẇℬ, b ∈𝒩_w. Let ℓ(w) denote the length of w ∈𝒲. Note that if w = w_1w_2 and ℓ(w) = ℓ(w_1) + ℓ(w_2), then 𝒩_wẇ = (𝒩_w_1ẇ_1)(𝒩_w_2ẇ_2) is a direct product decomposition. Let w = s_i_1s_i_2⋯ s_i_k be a reduced expression for w, then [ ϕ_w: ℂ^k ⟶ 𝒪^+_w; (ξ_1, …, ξ_k) ↦ x_i_1(ξ_1)ṡ_i_1⋯ x_i_k(ξ_k)ṡ_i_kℬ ] is an isomorphism (c.f. <cit.>), and (ξ_1, …, ξ_k) is called the Bott-Samelson coordinate on 𝒪^+_w defined by the reduced word w = s_i_1s_i_2⋯ s_i_k. Let w_0 ∈𝒲 be the longest Weyl group element. For w ∈𝒲, let ŵ be defined by ŵ· w = w_0 or ŵ = w_0 · w^-1. The identity 𝒩^-_w = ŵ̇^-1𝒩_ŵŵ̇ gives rise to the isomorphism [ ψ_w: ℬ^- w ℬℬ ⟶ 𝒪^+_ŵ; a ẇℬ ↦ ŵ̇ a^-1ℬ, ] where a ∈𝒩^-_w. A parameterization for 𝒪^-_w can thus be obtained as ϕ_ŵ∘ψ^-1_w: ℂ^k →𝒪^-_w, where k = ℓ(ŵ) = ℓ(w_0) - ℓ(w), and following <cit.> we call it the Bott-Samelson coordinate for 𝒪^-_w associated with the reduced word ŵ = s_i_1s_i_2⋯ s_i_k. Another coordinate which is defined only on an open subset of 𝒪^-_w can be described as follows. Recall that the Richardson variety ℛ_v, w is defined as ℛ_v, w := 𝒪^+_w ∩𝒪^-_v, which is nonempty precisely when v ≤ w in the Bruhat order. Let ŵ be defined as above, and ŵ = s_i_1s_i_2⋯ s_i_k be a reduced expression for ŵ. Then the map [ φ_ŵ: ℂ^k ⟶ ℛ_w, w_0; (ξ_1, …, ξ_k) ↦ y_i_1(ξ_1) y_i_2(ξ_2) ⋯ y_i_k(ξ_k)ẇℬ ] defines an isomorphism (c.f. <cit.>). We call the coordinate system on ℛ_w, w_0⊂𝒪^-_w Lusztig coordinate for ℛ_w, w_0 associated with the reduced word ŵ = s_i_1s_i_2⋯ s_i_k. Note that the image of φ_ŵ does not depend on the reduced word we choose for ŵ. Note also that ℛ_w, w_0 = w_0ℬ^-ℬ∩𝒪^-_w is the intersection of 𝒪^-_w with the shifted big cell w_0ℬ^-ℬ, so that φ only defines a coordinate on an open dense subspace of 𝒪^-_w. For simplicity we mainly use the Lusztig coordinate for a generic element in the corresponding Bruhat cell in the rest of the paper. We will give a concrete example to illustrate the difference between the two coordinate systems (see (<ref>) and (<ref>) below for the parameterizations of a generic element in the flag variety of B_2). We will discuss the f-KT hierarchies on the Lie algebras of A-, B- and G-types in this paper by embedding those equations into the f-KT lattice in the Hessenberg form (<ref>). § THE F-KT HIERARCHY OF TYPE A Now let us consider the f-KT hierarchy discussed in the previous sections in the frame of the Lie algebra of type A, 𝔰𝔩_n+1():={X∈End(^n+1): tr(X)=0}. Recall that 𝔤=𝔰𝔩_n+1() has a triangular decomposition, 𝔤=𝔫_+⊕𝔥⊕𝔫_-, where 𝔥 (resp. 𝔫_+, 𝔫_-) is a subgroup of 𝔤 consisting of diagonal matrices (resp. strictly upper triangular matrices, strictly lower triangular matrices). Then the Cartan subalgebra 𝔥 is given by 𝔥={diag(h_1,…,h_n+1):  ∑_i=1^n+1h_i=0, h_i∈}. Let ε_i be the linear map _i:𝔥→ given by ε_i(diag(h_1,…,h_n+1))=h_i. Then the root system of 𝔤 with respect to 𝔥 is given by Σ_A_n={±(_i-_j): 1≤ i<j≤ n + 1}. In particular, the positive root system is given by Σ^+_A_n={ε_i-ε_j= α_i+α_i+1+⋯+α_j-1: 1≤ i< j≤ n+1}. Note that the simple roots are given by α_i=ε_i-ε_i+1 and |Σ^+_A_n|=n(n+1)/2. We take the Chevalley basis in the form, H_i=E_i,i-E_i+1,i+1, X_i=E_i,i+1, Y_i=E_i+1,i, (1≤ i≤ n). The root vectors Y__i-_j, (i<j) are defined by Y__i-_j=E_j,i=(-1)^j-i[[⋯[[Y_i,Y_i+1],Y_i+2]⋯ ],Y_j-1]. Then the Lax matrix L_A∈𝔰𝔩_n+1() for 𝔰𝔩_n+1() is given by L_A =∑_i=1^n(a_iH_i+X_i+b_iY_i)+∑_j=3^n+1∑_i=1^j-1b__i-_jY__i-_j =[ a_1 1 0 ⋯ 0 0; b_1 a_2-a_1 1 ⋯ 0 0; b__1-_3 b_2 a_3-a_2 ⋱ ⋮ ⋮; ⋮ ⋮ ⋱ ⋱ 1 ⋮; b__1-_n b__2-_n ⋯ ⋯ a_n-a_n-1 1; b__1-_n+1 b__2-_n+1 ⋯ ⋯ b_n -a_n ], with b_i=b__i-_i+1, and the f-KT equation of A-type, ∂ L_A/∂ t_1=[P_A, L_A] with P_A=∑_i=1^n(a_iH_i+X_i), which gives {[ ∂ a_i/∂ t_1=b_i (1≤ i≤ n),; ∂ b__i-_j/∂ t_1=-(∑_k=1^n(_i-_j)(H_k)a_k) b__i-_j+b__i-_j+1-b__i-1-_j (1≤ i< j≤ n), ]. where _i(H_k)=δ_i,k-δ_i,k+1. Comparing the Lax matrix L_A with L in (<ref>), we have a_i,i =a_i-a_i-1 (1≤ i≤ n+1), a_ℓ+k,k =b__k-_ℓ+k (1≤ k≤ n-ℓ+1, 1≤ℓ≤ n). These entries of L_A can be written by a_i =∂/∂ t_1lnτ^A_i(), (1≤ i≤ n), b__k-_ℓ+k =p_ℓ+1(D̃)τ^A_k()∘τ^A_ℓ+k-1()/τ^A_k()τ^A_ℓ+k-1() (1≤ k≤ n-ℓ+1), where the τ^A-functions are defined in (<ref>). Recall first that the exterior product space ∧^i^n+1 gives the irreducible highest weight representation of SL_n+1() with the highest weight ϖ_i=_1+⋯+_i and the highest weight vector v_ϖ_i=e_1∧⋯∧ e_i. Note here that ϖ_i(H_j)=δ_i,j. Then the τ-functions are expressed as the determinants of the leading principal minors of g()=exp(Θ_L^0()), i.e. τ^A_i()=⟨ v_ϖ_i, g()· v_ϖ_i⟩_ϖ_i=⟨ e_1∧⋯∧ e_i, e^Θ_L^0() e_1∧⋯∧ e_i⟩=Δ_i() (1≤ i≤ n), where ⟨·,·⟩ is nothing but the usual inner product (determinant) on ∧^i^n+1, and Δ_i() is the i-th principle minor of the matrix g(). They are the well-known τ-functions for the f-KT hierarchy of type A (c.f. <cit.>). One should note that these formulas have been given in <cit.> for the case of tridiagonal Toda lattice. Here we claim that the formula is still valid for the f-KT hierarchy. We here also give an expansion form of the τ-function about a Painlevé divisor _* with e^Θ_L^0(_*)=n_*w_*b_*, τ_i^A() =Δ_i()=⟨ e_1∧⋯∧ e_i, e^Θ_L^0() n_*w_*b_*· e_1∧⋯∧ e_i⟩ =∑_1≤ j_1<⋯<j_i≤ n+1⟨ e_1∧⋯∧ e_i, e^Θ_L^0() e_j_1∧⋯∧ e_j_i⟩ ⟨ e_j_1∧⋯∧ e_j_i, n_*w_*b_*· e_1∧⋯∧ e_i⟩. This formula is due to (<ref>) in Lemma <ref>. Here note that the set {e_j_1∧⋯∧ e_j_i:1≤ j_1<⋯<j_i≤ n+1} forms the orthonormal basis of ∧^i^n+1. If the initial matrix L^0 is nilpotent, the τ-functions become polynomials of . We study the polynomial solutions in the next section. §.§ Polynomial τ-functions In (<ref>), if we set all the eigenvalues zero, i.e. κ_i=0 for all i, then we have τ_i^A(; w_*)=⟨ e_1∧⋯∧ e_i,𝒫_n^A()n_*· e_w_*(1)∧⋯∧ e_w_*(i)⟩, (1≤ i≤ n), where 𝒫_n^A() is the (n+1)× (n+1) matrix given in (<ref>), 𝒫_n^A()=𝒫_n+1()=[ 1 p_1() p_2() p_3() ⋯ p_n(); 0 1 p_1() p_2() ⋯⋯ p_n-1(); ⋮ ⋱ ⋱ ⋱ ⋯ ⋮; 0 ⋯ 0 1 ⋯ p_n-i+1(); ⋮ ⋮ ⋮ ⋱ ⋱ ⋮; 0 ⋯ ⋯ ⋯ 0 1 ]. We note that the classification of the polynomial solutions for type A can be obtained by listing all permutations w_*∈𝔖_n+1. We also need an element n_* in (<ref>) for each w_*, which is constructed as follows (see also <cit.>). The matrix y^A_i(ξ)∈ SL_n+1 defined in (<ref>) is given by y_i^A(ξ):=exp(ξ Y_i)= [ 1 ; ⋱ ; 1 ; ξ 1 ; ⋱; 1 ] (1≤ i≤ n), where ξ is a parameter. For each w_*∈𝔖_n+1, let ŵ be defined by ŵ· w_* = w_0 or ŵ=w_0· w_*^-1, where w_0 is the longest element in 𝔖_n+1. We write ŵ in a reduced expression, ŵ=s_i_1s_i_2⋯ s_i_m with m=ℓ(ŵ)=ℓ(w_0)-ℓ(w_*), where ℓ(w) denotes the length of w. Then the n_* associated with w_* in the Lusztig coordinate (<ref>) is given by n_*=y^A_i_1(ξ_1) y^A_i_2(ξ_2) ⋯ y^A_i_m(ξ_m), where {ξ_1,…,ξ_m} gives the set of free parameters. That is, the element n_*ẇ_* mod(ℬ^+) gives a generic element in the corresponding Bruhat cell of the flag SL_n+1/ℬ^+, and the dimension of the cell is m=ℓ(ŵ). As an example, consider w_*=s_1s_2s_3s_4s_1s_3s_2 for the f-KT hierarchy of A_4-type. Then we have ŵ=s_2s_4s_3, and n_*=y_2(ξ_1)y_4(ξ_2)y_3(ξ_3) is given by n_*ẇ_*=[ 0 0 0 0 1; 0 0 1 0 0; 1 0 ξ_1 0 0; ξ_3 0 0 -1 0; ξ_2ξ_3 1 0 -ξ_2 0 ]. There are three free parameters for the Bruhat cell X_w_*=𝒩^-ẇ_*ℬ^+/ℬ^+, i.e. dim(X_ w_*)=3. Noting that w_*(1,2,3,4,5)=(3,5,2,4,1), we have the polynomial solutions of the τ-functions in (<ref>) for w_*=s_1s_2s_3s_4s_1s_3s_2, τ^A_1(,w_*) =S_[2][3]()+ξ_3 S_[3][3]()+ξ_2ξ_3S_[4][3](), τ^A_2(,w_*) =S_[3,2][3](), τ^A_3(,w_*) =S_[2,1,1][3]()+ξ_3S_[2,2,1][3]()+ξ_1ξ_3S_[2,2,2][3](), τ^A_4(,w_*) =S_[1,1,1,1][3](). We can now find the elements of the matrix L_A. To compute p_ℓ+1(D̃)τ_k∘τ_k+ℓ-1, the following formula is useful (c.f. <cit.>), p_m(D̃)τ_α∘τ_β =∑_i+j=m(p_i(∂̃)τ_α)(p_j(-∂̃)τ_β) =∑_i+j=m(S_μ_i(∂̃)τ_α)((-1)^jS_ν_j(∂̃)τ_β), where μ_i represents the Young diagram with i horizontal boxes, and ν_j represents j vertical boxes. Then we find that p_5(D̃)S_[2][3]∘ S_[1,1,1,1][3] =S_[1][3]-S_[1][3]=0, p_5(D̃)S_[3][3]∘ S_[1,1,1,1][3] =S_[2][3]-S_[1][3]^2+S_[1,1][3]=0, p_5(D̃)S_[4][3]∘ S_[1,1,1,1][3] =S_[3][3]-S_[2][3]S_[1][3]+S_[1][3]S_[1,1][3]-S_[1,1,1][3]=0. Note that they are some Plücker relations. This implies that we have b_α[1,4]()=a_5,1()=p_5(D̃)τ_1∘τ_4/τ_1τ_4=0. This gives that b_α[1,3]=a_4,1 and b_α[2,4]=a_5,2 satisfying a_4,1()=a_4,1^0τ_4τ_0/τ_3τ_1=p_4(D̃)τ_1∘τ_3/τ_1τ_3 and a_5,2()=a_5,2^0τ_5τ_1/τ_4τ_2=p_4(D̃)τ_2∘τ_4/τ_2τ_4, where τ_0=1 and τ_5=-1. One can also find that p_4(D̃)τ_1∘τ_3=-ξ_3(ξ_1+ξ_2+ξ_3)τ_4, p_4(D̃)τ_2∘τ_4=0, that is, we have a_4,1^0=-ξ_3(ξ_1+ξ_2+ξ_3) and a_5,2^0=0. This example shows that the τ-functions corresponding to w_* in (<ref>) gives a rational solution of the f-KT hierarchy of A_4-type with the entries b_α[1,5]=b_α[2,5]=0, which is a 3-banded KT hierarchy. It should be note that if a_4,1^0=0, then we have a solution of a 2-banded KT hierarchy, i.e. a_5,1=a_4,1=a_5,2=0. Then we can find that p_3(D̃)τ_1∘τ_2=τ_3, p_3(D̃)τ_2∘τ_3=τ_1τ_4, p_3(D̃)τ_3∘τ_4=τ_2τ_5, and a_3,1()=τ_3()/τ_1()τ_2(), a_4,2()=τ_1()τ_4()/τ_2()τ_3(), a_5,3=-τ_2()/τ_3()τ_4(). § THE F-KT HIERARCHY OF TYPE B We consider the Lie algebra of type B in the following form, 𝔬_2n+1()={ X∈End(^2n+1): X^TF+FX=0 }, where the matrix F is given by F=∑_i=1^2n+1(-1)^n-i+1E_i, 2n+2-i=[ 0 ⋯ 0 0 0 ⋯ (-1)^n; ⋮ ⋰ ⋮ ⋰ ⋮; 0 0 0 -1 0; 0 ⋯ 0 1 0 ⋯ 0; 0 -1 0 0 0; ⋮ ⋰ ⋮ ⋰ ⋮; (-1)^n ⋯ 0 0 0 ⋯ 0 ]. The Chevalley vectors {H_i,X_i,Y_i} satisfy the conditions, [H_i,X_j]=C_j,iX_j, [H_i,Y_j]=-C_j,iY_j, [X_i,Y_j]=δ_i,jH_i, where C_B=(C_i,j) is the Cartan matrix of B-type, C_B=[ 2 -1 0 ⋯ 0; -1 2 -1 ⋯ 0; ⋮ ⋱ ⋱ ⋯ ⋮; 0 ⋯ -1 2 -2; 0 ⋯ 0 -1 2 ]. We take the following representation for the Chevalley generators (c.f. <cit.>), H_i =E_i,i-E_i+1,i+1+E_2n+1-i,2n+1-i-E_2n+2-i,2n+2-i, (1≤ i≤ n-1), H_n =2(E_n,n-E_n+2,n+2), the simple root vectors, X_i=E_i,i+1+E_2n+1-i,2n+2-i (1≤ i≤ n), and the negative generators, {[ Y_i=E_i+1,i+E_2n+2-i,2n+1-i (1≤ i≤ n-1),; Y_n=2(E_n+1,n+E_n+2,n+1). ]. Then the negative root vectors Y_α are generated by taking the commutators, [Y_α, Y_β]=N_-α,-β Y_α+β, with N_-α,-β 0 if α+β∈Σ^+. Let ε_i be the basis vector of 𝔥^* dual to Ê_i=E_i,i-E_2n+2-i,2n+2-i, i.e. ε_i(Ê_j)=δ_i,j, then the set of positive roots is given by Σ^+={[ ε_i  (1≤ i≤ n), ε_i±ε_j  (1≤ i<j≤ n) ]}, where ε_i=α_i+⋯ +α_n. Note that |Σ^+|=n^2. §.§ The f-KT hierarchy on 𝔰𝔬_2n+1 The Lax matrix L_B of the f-KT hierarchy on 𝔬_2n+1() is defined by L_B=∑_i=1^ n a_iH_i+∑_i=1^ n X_i+∑_α∈Σ^+b_αY_α. The total number of the dependent variables {a_i, b_α} is n^2+n. The set of eigenvalues of L_B is given by { 0, ±κ_i (1≤ i≤ n) }, where we assume κ_i 0 and κ_iκ_j (i j). Notice that the invariants I_m=1/mtr(L_B^m) vanish when m= odd. Then the f-KT hierarchy of B-type is defined only for odd times _B=(t_1,t_3,t_5,…), and each invariant I_2k+2 defines the Lax equation, ∂ L_B/∂ t_2k+1=[P_2k+1,L_B], P_2k+1:=Π_𝔟^+∇(I_2k+2)=(L_B^2k+1)_≥ 0. For example, the f-KT lattice of B_3-type is formulated as follows. The positive root system Σ_B_3^+ is given by the set of 3^2 elements, and the corresponding root vectors are Y__1-_2=Y_1=E_2,1+E_7,6, Y__2-_3=Y_2=E_3,2+E_6,5, Y__3=Y_3=2(E_4,3+E_5,4), Y__1-_3=E_3,1-E_7,5, Y__2=E_4,2-E_4,2, Y__2+_3=E_5,2+E_6,3, Y__1=E_4,1+E_7,4, Y__1+_3=E_5,1-E_7,3, Y__1+_2=E_6,1+E_7,2. The Lax matrix is then given by L_B_3 =∑_i=1^3 (a_iH_i+X_i+b_iY_i)+∑_α∈Σ_B_3^+∖Πb_αY_α =[ a_1 1 ; b_1 a_2-a_1 1 ; b__1-_3 b_2 2a_3-a_2 1 ; b__1 b__2 b_3 0 1 ; b__1+_3 b__2+_3 0 b_3 -2a_3+a_2 1 ; b__1+_2 0 b__2+_3 -b__2 b_2 -a_2+a_1 1; 0 b__1+_2 -b__1+_3 b__1 -b__1-_3 b_1 -a_1 ]. The first member of the f-KT hierarchy of B-type in rank 3 is then given by ∂ a_i/∂ t_1=b_i, (i=1,2,3), ∂ b_1/∂ t_1=-∑_j=1^3(C_1,ja_j)b_1+b__1-_3, ∂ b_2/∂ t_1=-∑_j=1^3(C_2,ja_j)b_2-b__1-_3+b__2, ∂ b_3/∂ t_1=-∑_j=1^3(C_3,ja_j)b_3-b__2, ∂ b__1-_3/∂ t_1=-(a_1+a_2-2a_3)b__1-_3+b__1, ∂ b__2/∂ t_1=(a_1-a_2)b__2-b__1+b__2+_3, ∂ b__1/∂ t_1=-a_1b__1+b__1+_3, ∂ b__2+_3/∂ t_1=(a_1-2a_3)b__2+_3-b__1+_3, ∂ b__1+_3/∂ t_1=-(a_1-a_2+2a_3)b__1+_3+b__1+_2, ∂ b__1+_2/∂ t_1=-a_2b__1+_2, where C_i,j=α_i(H_j) is the Cartan matrix of B_3. §.§ The τ-functions for the f-KT hierarchy of B-type Embedding the Lax matrix L_B into that of Hessenberg form ((2n+1)×(2n+1) matrix), the diagonal elements are expressed as {[ a_i,i=a_i-a_i-1 (1≤ i≤ n-1), a_n,n=2a_n-a_n-1,; a_n+1,n+1=0, a_n+1+k,n+1+k=-a_n+1-k,n+1-k (1≤ k≤ n), ]. where we assume a_0=0. The elements in the lower triangular part satisfy the following symmetry a_ℓ+k,k=-(-1)^ℓ a_2n+2-k,2n+2- ℓ -k for {[ 1≤ k≤⌊2n-ℓ+1/2⌋,; 1≤ℓ≤ 2n-1. ]. Note here that if ℓ is even, say ℓ=2m, then we have a_n+m+1,n-m+1=0, which is an anti-diagonal element in L_B. Recall that a_i,j(t) are given in Proposition <ref> with the determinants Δ_i(). Then, the elements a_i(t)'s in (<ref>) can be expressed by {[ a_i(_B)=∂/∂ t_1lnΔ_i(_B), (1≤ i≤ n-1),; a_n(_B)=1/2∂/∂ t_1lnΔ_n(_B), ]. where the Δ_i(_B) for 1≤ i≤ n are defined by Δ_i(_B):=⟨ e_1∧⋯∧ e_i, e^Θ_L_B^0(_B)· e_1∧⋯∧ e_i⟩ with Θ_L_B^0(_B):=∑_k=0^∞ (L_B^0)^2k+1t_2k+1. Here L_B^0 is the initial Lax matrix. Note that Θ_L_B^0∈𝔬_2n+1(), so that g(_B):=e^Θ_L_B^0(_B) is an element of the group O_2n+1() with Lie(O_2n+1)=𝔬_2n+1, i.e. (see (<ref>)) g(_B)^TFg(_B)=F where F=∑_i=1^2n+1(-1)^n-i+1E_i, 2n+2-i. The group O_2n+1() is then defined by O_2n+1():={X∈Aut(^2n+1): X^TFX=F}. We then define the τ-functions for the f-KT hierarchy of B-type by {[ τ^B_i(_B)=Δ_i(_B) (1≤ i≤ n-1),; τ^B_n(_B)=√(Δ_n(_B)), ]. so that the variables a_i(_B) can be written in the form (<ref>), a_i(_B)=∂/∂ t_1lnτ_i^B(_B) (1≤ i≤ n), which is introduced in <cit.> for the tridiagonal cases. The expression (<ref>) of the τ-function τ_n^B(_B) is related to a spin representation of SO_2n+1() as follows. Recall that the fundamental weights of 𝔰𝔬_2n+1() are given by ϖ_i=ε_1+⋯ +ε_i (1≤ i≤ n-1), ϖ_n=1/2(ε_1+⋯ +ε_n), where ε_i is the basis vector of 𝔥^* dual to ê_i=E_i,i-E_2n+2-i,2n+2-i, i.e. ε_i(ê_j)=δ_i,j. This implies that the exterior product ∧^i^2n+1 of the standard representation gives the irreducible representation of 𝔰𝔬_2n+1() with highest weight ϖ_i=ε_1+⋯+ε_i for 1≤ i≤ n, and we have ∧^i^2n+1≅ V(ϖ_i) (1≤ i≤ n-1), ∧^n^2n+1≅ V(2ϖ_n). We then denote by c_λ^Spin_2n+1(g̃) and c_λ^SO_2n+1(g) the matrix coefficients on the spin group Spin_2n+1() and the orthogonal group SO_2n+1(), where g=π (g̃)∈ SO_2n+1() with the covering map π:Spin_2n+1()→ SO_2n+1(). Then, from (<ref>) in Lemma <ref>, we have (c_ϖ_n^Spin_2n+1(g̃))^2=c_2ϖ_n^Spin_2n+1(g̃)=c_2ϖ_n^SO_2n+1(g)=⟨ v_2ϖ_n, g· v_2ϖ_n⟩_2ϖ_n. Taking g=g(_B):=exp(Θ_L^0(_B)), we have τ_n^B(_B)=c_ϖ_n^Spin_2n+1(g̃(_B)) with g(_B)=π(g̃(_B)). In particular, the representation V(ϖ_n) is a spin representation, and τ^B_n(_B) can be expressed by a Pfaffian. It seems that the explicit formula of c_ϖ_i^Spin_2n+1(g̃) in terms of a Pfaffian may not be so simple. However the Pfaffian formula of the polynomial τ-functions has been obtained in <cit.>. One should also note that the symmetry in (<ref>) then implies that the determinants Δ_i(_B) satisfy the following relations, Δ_i(_B)=±Δ_2n+1-i(_B) (1≤ i≤ n). (One can show that the Young diagrams corresponding to those minors are in conjugation, see Proposition <ref>.) That is, the solution is determined by Δ_i() only for 1≤ i≤ n in (<ref>), Δ_i(_B)=d_i⟨ e_1∧⋯∧ e_i, Ve^Θ_K(_B)V^-1n_0n_*ẇ_* · e_1∧⋯∧ e_i⟩. Here the unipotent matrix n_*∈𝒩^- is given as follows. Let us first give the Weyl group W_B_n associated with the algebra of type B_n. Each generator of the Weyl group W_B_n can be expressed by the simple reflections of A-type through the Bruhat embedding <cit.>, s^B_i={[ s^A_is^A_2n+1-i, 1≤ i≤ n-1,; s_n^As_n+1^As_n^A, i=n, ]. where s_i^A is a simple reflection of the symmetric group S_2n+1. We have W_B_n=⟨ s_i^B | (s_i^B)^2= (s_i^Bs_j^B)^2=e (|i-j|≥2), (s_i-1^Bs_i^B)^3=e (2≤ i≤ n-1), (s_n-1^Bs_n^B)^4=e ⟩, and 𝔚_B_n≅S_n⋉ (ℤ_2)^n, |𝔚_B_n|=2^n n!. The longest element w_0 can be expressed as w_0=(s_1^Bs_2^B⋯ s_n^B)·(s_1^Bs_2^B⋯ s_n^B) ⋯ (s_1^Bs_2^B⋯ s_n^B), with ℓ(w_0)=n^2, where the elements in the parenthesis repeats n times. For example, the 𝔚_B_2 is given by 𝔚_B_2={ e,  s_1^B,  s_2^B,  s_1^Bs_2^B,  s_2^Bs_1^B,  s_1^Bs_2^Bs_1^B,  s_2^Bs_1^Bs_2^B, s_1^Bs_2^Bs_1^Bs_2^B=w_0}. In order to compute n_*ẇ_*, we first define y^B_i(ξ)∈ O_2n+1() by y^B_i(ξ)=exp(ξ Y_i), (1≤ i≤ n), where Y_i's are defined in (<ref>). Also the representation ṡ_i^B∈ O_2n+1() are defined by {[ ṡ^B_i=ṡ_i^Aṡ_2n+1-i^A, (1≤ i≤ n-1),; ṡ^B_n=ṡ_n^Aṡ_n+1^Aṡ^A_n, ]. where s_i^A∈𝔖_2n+1. Now, according to (<ref>), let ŵ be defined by the following form with a reduced expression, ŵ=w_0· w_*^-1=s^B_i_1s^B_i_2⋯ s^B_i_m. Then we define the unipotent matrix n_* by n_*=y^B_i_1(ξ_1) y^B_i_2(ξ_2) ⋯ y^B_i_m(ξ_m), and n_*ẇ_* mod(ℬ^+) gives the generic point of the Bruhat cell 𝒩^-ẇ_*ℬ^+ in the flag variety O_2n+1()/ℬ^+. We now compute the minor Δ_n(_B) for w_*∈𝔚_B. To do this, we consider the expansion (see (<ref>), also Lemma <ref>), Δ_n(_B) =⟨ e_1∧⋯∧ e_n, g(_B)n_* ẇ_*· e_1∧⋯∧ e_n⟩ =∑_1≤ i_1<⋯<i_n≤ 2n+1⟨ e_1∧⋯∧ e_n, g(_B)· e_i_1∧⋯∧ e_i_n⟩·⟨ e_i_1∧⋯∧ e_i_n, n_*ẇ_*· e_1∧⋯∧ e_n⟩, where g(_B)=e^Θ_L_B^0(_B) and g(_B^*)=n_* w_*b_* (note here that we set d_n=1 in (<ref>)). In the expansion, we first note that for each w∈𝔚_B=𝔖_n⋉ℤ_2^n, there exists r in the subgroup 𝔑_B ≅ℤ_2^n such that ẇ· e_1∧⋯∧ e_n=±ṙ· e_1∧⋯∧ e_n, where 𝔑_B is the normal subgroup representing _2^n, which may be defined by 𝔑_B=⟨ r_i∈𝔚_B (1≤ i≤ n): r_i(j)={[ 2n+2-j, if  j=i,; j, if  j i. ].⟩. Note that 𝔑_B is an Abelian group, and |𝔑_B|=2^n=∑_k=0^nnk. Each element can be expressed by r_k=s^B_ks_k+1^B⋯ s_n-1^Bs_n^Bs_n-1^B⋯ s_k+1^Bs_k^B for k=1,…,n. For example, in the case of B_2 with w_*=e, the matrix n_* is given by n_*=y^B_1(ξ_1)y^B_2(ξ_2)y^B_1(ξ_3)y^B_2(ξ_4) in the Lusztig coordinate, n_*=[ 1 0 0 0 0; ξ_1+ξ_3 1 0 0 0; 2ξ_2ξ_3 2(ξ_2+ξ_4) 1 0 0; 2ξ_2^2ξ_3 2(ξ_2+ξ_4)^2 2(ξ_2+ξ_4) 1 0; 2ξ_1ξ_2^2ξ_3 2(ξ_3ξ_4^2+ξ_1(ξ_2+ξ_4)^2) 2(ξ_3ξ_4+ξ_1ξ_2+ξ_1ξ_4) ξ_1+ξ_3 1 ]. We then have ⟨ e_1∧ e_2, n_*· e_1∧ e_2⟩=⟨ e_1∧ e_2, ṡ_1^Bn_*· e_1∧ e_2⟩=1, ⟨ṙ_2· e_1∧ e_2, n_*· e_1∧ e_2⟩=⟨ e_1∧ e_2, ṡ_2^Bn_*· e_1∧ e_2⟩=2(ξ_2+ξ_4)^2, ⟨ṙ_1· e_1∧ e_2, n_*· e_1∧ e_2⟩=⟨ e_1∧ e_2, ṡ_2^Bṡ_1^B n_*· e_1∧ e_2⟩=2(ξ_3ξ_4+ξ_1(ξ_2+ξ_4))^2, ⟨ṙ_1ṙ_2· e_1∧ e_2, n_*· e_1∧ e_2⟩=⟨ e_1∧ e_2, ṡ_2^Bṡ_1^Bṡ_2^Bn_*· e_1∧ e_2⟩=4(ξ_2ξ_3ξ_4)^2. These polynomials {1, ξ_2+ξ_4, ξ_3ξ_4+ξ_1(ξ_2+ξ_4), ξ_2ξ_3ξ_4} are the spinors of the spin representation of n_*. Notice that these coordinates are useful for the total positivity of the flag variety of B-type. In the Bott-Samelson coordinate, the matrix n_* for the same w_* is given by n_*=[ 1 0 0 0 0; ξ_1 1 0 0 0; -2ξ_2 + 2ξ_1ξ_4 2ξ_4 1 0 0; 2(ξ_3 - 2ξ_2ξ_4 + ξ_1ξ_4^2) 2ξ_4^2 2ξ_4 1 0; -2ξ_2^2+ 2ξ_1ξ_3 2ξ_3 2ξ_2 ξ_1 1 ], which may be useful when we discuss several limits ξ_i→ 0. Equation (<ref>) implies that the terms associated with r∈𝔑_B are complete squares, ⟨ e_1∧⋯∧ e_n, g(_B)ṙ· e_1∧⋯∧ e_n⟩ =(ϕ_r(_B))^2, ⟨ṙ e_1∧⋯∧ e_n, n_*ẇ_*· e_1∧⋯∧ e_n⟩ =(η_r(ξ; w_*))^2, where ϕ_r(_B) is an exponential polynomial, and η_r(ξ, w_*) is a homogeneous polynomial of ξ_i's. Now we have the main theorem in this section. The τ-function associated with w_* denoted by τ^B_n(_B; w_*) is given by τ^B_n(_B, w_*)=√(Δ_n(_B))=∑_r∈𝔑_Bϕ_r(_B)η_r(ξ; w_*). From (<ref>) in Lemma <ref>, we first note that ⟨ e_1∧⋯∧ e_n, g(_B)h· e_1∧⋯∧ e_n⟩ =(⟨ v_ϖ_n, g̃(_B)h̃· v_ϖ_n⟩_ϖ_n)^2, where π(g̃(_B))=g(_B) and π(h̃)=n_*ẇ_* with the covering map π:Spin_2n+1→ SO_2n+1. Also note that ϕ_r(_B) and η_r(ξ;w_*) can be expressed by ϕ_r(_B)=⟨ v_ϖ_n,g̃(_B)· u_r⟩_ϖ_n and η_r(ξ;w_*)=⟨ u_r,h̃· v_ϖ_n⟩_ϖ_n, where {u_r:r∈𝔑_B} is the set of orthonormal basis of the representation V(ϖ_n). Then from (<ref>) in Lemma <ref>, we have ⟨ v_ϖ_n, g̃(_B)h̃· v_ϖ_n⟩_ϖ_n=∑_r∈𝔑_B⟨ v_ϖ_n,g̃(_B)· u_r⟩_ϖ_n ⟨ u_r,h̃· v_ϖ_n⟩_ϖ_n, which gives the desired formula. §.§ Polynomial solutions of B-type The polynomial solution of τ_k^B(_B) for each w_*∈𝔚_B is obtained by setting g(_B)=𝒫_n^B(_B), i.e. τ^B_k(_B) =⟨ e_1∧⋯∧ e_k, 𝒫_n^B(_B)n_*ẇ_*· e_1∧⋯∧ e_k⟩, (1≤ k≤ n-1), τ^B_n(_B) =√(⟨ e_1∧⋯∧ e_n, 𝒫_n^B(_B)n_*ẇ_*· e_1∧⋯∧ e_n⟩), where 𝒫_n^B(_B) is defined by 𝒫_2n+1(t_1,0,t_3,0,…) in (<ref>). In order to compute these τ-functions, we first recall that for an index set {i_1,i_2,…,i_k}, the Schur polynomial corresponding to the index set is given by S_λ(_B)=⟨ e_1∧⋯∧ e_k, 𝒫_n^B(_B)· e_i_1∧⋯∧ e_i_k⟩ with λ=(i_k-k, i_k-1-(k-1), ⋯ , i_1-1). Then we have the following proposition. Let λ' be the transposed Young diagram of λ. Then the Schur polynomials S_λ(_B) and S_λ'(_B) are the same, i.e. S_λ(_B)=S_λ'(_B). To prove this, we start with the following lemma as a special case of Proposition <ref>. For λ=(k), the Young diagram with k horizontal boxes, we have S_(k)(_B)=S_(1^k)(_B), where the transposed diagram of (k) is (1^k), the diagram with k vertical boxes. Recall that exp(∑_i=0^∞κ^2i+1t_2i+1)=∑_k=0^∞κ^k S_(k)(_B). Replacing κ→ -κ and _B→-_B, we have exp(∑_i=0^∞κ^2i+1t_2i+1)=∑_k=0^∞κ^k (-1)^k S_(k)(-_B)=∑_k=0^∞κ^k S_(1^k)(_B), where we have used (-1)^kS_(k)(-_B)=S_(1^k)(_B). This proves the lemma. Now we prove the proposition. Proof of Proposition <ref>. Let λ=(λ_1,λ_2,…,λ_r) and denote by λ'=(λ'_1,λ'_2,…,λ_s') its transposed diagram. Recall the Jacobi-Trudi identity of the Schur polynomial, S_λ()=| h_λ_1 h_λ_2+1 ⋯ h_λ_r+r-1 h_λ_1-1 h_λ_2 ⋯ h_λ_r+r-2 ⋮ ⋮ ⋱ ⋮ h_λ_1-r+1 h_λ_2-r+2 ⋯ h_λ_r|=| e_λ'_1 e_λ'_2+1 ⋯ e_λ'_s+s-1 e_λ'_1-1 e_λ'_2 ⋯ e_λ'_s+s-2 ⋮ ⋮ ⋱ ⋮ e_λ'_1-s+1 e_λ'_2-s+2 ⋯ e_λ'_s|, where h_k=S_(k) and e_k=S_(1^k). Then Lemma <ref>, i.e. h_k=e_k proves the proposition. □ Now we consider the Schur polynomial associated with w∈𝔚_B, S_λ(w)(_B)=⟨ e_1∧⋯∧ e_n, 𝒫_n^B(_B)ẇ· e_1∧⋯∧ e_n⟩, where λ(w)=(i_n-n,…,i_2-2,i_1-1) with {w(1),…,w(n)}={i_1<i_2<⋯<i_n}. To find λ(w), we first note the following lemma. For an element r_k∈𝔑_B, the corresponding Young diagram λ(r_k) is expressed in the following Frobenius notation, λ(r_k)=(n-k+1|n-k), which is the hook diagram (n-k+2, 1^n-k). Since we have r_k·(1,2,…,n)=(1,…, k-1,k̅, k+1,…,n) with k̅=2n+2-k. The corresponding Young diagram is λ=(n+2-k, 1^n-k), which is (n-k+1|n-k) in the Frobenius notation. Then we have the following proposition on λ(w). In the Frobeneus notation, the Young diagram λ(w) can be expressed in the form, λ(w)=(α_1,α_2,…,α_m | α_1-1,α_2-1,…,α_m-1), where α_m≥ 1 with some constant m. Let us take the following example with n=7. We consider w·(1,2,3,4,5,6,7)=ṙ_2ṙ_4 ṙ_7(1,2,3,4,5,6,7)=(1,2̅,3,4̅,5,6,7̅)=(1, 14, 3, 12, 5, 6, 9). Then from Lemma <ref>, we have λ(r_2)=(6|5), λ(r_4)=(4|3), λ(r_7)=(1|0). That is, this proposition states that λ(w)=λ(r_2r_4r_7)=(6,4,1|5,3,0). This may be understood as follows. First express w in the following diagram (Sato's Maya-diagram), [15][12][0.4cm*8,,,,,,,,,,,,,,] which can also be written as w· (1,2,…,15)=(1,2,3,4,5,6,7, 8,9,10,11,12,13,14,15), where k̅ for an index k is marked with a white stone at the k-th box in the Maya diagram, and other indices without “bar” are marked with the black stones. In particular, the 8-th ((n+1)-th) box from left is always marked with a white stone. Note that k=16-k, in general, k=2n+2-k, and n+1=n+1. Then the corresponding Young diagram is given by λ_n-j+1=i_j-j, i.e. in this example, we have λ(w)=(7,6,4,2,2,1,0), which is [7,6,4,2,2,1][8]. It is known that the Maya diagram has a direct connection with the Young diagram. Starting from the bottom left corner, we can take the lattice path along the boundary of the Young diagram in counterclockwise direction and assign each edge with the number from 1 to 2n+1, so that each horizontal edge is labeled by an index with “bar” and each vertical edge is labeled by the index without “bar”. The horizontal and vertical edges in each hook diagram are labeled by k and k=2n+2-k for some number k. Then it is easy to see that the number of vertical boxes in the hook diagram is given by n-k+1, and that the number of the horizontal boxes is k-(n+1)+1=n+2-k. That is, in the Frobenius notation, this hook diagram is expressed by (n-k+1,n-k), which proves the lemma. Note that the number m in the formula is given by the total number of indices with “bar” in w(1,…,n), i.e. the length of r in w. In the example, we have m=3 with (2, 4,7) (r=r_2r_4r_7), and then we have λ(w)=(6,4,1|5,3,0). Now we have the Jozefiak-Pragacz type identity of the Schur polynomial S_λ(w)(_B) for each w∈𝔚_B<cit.>. Let λ( w) be given in the following Frobenius formula, λ(w)=(α_1-1,α_2-1,…,α_s-1 | α_1,α_2,…,α_s). Then the Schur polynomial can be expressed by S_λ(w)(_B)=1/2^sQ_α(_B)^2, where Q_α(_B) is the Q-Schur polynomial with the Young diagram α=(α_1,α_2,…,α_s). Note here that if s is odd, then we add 0 at the end so that α=(α_1,…,α_s,0). With the Frobenius notation, the Giambelli formula gives S_λ(w)=| S_(α_1-1|α_1) S_(α_1-1|α_2) ⋯ S_(α_1-1|α_s) S_(α_2-1|α_1) S_(α_2-1|α_2) ⋯ S_(α_2-1|α_s) ⋮ ⋮ ⋱ ⋮ S_(α_s-1|α_1) S_(α_s-1|α_2) ⋯ S_(α_s-1|α_s)|, where (α|β) is the Young diagram of hook, (α+1,1^β). Then we note that the Schur polynomial S_(α-1|β)(t) can be expressed by S_(α-1|β)=| p_1 p_2 ⋯ p_β p_α+β 1 p_1 ⋯ p_β-1 p_α+β-1 0 1 ⋱ p_β-2 p_α+β-2 ⋮ ⋮ ⋱ ⋮ ⋮ 0 ⋯ ⋯ 1 p_α|. Expanding in the last column, we have S_(α-1|β)=(-1)^β+1(h_α+β-h_α+β-1e_1+h_α+β-2e_2+ ⋯ +(-1)^β+1h_α e_β), where h_k=p_k=S_(k) and e_k=S_(1^k). From Lemma <ref>, h_k=e_k, and noting that S_(k)=Q_k (see Appendix B), we have S_(α-1|β)=∑_i=0^β (-1)^iQ_α+iQ_β-i=1/2(Q_αQ_β+Q_α,β), where we have used the definition of Q_α,β (see Appendix B). Then we have S_λ( w) =1/2^s| Q_α_1Q_α_1 Q_α_1,α_2+Q_α_1Q_α_2 ⋯ Q_α_1,α_s+Q_α_1Q_α_s Q_α_2,α_1+Q_α_2Q_α_1 Q_α_2Q_α_2 ⋯ Q_α_2,α_s+Q_α_2Q_α_s ⋮ ⋮ ⋱ ⋮ Q_α_s,α_1+Q_α_sQ_α_1 Q_α_s,α_2+Q_α_sQ_α_2 ⋯ Q_α_sQ_α_s| =1/2^s| 0 Q_α_1,α_2 ⋯ Q_α_1,α_s Q_α_1 Q_α_2,α_1 0 ⋯ Q_α_2,α_s Q_α_2 ⋮ ⋮ ⋱ ⋮ ⋮ Q_α_s,α_1 Q_α_s,α_2 ⋯ 0 Q_α_s -Q_α_1 -Q_α_2 ⋯ -Q_α_s 1 | =1/2^s[|Q_α_i,α_j|+∑_1≤ i,j≤ sΔ_i,jQ_α_iQ_α_j], where Δ_i,j is the cofactor of the skew-symmetric matrix (Q_α_i,α_j). Now there are two cases to consider: (a) If s= even, then the cofactor Δ_i,j is skew symmetric, Δ_i,j=-Δ_j,i. In this case, the summing term in the third line vanishes, and we have S_λ( w)=1/2^s|Q_α_i,α_j|=1/2^s(Q_α)^2, that is, the determinant of the skew symmetric matrix (Q_α_i,α_j) is the square of the Pfaffian, denoted by Q_α. (b) If s= odd, then the second line can be written by S_λ( w)=1/2^s| 0 Q_α_1,α_2 ⋯ Q_α_1,α_s Q_α_1 Q_α_2,α_1 0 ⋯ Q_α_2,α_s Q_α_2 ⋮ ⋮ ⋱ ⋮ ⋮ Q_α_s,α_1 Q_α_s,α_2 ⋯ 0 Q_α_s -Q_α_1 -Q_α_2 ⋯ -Q_α_s 0 |, that is, the element 1 at the bottom right corner can be replaced by 0 (the leading s× s minor is 0 when s= odd). Then we have S_λ( w)=1/2^s(Q_α̃)^2, where the Young diagram α̃=(α_1,…,α_s,0), i.e. identify Q_α_k=Q_α_k,0 and -Q_α_k=Q_0,α_k. This completes the proof. §.§ Example: Polynomial solutions of B_2-type Here we give the polynomial solutions of (τ_1^B(_B,w_*), τ_2^B(_B,w_*)) for w_*=e, s_1^B, s_1^Bs_2^B, s_1^Bs_2^Bs_1^B and w_0=s_1^Bs_2^Bs_1^Bs_2^B. The τ_1^B(_B) is given by τ_1^B(_B,w_*)=Δ_1(_B)=⟨ e_1, 𝒫_2^B(_B) n_*ẇ_* e_1⟩, and for τ_2^B(_B), we use the formula in Theorem <ref>, i.e. τ_2^B(_B,w_*)=∑_r∈𝔑_Bη_r(ξ; w_*)ϕ_r(_B). Let us first compute the polynomial ϕ_r(_B)=√(⟨ e_1∧ e_2,𝒫^B_2(_B) ṙ· e_1∧ e_2⟩) for each r∈𝔑_B. (a) For r=e, we have (ϕ_e(_B))^2=⟨ e_1∧ e_2,𝒫^B_2(_B) · e_1∧ e_2⟩=1. (b) For r=r_1, we have (ϕ_r_1(_B))^2=⟨ e_1∧ e_2,𝒫^B_2(_B) ṙ_1· e_1∧ e_2⟩=S_[3,1][3](_B)=1/2(Q_[2][3](_B))^2. (c) For r=r_2, we have (ϕ_r_2(_B))^2=⟨ e_1∧ e_2,𝒫^B_2(_B) ṙ_1· e_1∧ e_2⟩=S_[2][3](_B)=1/2(Q_[1][3](_B))^2. (d) For r=r_1r_2, we have (ϕ_r_1r_2(_B))^2=⟨ e_1∧ e_2,𝒫^B_2(_B) ṙ_1ṙ_2· e_1∧ e_2⟩=S_[3,3][3](_B)=1/4(Q_[2,1][3](_B))^2. Now we compute n_* and η_r(ξ; w_*), and then give (τ_1(_B,w_*), τ_2^B(_B,w_*)). (1) w_*=e: In this case we have n_*=y_1^B(ξ_1)y_2^B(ξ_2)y_1^B(ξ_3)y_2^B(ξ_4)[ Let w_*(1, 2, …, 2n+1) = (i_1, i_2, …, i_2n+1), then the sign on the k-th column of n_* is specified by the number of i_j (j < k)'s such that i_j > i_k], which gives n_*=[ 1 0 0 0 0; ξ_1+ξ_3 1 0 0 0; 2ξ_2ξ_3 2(ξ_2+ξ_4) 1 0 0; 2ξ_2^2ξ_3 2(ξ_2+ξ_4)^2 2(ξ_2+ξ_4) 1 0; 2ξ_1ξ_2^2ξ_3 2(ξ_3ξ_4^2+ξ_1(ξ_2+ξ_4)^2) 2(ξ_3ξ_4+ξ_1(ξ_2+ξ_4)) ξ_1+ξ_3 1 ]. The coefficients η_r(ξ;e)=√(⟨ṙ· e_1∧ e_2, n_*· e_1∧ e_2⟩) for r∈𝔑_B are given by η_e=1, η_r_1=√(2)(ξ_3ξ_4+ξ_1(ξ_2+ξ_4)), η_r_2=√(2)(ξ_2+ξ_4), η_r_1r_2=2ξ_2ξ_3ξ_4. Then the τ-functions are given by {[ τ_1^B(_B,e)=1+(ξ_1+ξ_3)S_[1][3](_B)+2ξ_2ξ_3S_[2][3](_B)+2ξ_2^2ξ_3S_[3][3](_B)+2ξ_1ξ_2^2ξ_3S_[4][3](_B),; τ_2^B(_B,e)=1+(ξ_2+ξ_4)Q_[1][3](_B)+(ξ_3ξ_4+ξ_1(ξ_2+ξ_4))Q_[2][3](_B)+ξ_2ξ_3ξ_4Q_[2,1][3](_B). ]. (2) w_*=s_1^B: In this case we have n_*=y_2^B(ξ_1)y_1^B(ξ_2)y_2^B(ξ_3), which gives n_*ṡ_1^B=[ 0 -1 0 0 0; 1 -ξ_2 0 0 0; 2(ξ_1+ξ_3) -2ξ_1ξ_3 1 0 0; 2(ξ_1+ξ_3)^2 -2ξ_1^2ξ_2 2(ξ_1+ξ_3) 0 -1; 2ξ_2ξ_3^2 0 2ξ_2ξ_3 1 -ξ_2 ]. The coefficients η_r(ξ;s_1^B)=√(⟨ṙ· e_1∧ e_2, n_*ṡ_1^B· e_1∧ e_2⟩) for r∈𝔑_B are given by η_e=1, η_r_1=√(2)ξ_2ξ_3, η_r_2=√(2)(ξ_1+ξ_3), η_r_1r_2=2ξ_1ξ_2ξ_3. Then the τ-functions are given by {[ τ_1^B(_B,s_1^B)=S_[1][3](_B)+2(ξ_1+ξ_3)S_[2][3](_B)+2(ξ_1+ξ_3)^2S_[3][3](_B)+2ξ_1ξ_2^2S_[4][3](_B),; τ_2^B(_B,s_1^B)=1+(ξ_1+ξ_3)Q_[1][3](_B)+ξ_2ξ_3Q_[2][3](_B)+ξ_1ξ_2ξ_3Q_[2,1][3](_B). ]. (3) w_*=s_1^Bs_2^B: In this case we have n_*=y_1^B(ξ_1)y_2^B(ξ_2), which gives n_*ṡ_1^Bṡ_2^B=[ 0 0 0 -1 0; 1 0 0 -ξ_1 0; 2ξ_2 0 -1 0 0; 2ξ_2^2 0 -2ξ_2 0 -1; 2ξ_1ξ_2^2 1 -2ξξ_2 0 -ξ_1 ]. The coefficients η_r(ξ;s_1^Bs_2^B)=√(⟨ṙ· e_1∧ e_2, n_*ṡ_1^Bṡ_2^B· e_1∧ e_2⟩) for r∈𝔑_B are given by η_e=0, η_r_1=1, η_r_2=0, η_r_1r_2=√(2)ξ_2. Then the τ-functions are given by {[ τ_1^B(_B,s_1^Bs_2^B)=S_[1][3](_B)+2ξ_2S_[2][3](_B)+2ξ_2^2S_[3][3](_B)+2ξ_1ξ_2^2S_[4][3](_B),; τ_2^B(_B,s_1^Bs_2^B)=1/√(2)(Q_[2][3](_B)+ξ_2Q_[2,1][3](_B)). ]. (4) w_*=s_1^Bs_2^Bs_1^B: In this case we have n_*=y_2^B(ξ), which gives n_*ṡ_1^Bṡ_2^Bṡ_1^B=[ 0 0 0 0 1; 0 -1 0 0 0; 0 -2ξ -1 0 0; 0 -2ξ^2 -2ξ -1 0; 1 0 0 0 0 ]. The coefficients η_r(ξ;s_1^Bs_2^Bs_1^B)=√(⟨ṙ· e_1∧ e_2, n_*ṡ_1^Bṡ_2^Bṡ_1^B· e_1∧ e_2⟩) for r∈𝔑_B are given by η_e=0, η_r_1=1, η_r_2=0, η_r_1r_2=√(2)ξ. Then the τ-functions are given by {[ τ_1^B(_B,s_1^Bs_2^Bs_1^B)=S_[4][3](_B),; τ_2^B(_B,s_1^Bs_2^Bs_1^B)=1/√(2)(Q_[2][3](_B)+ξ Q_[2,1][3](_B)). ]. (5) w_*=w_0=s_1^Bs_2^Bs_1^Bs_2^B (the longest element): In this case we have n_*=Id, which gives n_*ṡ_1^Bṡ_2^Bṡ_1^Bṡ_2^B=[ 0 0 0 0 1; 0 0 0 -1 0; 0 0 1 0 0; 0 -1 0 0 0; 1 0 0 0 0 ]. The coefficients η_r(ξ;s_1^Bs_2^Bs_1^Bs_2^B)=√(⟨ṙ· e_1∧ e_2, n_*ṡ_1^Bṡ_2^Bṡ_1^Bṡ_2^B· e_1∧ e_2⟩) for r∈𝔑_B are given by η_e=0, η_r_1=0, η_r_2=0, η_r_1r_2=1. Then the τ-functions are given by τ_1^B(_B,w_0)=S_[4][3](_B), τ_2^B(_B,w_0)=Q_[2,1][3](_B). We also compute p_4(D̃)Δ_1∘Δ_3 and p_3(D̃)Δ_1∘Δ_2, which give the entries a_4,1=a_5,2 and a_3,1=-a_5,3. In particular, a_4,1 is given by a_4,1=a_4,1^0Δ_4Δ_0/Δ_3Δ_1=p_4(D̃)Δ_1∘Δ_3/Δ_1Δ_3. which gives p_4(D̃)Δ_1∘Δ_3=a_4,1^0Δ_1. If both a_4,1=a_3,1=0, then those τ-functions give a solution of the tridiagonal KT hierarchy of B-type. w_* τ_1=Δ_1 τ_2=√(Δ_2) Δ_2=±Δ'_3 p_4(D̃)Δ_1∘Δ_3 p_3(D̃)Δ_1∘Δ_2 e 1 1 1 0 0 s_1^B S_[1][3] 1 1 0 0 s_2^B 1 Q_[1][3] S_[2][3] 0 0 s_1^Bs_2^B S_[1][3] Q_[2][3] S_[3,1][3] S_[1][3] S_[2][3] s_2^Bs_1^B S_[3][3] Q_[1][3] S_[2][3] 0 S_[2][3] s_1^Bs_2^Bs_1^B S_[4][3] Q_[2][3] S_[3,1][3] S_[4][3] Q_[2][3]Q_[2,1][3] s_2^Bs_1^Bs_2^B S_[3][3] Q_[2,1][3] S_[3,3][3] 0 S_[3,3][3] s_1^Bs_2^Bs_1^Bs_2^B S_[4][3] Q_[2,1][3] S_[3,3][3] 0 0 In the table, Δ_3' implies that if Δ_2=S_μ, then Δ_3=S_μ' with the conjugate Young diagram of μ. Notice that if w_* is the longest element of a subgroup generated by s_1^B or s_2^B or both, then these τ-functions give a solution of the tridiagonal KT hierarchy <cit.>. That is, we have the following four cases, {e}, {s_1^B}, {s_2^B} and {s_1^B,s_2^B}. Also note that the cases of s_2^Bs_1^B and s_2^Bs_1^Bs_2^B give a_4,1=0. That is, they are solutions to the 2-banded KT hierarchy, and we have p_3(D̃)Δ_1∘Δ_2=a_3,1^0Δ_2, and a_3,1(t)=a_3,1^01/τ^B_1(t). § THE F-KT HIERARCHY OF G-TYPE We embed the Lie algebra of G_2-type into a Lie algebra of B_3-type, i.e. 𝔰𝔩_7(), by taking the following Chevalley generators, H_1=E_1,1-E_2,2+2E_3,3-2E_5,5+E_6,6-E_7,7, H_2=E_2,2-E_3,3+E_5,5-E_6,6, the simple root vectors, X_1=E_1,2+E_3,4+E_4,5+E_6,7, X_2=E_2,3+E_5,6, and the negative ones, Y_1=E_2,1+2E_4,3+2E_5,4+E_7,6, Y_2=E_3,2+E_6,5. The set of positive roots is given by Σ_G^+={α_1, α_2, α_1+α_2, 2α_1+α_2, 3α_1+α_2, 3α_1+2α_2 }. The negative root vectors are generated by [Y_α,Y_β]=N_α,βY_α+β if α+β∈Σ_G^+. Here we take the following vectors, Y_α{1,1} =E_3,1-2E_4,2+2E_6,4-E_7,5, Y_α{2,1} =E_4,1-E_5,2-E_6,3+E_7,4, Y_α{3,1} =E_5,1-E_7,3, Y_α{3,2} =E_6,1+E_7,2, where α{i,j}:=iα_1+jα_2. Then the Lax matrix for the f-KT hierarchy of G-type is defined by L_G= ∑_i=1^2(a_iH_i+X_i+b_iY_i)+∑_i=1^3b_i,1Y_α{i,1}+b_3,2Y_α{3,2} =[ a_1 1 0 0 0 0 0; b_1 a_2-a_1 1 0 0 0 0; b_1,1 b_2 2a_1-a_2 1 0 0 0; b_2,1 -2b_1,1 2b_1 0 1 0 0; b_3,1 -b_2,1 0 2b_1 a_2-2a_1 1 0; b_3,2 0 -b_2,1 2b_1,1 b_2 a_1-a_2 1; 0 b_3,2 -b_3,1 b_2,1 -b_1,1 b_1 -a_1 ]. The set of eigenvalues of L_G is given by { 0,  ±(κ_1-κ_2),  ±κ_i (1≤ i≤ 2) }. Then we find that the invariants I_m=1/mtr(L_G^m) give I_m=0 for m=odd as in the case of B-type, and I_2 =κ_1^2+κ_2^2+(κ_1-κ_2)^2=2(3a_1^2-3a_1a_2+a_2^2+3b_1+b_2), I_4 =1/2(κ_1^4+κ_2^4+(κ_1-κ_2)^4)=1/4I_2^2, I_6 =1/3(κ_1^6+κ_2^6+(κ_1-κ_2)^6)=1/3(66a_1^6+2a_2^6+66b_1^3+⋯+6b_3,2). Here we omit the full expression of I_6, but note that I_6 is independent of I_2. Since I_4=1/4I_2^2, the t_3-flow generated by I_4 is given by ∂ L_G/∂ t_3=1/2I_2[π_𝔟^+(∇ I_2),L_G]=1/2I_2∂ L_G/∂ t_1, which gives (∂/∂ t_3-I_2/2∂/∂ t_1)L_G=0. Then using the shifted coordinates (t_1+ct_3,t_3) with the constant c=I_2/2, L_G is invariant under the t_3-flow. We then consider the L_G which depends only on _G=(t_1,t_5). The t_1-flow of the f-KT hierarchy is then given by ∂ a_i/∂ t_1 =b_i, (i=1,2), ∂ b_1/∂ t_1 =-∑_j=1^2(C_1,ja_j)b_i+b_1,1, ∂ b_2/∂ t_1=-∑_j=1^2 (C_2,ja_j)b_2-3b_1,1, ∂ b_1,1/∂ t_1 =(a_1-a_2)b_1,1+b_2,1, ∂ b_2,1/∂ t_1=-a_1b_2,1+b_3,1, ∂ b_3,1/∂ t_1 =(-3a_1+a_2)b_3,1+b_3,2, ∂ b_3,2/∂ t_1=-a_2b_3,2, where the Cartan matrix (C_i,j) is C=[ 2 -1; -3 2 ]. As in the case of A-type, from a_1,1=a_1 and a_2,2=a_2-a_1, we define the τ-functions as a_i=∂/∂ t_1lnΔ_i=∂/∂ t_1lnτ^G_i (i=1,2), that is, we have τ_1=c_1Δ_1 and τ_2=c_2Δ_2 for some constants c_1,c_2. Then from a_3,3, we have a_3,3=p_1(D̃)Δ_3∘Δ_2/Δ_3Δ_2=∂/∂ t_1lnΔ_3/Δ_2=2a_1-a_2, which gives Δ_3=c'_3(Δ_1)^2=c_3(τ^G_1)^2, where c_3=c'_3c_1^2 is a constant. Recall that Δ_3 is a complete square in the case of B_3-type. Then the τ^G_1 function is a Pfaffian in G_2-case. This implies that the solutions of G_2-type can be obtained by setting t_3=0 in the solution of the B_3-type. Now, from a_4,4=0, we have a_4,4=p_1(D̃)Δ_4∘Δ_3/Δ_4Δ_3=∂/∂ t_1lnΔ_4/Δ_3=0, which gives Δ_4=c'_4Δ_3=c_4(τ^G_1)^2. Similarly, from a_5,5=a_2-2a_1 and a_6,6=a_1-a_2, we have Δ_5=c_5τ^G_2, Δ_6=c_6τ^G_1, for some constants c_5,c_6. One should note that the element a_6,1=b_3,2 can be expressed as a_6,1=a_6,1^01/Δ_2=p_6(D̃)Δ_1∘Δ_5/Δ_1Δ_5. Since Δ_5=c_5Δ_2, we have p_6(D̃)Δ_1∘Δ_5=a_6,1^0c_5Δ_1, which gives p_6(D̃)τ^G_1∘τ^G_2=c'_6τ^G_1, with some constant c'_6. §.§ The ℓ-banded GKT hierarchy We have the following banded structure: (a) If b_3,2=0 (i.e. 4-banded GKT), then we have b_3,1=b_3,1^0Δ_2/Δ_1^3=p_5(D̃)Δ_1∘Δ_4/Δ_1Δ_4. Since Δ_4∝ (Δ_1)^2, we have p_5(D̃)Δ_1∘Δ_4∝Δ_2. (b) If b_3,2=b_3,1=0 (3-banded GKT), then we have b_2,1=b_2,1^01/Δ_1=p_4(D̃)Δ_1∘Δ_3/Δ_1Δ_3. (c) If b_3,2=b_3,1=b_2,1=0 (2-banded GKT), then we have b_1,1=b_1,1^0Δ_1/Δ_2=p_3(D̃)Δ_1∘Δ_2/Δ_1Δ_2. (d) If b_3,2=b_3,1=b_2,1=b_1,1=0 (tridiagonal GKT), then we have b_1=b_1^0Δ_2/Δ_1^2=p_2(D̃)Δ_1∘Δ_1/Δ_1^2, b_2=b_2^0Δ_1^3/Δ_2^2=p_2(D̃)Δ_2∘Δ_2/Δ_2^2. Notice in this case that b_i's can be written in the form, b_i=b_i^0∏_j=1^2(τ^G_j)^-C_i,j, where C_i,j is the Cartan matrix. The τ-functions satisfy p_2(D̃)τ^G_1∘τ^G_1=b_1^0τ^G_2, p_2(D̃)τ^G_2∘τ^G_2=b_2^0(τ^G_1)^3. §.§ Polynomial solutions of G-type The Weyl group 𝔚_G is generated by {s_1^G,s_2^G}. These elements are given by the Bruhat embedding into 𝔖_7, s_1^G=s_1^As_6^As_3^As_4^As_3^A and s_2^G=s_2^As_5^A. Then 𝔚_G is given by 𝔚_G =⟨ s_1^G, s_2^G |  (s_1^G)^2=(s_2^G)^2=(s_1^Gs_2^G)^6=e ⟩, which has 12 elements. We also define y_i^G(ξ)=exp(ξ Y_i) (i=1,2). Now according to (<ref>), for each w_*^G∈𝔚_G, we define ŵ with a reduced expression, ŵ=w_*w_0^-1=s_i_1^G s_i_2^G⋯ s_i_k^G, where w_0∈𝔚_G is the longest element. The corresponding unipotent matrix n_*∈𝒩^- is then defined by n_*(ξ)=Y_i_1(ξ_1) Y_i_2(ξ_2) ⋯ Y_i_k(ξ_k). Then the minors Δ_i(_G) with _G=(t_1,t_5) are computed as Δ_1(_G) =⟨ e_1, 𝒫(_G)n_*(ξ)w_*· e_1⟩, Δ_2(_G) =⟨ e_1∧ e_2, 𝒫(_G)n_*(ξ)w_*· e_1∧ e_2⟩, where 𝒫(_G) is defined by 𝒫(_G)=exp(t_1X+t_5X^5) with X:=X_1+X_2. Now we list the polynomial solutions for w_*∈𝔚_G, each of which is computed from the formula, Δ_i(_G)=⟨ e_1∧⋯∧ e_i, 𝒫_7(_G)w_*· e_1∧⋯∧ e_i⟩ with _G=(t_1,t_5). We list those Δ_i functions in the table below. Each Young diagram λ in the table represents S_λ(_G). w_* τ_1=Δ_1 τ_2=Δ_2 Δ_3∝(τ_1)^2 Δ_4=Δ_3' e 1 1 1 1 s_1^G [1][3] 1 [2][3] [1,1][3] s_2^G 1 [1][3] 1 1 s_2^Gs_1^G [2][3] [1][3] [3,1][3] [2,1,1][3] s_1^Gs_2^G [1][3] [3,1][3] [2][3] [1,1][3] s_1^Gs_2^Gs_1^G [4][3] [3,1][3] [4,3,1][3] [3,2,2,1][3] s_2^Gs_1^Gs_2^G [2][3] [4,2][3] [3,1][3] [2,1,1][3] s_2^Gs_1^Gs_2^Gs_1^G [5][3] [4,2][3] [4,4,2][3] [3,3,2,2][3] s_1^Gs_2^Gs_1^Gs_2^G [4][3] [5,4][3] [4,3,1][3] [3,2,2,1][3] s_1^Gs_2^Gs_1^Gs_2^Gs_1^G [6][3] [5,4][3] [4,4,4][3] [3,3,3,3][3] s_2^Gs_1^Gs_2^Gs_1^Gs_2^G [5][3] [5,5][3] [4,4,4][3] [3,3,3,3][3] s_1^Gs_2^Gs_1^Gs_2^Gs_1^Gs_2^G [6][3] [5,5][3] [4,4,4][3] [3,3,3,3][3] Note here that τ_1 is also the Q-Schur polynomial, i.e. S_(k)=p_k=Q_k, and Δ_3, Δ_4∝ (τ_1)^2. Also recall that Δ_5∝Δ_2' and Δ_6∝Δ_1', where Δ_k' represents the Schur polynomial of the conjugate diagram to that of Δ_k. Since the coordinates for G-type is just t=(t_1,t_5), we have the following relations, S_[3][3]=Q_[2,1][3], S_[4][3]=1/2Q_[3,1][3], S_[5][3]=1/2Q_[3,2][3], S_[6][3]=1/2Q_[3,2,1][3]. We also compute p_6(D̃)Δ_1∘Δ_5, p_5(D̃)Δ_1∘Δ_4, p_4(D̃)Δ_1∘Δ_3 and p_3(D̃)Δ_1∘Δ_2. w_* p_6(D̃) Δ_1∘Δ_5 p_5(D̃)Δ_1∘Δ_4 p_4(D̃)Δ_1∘Δ_3 p_3(D̃)Δ_1∘Δ_2 e 0 0 0 0 s_1^G 0 0 0 0 s_2^G 0 0 0 0 s_1^Gs_2^G 0 [1][3] [2][3] 1 s_2^Gs_1^G 0 0 0 [2][3] s_1^Gs_2^Gs_1^G 0 0 [3,2,2,1][3] [2,2,1][3] s_2^Gs_1^Gs_2^G [1,1][3] [1][3] [2][3] [3,1,1][3] s_1^Gs_2^Gs_1^Gs_2^G [1,1,1,1,1][3] [2,2,2,2,2][3] [3,3,2][3] [3,3,2][3] s_2^Gs_1^Gs_2^Gs_1^G 0 0 [3,2,2,1][3] [4,3,3][3] s_1^Gs_2^Gs_1^Gs_2^Gs_1^G 0 0 0 [4,4,4][3] s_2^Gs_1^Gs_2^Gs_1^Gs_2^G 0 0 [3,3,3,3][3] [4,4,4][3] s_1^Gs_2^Gs_1^Gs_2^Gs_1^Gs_2^G 0 0 0 0 Here note that we have the following relations, S_[2][3]=1/2(Q_[1][2])^2, S_[4,4,4][3]=1/2(Q_[3,2,1][3])^2=1/2(Q_[6][3])^2. Note that if w_* is the longest element of a subgroup generated by s_1^G or s_2^G or both, then these τ-functions give a solution of the tridiagonal KT hierarchy <cit.>. That is, we have the following four cases, {e}, {s_1^G}, {s_2^G} and {s_1^G,s_2^G}. For the case with w_*=s_1^Gs_2^G, these τ-functions give a solution of the 4-banded KT hierarchy (b_3,2=0), and we have p_5(D̃)Δ_1∘Δ_4=b_3,1^0Δ_2. For the cases with w_*=s_1^Gs_2^Gs_1^G, s_2^Gs_1^Gs_2^Gs_1^G and s_2^Gs_1^Gs_2^Gs_1^Gs_2^G, we have a solution of the 3-banded KT hierarchy (b_3,2=b_3,1=0), and p_4(D̃)Δ_1∘Δ_3=b_2,1^0Δ_3. And for the cases of w_*=s_2^Gs_1^G and s_1^Gs_2^Gs_1^Gs_2^Gs_1^G, we have a solution of the 2-banded KT-hierarchy (b_3,2=b_3,1=b_2,1=0), and p_3(D̃)Δ_1∘Δ_2=b_1,1^0(Δ_1)^2. § THE FULL KOSTANT-TODA HIERARCHY Here we derive the formula (<ref>) in Proposition <ref>. It is shown in <cit.> that the f-KT equation can be obtained as a root reduction of the Lax equation for the general matrix L̃, ∂L̃/∂ t=[P̃,L̃], with P̃=1/2((L̃)_>0-(L̃)_<0), where (L̃)_>0 and (L̃)_<0 represent the upper and lower triangular parts of L̃. Define the eigenmatrices Φ̃ and Ψ̃ which satisfy L̃Φ̃=Φ̃Λ, Ψ̃L̃ = ΛΨ̃ with Λ=diag(κ_1,…,κ_M), with the orthogonality relations, Φ̃Ψ̃=Ψ̃Φ̃=I=identity matrix. Writing Φ̃ and Ψ̃ in the form, Φ̃=[ ϕ̃_1(κ_1) ⋯ ϕ̃_1(κ_M); ⋮ ⋱ ⋮; ϕ̃_M(κ_1) ⋯ ϕ̃_M(κ_M) ], Ψ̃=[ ψ̃_1(κ_1) ⋯ ψ̃_M(κ_1); ⋮ ⋱ ⋮; ψ̃_1(κ_M) ⋯ ψ̃_M(κ_M) ]. Then the element ã_i,j in L̃ can be expressed as ã_i,j=⟨κϕ̃_iψ̃_j⟩:=∑_k=1^nκ_kϕ̃_i(κ_k)ψ̃_j(κ_k). The elements in the eigenmatrices are then given by ϕ̃_k(t,κ) =e^1/2θ(t,κ)/√(D_k(t)D_k-1(t))| c_1,1(t) ⋯ c_1,k-1(t) ϕ̃_1^0(κ) ⋮ ⋱ ⋮ ⋮ c_k,1(t) ⋯ c_k,k-1(t) ϕ̃_k^0(κ) |, ψ̃_k(t,κ) =e^1/2θ(t,κ)/√(D_k(t)D_k-1(t))| c_1,1(t) ⋯ c_1,k-1(t) ⋮ ⋱ ⋮ c_k,1(t) ⋯ c_k,k-1(t) ψ̃_1^0(κ) ⋯ ψ̃_k^0(κ) |, where ϕ̃_k^0(κ)=ϕ̃_k(0,κ), ψ̃_k^0(κ)=ψ̃(0,κ), and D_k(t)=det(c_a,b)_1≤ a,b≤ k with c_a,b(t) given by c_a,b(t)=⟨ϕ̃_a^0ψ̃_b^0· e^θ⟩. Here θ(t,κ)=κ t which can be extended to θ(,κ)=∑_m=1^∞κ^m t_m for the hierarchy. For the f-KT equation (non-normalized form), the eigenmatrix Φ can be written in the form, ϕ̃_k(t,κ)=ϕ̃_1^0(κ)e^1/2θ(t,κ)/√(D_k(t)D_k-1(t))| ĉ_1,1(t) ⋯ ĉ_1,k-1(t) 1 ĉ_2,1(t) ⋯ ĉ_2,k-1(t) κ ⋮ ⋱ ⋮ ⋮ ĉ_k,1(t) ⋯ ĉ_k,k-1(t) κ^k-1| with ĉ_i,j=⟨κ^i-1ϕ̃_1^0ψ̃_j^0e^θ⟩. Here we have assumed the initial matrix L^0 to be L^0=[ ã^0_1,1 1 0 ⋯ 0; ã^0_2,1 ã^0_2,2 1 ⋯ 0; ⋮ ⋮ ⋱ ⋱ ⋮; ã^0_M-1,1 ã^0_M-1,2 ⋯ ⋱ 1; ã^0_M,1 ã^0_M,2 ⋯ ⋯ ã^0_M,M ], that is, a^0_i,i+1=1 for all i=1,…,M-1. Then the determinant D_k(t) can be expressed by D_k(t)=det(⟨κ^a-1ϕ̃_a^0ψ̃_b e^θ⟩)_1≤ a,b≤ k. Since θ=κ t, we note that D_k(t) can be given by the Wronskian, D_k(t)=Wr(f_1(t), f_2(t),…,f_k(t)) with f_j(t)=⟨ϕ̃^0_1ψ̃_j^0 e^θ⟩. That is, D_k(t) is nothing but the τ_k-function in (<ref>), and we now use the multiple time =(t_1,t_2,…) to study the f-KT hierarchy. Now we note that ϕ̃_k(,κ) can be expresses as ϕ̃_k(,κ) =κ^k-1ϕ̃_1^0(κ) e^1/2θ(,κ)/τ_k()τ_k-1()| f_1() ⋯ f_k-1() 1/κ^k-1 ∂ f_1() ⋯ ∂ f_k-1() 1/κ^k-2 ⋮ ⋱ ⋮ ⋮ ∂^k-1f_1() ⋯ ∂^k-1f_k-1() 1 | =κ^k-1ϕ̃_1^0(κ) e^1/2θ(,κ)/τ_k()τ_k-1()| f_1()-1/κ∂ f_1() ⋯ f_k-1()-1/κ∂ f_k-1() ∂ f_1()-1/κ∂^2 f_1() ⋯ ∂ f_k-1()-1/κ∂^2f_k-1() ⋮ ⋱ ⋮ ∂^k-2f_1()-1/κ∂^k-1f_1() ⋯ ∂^k-2f_k-1()-1/κ∂^k-1f_k-1() |, where ∂^j f_i()=∂^j/∂ t_1^jf_i(). Noting exp(-∑_ik^i/iκ^i)=1-k/κ, we find f_i()-1/κ∂ f_i()=f(-[1/κ]), where -[1/κ]=(t_1-1/κ,  t_2-1/2κ^2,  t_3-1/3κ^3, …,). Then we have ϕ̃_k(,κ) =κ^k-1ϕ̃_1^0(κ) e^1/2θ(,κ)/τ_k()τ_k-1()τ_k-1(-[1/κ]) =κ^k-1ϕ̃_1^0(κ) e^1/2θ(,κ)/τ_k()τ_k-1() e^-∑1/nκ^n∂_nτ_k-1() =κ^k-1ϕ̃_1^0(κ) e^1/2θ(,κ)/τ_k()τ_k-1()∑_j=0^k-11/κ^np_j(-∂̃)τ_k-1(). Here we have used the relation p_j(-∂̃)τ_k-1()=0 for j≥ k. We also write the eigenfunction ψ̃_k in the form, ψ̃_j(,κ)=e^1/2θ(,κ)/√(τ_j()τ_j-1())| f_1() ⋯ f_j() ∂_1 f_1() ⋯ ∂_1 f_j() ⋮ ⋱ ⋮ ∂_1^j-2f_1() ⋯ ∂_1^j-2f_j() ψ̃_1^0(κ) ⋯ ψ̃_j^0(κ) |. In the computation of ⟨κϕ̃_iψ̃_j⟩, we have ⟨κϕ̃_iψ̃_k^0e^1/2θ⟩=1/√(τ_i()τ_i-1())∑_n=0p_n(-∂̃)τ_i-1()⟨κ^i-nϕ̃_i^0ψ̃_k^0e^θ⟩, where ⟨κ^i-nϕ̃_i^0ψ̃_k^0e^θ⟩=∂_1^i-nf_k(). We also note that | f_1() ⋯ f_j() ∂_1 f_1() ⋯ ∂_1 f_j() ⋮ ⋱ ⋮ ∂_1^j-2f_1() ⋯ ∂_1^j-2f_j() ∂_1^i-nf_1() ⋯ ∂_1^i-nf_j() |=p_i-M-j+1(∂̃)τ_j(). Thus, we have ã_i,j=⟨κϕ̃_iψ̃_j⟩=1/√(τ_i()τ_j()τ_i-1()τ_j-1())∑_n=0^i-1p_n(-∂̃)τ_i-1()× p_i-M-j+1(∂̃)τ_j(). Using the identity, p_n(D̃)τ_α∘τ_β=∑_i+j=np_i(∂̃)τ_α× p_j(-∂̃)τ_β, the element ã_i,j of the Lax matrix is expressed by ã_i,j=1/√(τ_i()τ_j()τ_i-1()τ_j-1())p_i-j+1(D̃)τ_j∘τ_i-1. The Lax matrix L of the f-KT equation is given by L=HL̃ H^-1 with H=diag(1,ã_1,2, ã_1,2a_2,3,…,a_1,2⋯ a_M-1,M). Each entry a_i,j is then expressed by a_i,j=ã_i,jã_j,j+1⋯ã_i-1,i for i>j. Using (<ref>), we first note ã_i,i+1=√(τ_i+1()τ_i-1())/τ_i(). Then we obtain a_i,j()=p_i-j+1(D̃)τ_j∘τ_i-1/τ_jτ_i-1 for 1≤ j≤ i≤ M. § THE Q-SCHUR FUNCTIONS The Q-Schur functions are defined as follows. First define the elementary Schur functions on the odd times, _B=(t_1,t_3,t_5,…), by e^θ̂(_B,k)=∑_r=0^∞ q_r(_B)k^r with θ̂(_B,k)=∑_n=oddt_nk^n. Note here that we take t_n in the exponent θ̂(_B,k) instead of 2t_n which is normally used in <cit.>, and then the function q_r(_B) is given by q_r(_B)=p_r(t_1,0,t_3,0,t_5,0,…). With those q_r(_B) functions, define Q_j,i(_B)=q_j(_B)q_i(_B)+2∑_l=1^i(-1)^lq_j+l(_B)q_i-l(_B), with Q_k,0=q_k. Note that this function is skew-symmetric Q_i,j=-Q_j,i (c.f. <cit.>). Then the Q-Schur function for a strict partition, λ=(λ_1>λ_2>⋯>λ_2n≥ 0), is defined by the Pfaffian, Q_λ(_B): =Pf(Q_λ_j,λ_i(_B))_1≤ i<j≤ 2n =∑sgn(i_1,i_2,…,i_2n) Q_λ_i_1,λ_i_2(_B) Q_λ_i_3,λ_i_4(_B) ⋯ Q_λ_i_2n-1,λ_i_2n(_B). For example, if λ=(3,2,1,0), then Q_3,2,1,0=Q_3,2Q_1,0-Q_3,1Q_2,0+Q_3,0Q_2,1. With the Young diagrams, this is also expressed as Q_[3,2,1][3]=Q_[3,2][3]Q_[1][3]-Q_[3,1][3]Q_[2][3]+Q_[3][3]Q_[2,1][3]. amsalpha
http://arxiv.org/abs/2303.07132v1
20230313140228
On Higher Dimensional Milnor Frames
[ "Hayden Hunter" ]
math.DG
[ "math.DG" ]
A diffuse interface approach for vector-valued PDEs on surfaces [ March 30, 2023 =============================================================== A classic result of Milnor shows that any 3-dimensional unimodular metric Lie algebra admits an orthonormal frame with at most three non-zero structure constants. We refer to these frames as Milnor frames. We define extensions of Milnor frames into higher dimensions. We determine that the higher dimensional analogue of Milnor's result can only hold on the 3-dimensional Heisenberg Lie algebra directly summed with an abelian Lie algebra. § INTRODUCTION Given a Lie Group G and a metric g on G, we say that g is left-invariant if, for any p ∈ G, the diffeomorphism L_p: G → G, q ↦ pq is an isometry with respect to the metric g. A vector field X on G is said to be left-invariant if dL_p(X) = X for any p ∈ G. By placing an inner product structure on the tangent plane at the identity, T_eG, we can extend this inner product to a left-invariant metric on G (See for example Chapter 1 Section 2 in <cit.>). The collection of left-invariant metrics on G are in one-to-one correspondence with inner product structures on T_eG. Thus given a left-invariant metric on a Lie Group G, we only need to look at the inner product structure of its associated Lie algebra. With this in mind, whenever a Lie Group G is equipped with a left-invariant metric g, we may call the Lie algebra (𝔤,g) associated to the Lie Group a metric Lie algebra with respect to the metric g. When it is obvious which left-invariant metric we are referring to, we say that 𝔤 is a metric Lie algebra. When G is equipped with the Levi-Civita connection, the curvature is dependent on the structure constants induced by a Lie bracket [ , ] ∈∧^2 𝔤^* ⊗𝔤 (See sections 5 and 6 in <cit.>). Thus if a metric Lie algebra has few non-trivial structure constants, determining curvature requires fewer computations. For example, Milnor <cit.> determined that any 3-dimensional unimodular metric Lie algebra admits an orthonormal frame with at most 3 non-zero structure constants. Moreover, these orthonormal frames diagonalize the Ricci-tensor. For higher dimensional metric Lie algebras, Hashinaga, Tamaru, and Terada <cit.> introduced a procedure that allows us to find an orthonormal frame with relatively few structure constants. Finding such a frame will reduce the amount of computation it takes to determine curvature. Let 𝔤 be a three-dimensional metric Lie algebra with metric g and an orientation. For two linearly independent vectors X,Y ∈𝔤, denote the cross product X ∧ Y to be the unique vector orthogonal to X and Y such that {X,Y, X ∧ Y} is a positively oriented frame and ||X ∧ Y||^2 := g(X∧ Y, X∧ Y) = g(X,X)g(Y,Y) - g(X,Y)^2. If X and Y are not linearly independent then we say that X ∧ Y = 0. By the universal property of wedge products there exists a linear operator L: 𝔤→𝔤 for which the diagram 𝔤 ×𝔤 [r, "×"] [rd,"[ , ]"] 𝔤 [d, "L"] 𝔤 commutes. Moreover 𝔤 is unimodular if and only if L is self-adjoint <cit.>. It is well-known that a self-adjoint linear operator admits an orthonormal frame of eigenvectors. Thus there is an orthonormal frame {X_1, X_2,X_3} and real numbers λ_1, λ_2,λ_3 ∈ R such that [X_1,X_2] = λ_3X_3, [X_2,X_3] = λ_1X_1, [X_3,X_1] = λ_3X_3. Let σ = (1 2 3) ∈ S_3 where S_3 is the permutation group acting on 3 elements. We can rewrite the bracket identity so that for any i ∈{1,2,3}, [X_i, X_σ(i)] = λ_σ^2(i) X_σ^2(i). Let 𝔤 be a Lie algebra with a frame {X_1, X_2,X_3}. If there exists λ_1,λ_2,λ_3 ∈ R such that the bracket relation [X_i,X_σ(i)] = λ_σ^2(i) X_σ^2(i) holds for any 1 ≤ i ≤ 3, then {X_1,X_2,X_3} is called a Milnor frame. Using the permutation σ = (1 … n) we can extend this notion to higher dimensions. Let 𝔤 be a Lie algebra of dimension n and σ = (1 … n) ∈ S_n where S_n is the permutation group acting on n elements. A frame, {X_1, …, X_n}, is a Milnor frame if for all i,j ∈{1, …, n}, there exist λ_1, …, λ_n ∈ R such that [X_i,X_j] = λ_σ^2(i)X_σ^2(i) σ(i) = j -λ_σ^2(j)X_σ^2(j) σ(j) = i 0 otherwise An example of a Lie algebra with a Milnor frame of dimension n ≥ 4 is the Lie algebra, 𝔥^3, associated to the 3-dimensional Heisenberg Group directly summed with an abelian Lie algebra, 𝔞, of dimension n ≥ 1. For a less trivial example let 𝔥^4 be the 4-dimensional Lie algebra with a frame {X_1,X_2,X_3,X_4} whose bracket relations are generated by [X_1,X_2] = X_3 [X_2,X_3] = X_4. As we shall show in section <ref>, 𝔥^4 is a 3-step nilpotent Lie algebra and is thus not isomorphic to the direct sum of the 3-dimensional Heisenberg Lie algebra and an abelian Lie algebra. It turns out that any Lie algebra with a Milnor frame is completely determined by these two types of Lie algebras: For any Lie algebra 𝔤 of dimension n ≥ 4 with a Milnor frame, 𝔤≅ (⊕𝔥^3) ⊕ (⊕𝔥^4) ⊕𝔞 where 𝔥^3 is the Lie algebra of the Heisenberg Group, 𝔥^4 is a Lie algebra with a Milnor frame and two non-trivial structure constants, and 𝔞 is an abelian Lie Alebra. Moreover, these Lie algebras are at most 3-step nilpotent. A Corollary of Theorem <ref> shows that any n-dimensional, n ≥ 4, Lie algebra with a Milnor frame admits a Milnor frame whose structure constants are either 0 or 1. By a result of Malcev <cit.>, the simply connected Lie group associated to such a Lie algebra has compact quotient. If a metric Lie algebra has a Milnor frame that is also orthonormal, then we obtain some “nice” geometric properties. For example, given an n-dimensional nilpotent metric Lie algebra (𝔤,g) with an orthonormal frame {X_1, …, X_n}, Theorem 1.1 of <cit.> determines an algebraic constraint for when {X_1, …, X_n} is Ricci diagonalizable. If a metric Lie algebra (𝔤,g) has an orthonormal Milnor frame {X_1, …, X_n}, by Theorem <ref> and Theorem 1.1 of <cit.>, {X_1, …, X_n} diagonalizes the Ricci tensor. For example consider the Lie algebra 𝔥^3 ⊕𝔞 with 𝔞 being a finite dimensional Lie algebra. Corollary 5.3 of <cit.> shows that 𝔥^3 has one metric up to scaling and automorphism. Thus any Lie algebra with a Milnor frame which is isomorphic to 𝔥^3 ⊕𝔞, 𝔞 abelian, must have an orthonormal Milnor frame. This raises the question: Given a Lie algebra 𝔤 that admits Milnor frame and a metric g on 𝔤, is it possible to always find an orthonormal Milnor frame? Surprisingly, we find that this is not necessarily true. For any non-abelian Lie algebra 𝔤 as in Theorem <ref> which is not isomorphic to 𝔥^3 ⊕𝔞 where 𝔞 is an abelian Lie algebra, there exists a metric g on 𝔤 such that (𝔤, g) does not admit an orthonormal Milnor frame. The paper will be divided into two sections. In Section <ref>, we discuss how the algebraic structure of Milnor frames can be interpreted as directed graphs. In Section <ref>, we discuss the geometric properties of metric Lie algebras with Milnor frames. We shall show that a metric Lie algebra with an orthonormal Milnor frame has a diagonalizable Ricci tensor. Additionally we discuss which metrics on a metric Lie algebra with a Milnor frame are Ricci nilsolitons. Finally, we consider metric Lie algebras with a Milnor frame and determine necessary conditions for the Lie algebra to admit an orthonormal Milnor frame. We conclude with a proof of Theorem <ref>. § ACKNOWLEDGMENTS This paper is supported by the National Science Foundation (NSF-2104662). I would like to thank Dr. Luca Di Cerbo, my committee, peers, and those who attended my first talk in the Topology and Dynamics seminar for giving valuable feedback. § ALGEBRAIC PROPERTIES OF MILNOR FRAMES §.§ Extending Three Dimensional Milnor Frames Recall that a 3-dimensional unimodular Lie algebra admits a frame {X_1,X_2,X_3} and structure constants λ_1,λ_2,λ_3 ∈ R where [X_1,X_2] = λ_3X_3, [X_2,X_3] = λ_1X_1, [X_3,X_1] = λ_2X_2. If σ = (1 2 3) ∈ S_3 where S_3 is the group of permutations acting on 3 elements, then for any i [X_i,X_σ(i)] = λ_σ^2(i) X_σ^2(i). The goals of this section will be to construct an algebraic extension using the element σ_n = (1 … n) of the permutation group acting on n elements, S_n, and to determine the algebraic properties of this extension. Let 𝔤 be a Lie algebra of dimension n and σ = (1 … n) ∈ S_n where S_n is the permutation group acting on n elements. A frame, {X_1, …, X_n}, is a Milnor frame if for all i,j ∈{1, …, n}, there exist λ_1, …, λ_n ∈ R such that [X_i,X_j] = λ_σ^2(i)X_σ^2(i) σ(i) = j -λ_σ^2(j)X_σ^2(j) σ(j) = i 0 otherwise. The terms λ_1, …, λ_n ∈ R are referred to as the structure constants relative to the Milnor frame {X_1, …, X_n}. We may represent the Lie bracket between two elements of a Milnor frame is in the following way: let δ_ij be 1 if i = j and 0 if i ≠ j. For a Milnor frame {X_1, …, X_n} with structure constants λ_1, …, λ_n ∈ R and i,j ∈{1, …, n} [X_i,X_j] = δ_σ(i)jλ_σ^2(i)X_σ^2(i) - δ_iσ(j)λ_σ(i)X_σ(i). If we let E_ij denote the matrix whose only nonzero coefficient is 1 at the entry (i,j), then for a Milnor frame {X_1, …, X_n} with structure constants {λ_1, …, λ_n}, _X_i = λ_σ^2(i)E_σ^2(i)σ(i) - λ_σ(i)E_σ(i)σ^-1(i). Knowing these other representations can simplify future computations. For the remainder of the paper, E_ij will denote the n× n matrix whose entry at (i,j) is 1 with all other entries trivial. §.§ Examples: 𝔥^3 and 𝔥^4 We start with the classic example of a nilpotent Lie algebra with a Milnor frame. The 3-dimensional Heisenberg group is a subgroup of M_3( R) whose elements are of the form ℋ = {[ 1 a b; 0 1 c; 0 0 1 ]| a,b,c ∈ R}. The Lie algebra of ℋ is 𝔥^3 = {[ 0 a b; 0 0 c; 0 0 0 ]| a,b,c ∈ R}. Consider the frame X_1 := E_12, X_2:=E_13 and X_3:= E_23. We obtain the bracket relations [X_1,X_2] = X_3 and all other bracket relations trivial. If 𝔞 is an abelian Lie algebra of dimension n ≥ 1, then 𝔥^3 ⊕𝔞 forms an n+3-dimensional Lie algebra with a Milnor frame. Note that 𝔥^3 is 2-step nilpotent as shown below: _X_1 = 0 _X_2 = -E_31 ^2_X_2 = E_31^2 = 0 _X_3= 0. This observation will allow us to show that 𝔥^4≇𝔥^3 ⊕𝔞. Let 𝔥^4 be the 4-dimensional Lie algebra with a frame {X_1, X_2, X_3, X_4} and bracket relations [X_1,X_2] = X_3, [X_2,X_3] = X_4. This Lie algebra is 3-step nilpotent as shown below: _X_1 = E_32 ^2_X_1 = E_32^2 = 0 _X_2 = E_43 - E_31 _X_2^2 = E_43^2 - E_43E_31 - E_13E_43 + E_13^2 = E_41 _X_2^3 = E_41(E_43-E_31) = 0 _X_3 = -E_42 _X_3 = E_42^2 = 0 _X_4 = 0. Because every 2-dimensional Lie algebra is either abelian or non-nilpotent, 𝔥^4 cannot be split into two 2-dimensional Lie algebras. As shown in example <ref>, the Lie algebra 𝔥^3 is at most 2-step nilpotent and so 𝔥^4 is not isomorphic to 𝔥^3 ⊕𝔞 with 𝔞 an abelian Lie algebra of dimension 1. Set F_1 = X_4, F_2 = X_3, F_3 = X_1 and F_4 = X_2. The non-trivial structure constants with respect to the frame {F_1,…, F_4} are C_2,4^1 = -1, C_3,4^2 = 1. By Lemma 3 of <cit.>, 𝔥^4 is the unique 3-step Nilpotent Lie algebra of dimension 4. §.§ Algebraic Properties of Lie Algebras with Milnor Frames Given a Lie algebra of dimension n ≥ 4 with a Milnor frame the upper bound for the total number of non-zero structure constants is at most n. The next proposition shows that this upper bound cannot be achieved. Let 𝔤 be an n^th dimensional Lie algebra, n ≥ 4, with a Milnor frame {X_1, …, X_n} and structure constants λ_1, …, λ_n. Then λ_iλ_σ^2(i) = 0 for any i ∈{1, …, n}. For any i ∈{1, …, n}, [X_σ^3(i), [X_i,X_σ(i)]] = λ_σ^2(i)[X_σ^3(i), X_σ^2(i)] = λ_σ^2(i)λ_σ^4(i)X_σ^4(i) [X_i,[X_σ(i),X_σ^3(i)]] = [X_i,0] = 0 [X_σ(i),[X_σ^3(i),X_i]] = [X_σ(i), 0] = 0 n > 4 λ_σ(i)[X_σ(i),X_σ(i)] = 0 n = 4 By the Jacobi Identity 0 = [X_σ^3(i),[X_i,X_σ(i)]] + [X_i,[X_σ(i),X_σ^3(i)]] + [X_σ(i),[X_σ^3(i),X_i]] = λ_σ^2(i)λ_σ^4(i). Considering that i was arbitrary, we obtain the desired identity. The next subsection provides combinatorial argument that gives us a strict upper bound. §.§ Milnor Graphs Let λ := (λ_1, …, λ_n) ∈ R^n such that λ_iλ_σ^2(i) = 0. Let V = {v_1, …, v_n} and E = {{v_i,v_σ^2(i)}}_i. Note that for each e ∈ E, e ∩ V has a vertex v_i such that λ_i = 0. We call this graph a Milnor graph. We will show later that there exists a one-to-one correspondence with Milnor graphs and Lie algebras with Milnor frames. Let A ⊂ V such that for any v_i ∈ A, λ_i =0 and let B = V ∖ A. For each v_i ∈ B, define the function f: B → A as v_i ↦ v_σ^2(i). This map is well defined and injective so that |B| ≤ |A|. Thus 2|B| ≤ |B| + |A| = |V| = n B ≤n/2. Because B is an integer, B ≤⌊ n/2 ⌋. The bound is attained whenever 4 | n. Let 𝔤 be a Lie algebra with a Milnor frame and let 𝒢 = (V,E) be the associated Milnor graph. Observe that there are two disjoint cycles (v_1,v_3, …, v_1) and (v_2,v_4, …, v_2). Suppose that λ_1, λ_2 ≠ 0. If B ⊂ V is the set of all vertices v_i such that λ_i ≠ 0, then we may place λ_1, λ_2 ∈ B, λ_3,λ_4 ∈ V∖ B, and so on. Because 4 | n we will obtain |A| = |B| and so by a previous observation, |B| = n/2 = 4k/2 = 2k for some k ∈ Z. As shown previously, Milnor graphs can determine an upper bound on the total number of non-trivial structure constants. We obtain more applications of Milnor graphs if we direct the edges in a natural way. Let 𝔤 be a Lie algebra with a Milnor frame whose structure constants are λ_1, …, λ_n ∈ R. Define the directed graph 𝒢 = (V,E) with vertices V = {v_1, …, v_n} and edges E = {(v_i,v_σ^2(i)) 1 ≤ i ≤ n}. We call 𝒢 the directed Milnor graph with respect to the structure constants λ_1, …, λ_n. The definition above shows that we may construct a graph which represents a Lie algebra with a Milnor frame. A consequence of Theorem <ref> is that each Lie algebra of dimension n ≥ 4 with a Milnor frame has a Milnor frame whose structure constants are either 0 or 1. This observation along with the next proposition will show that there is a one-to-one correspondence between Lie algebras with Milnor frames and their associated Milnor graphs. Let 𝒢 = (V,E) with vertices V = {v_1, …, v_n} and edges E = {(v_i,v_σ^2(i)) 1 ≤ i ≤ n)}. Suppose A ⊂ V such that ∀ e ∈ E, if e = (v_i,v_σ^2(i)) then v_i or v_σ^2(i) is in A. Define λ_i = 1 v_i ∉A 0 v_i ∈ A. so that λ_iλ_σ^2(i) = 0. We may define an algebra with bracket relations [X_i,X_σ(i)] = λ_σ^2(i)X_σ^2(i) with X_1, …, X_n linearly independent and all other bracket relations trivial. The Lie algebra formed by the span of {X_1, …, X_n} defined through the bracket relation aforementioned forms a Lie algebra. Bilinearity and anti-symmetry of the bracket is already given. To show that this algebra is a Lie algebra, we shall show that for any two elements X_i,X_j of the frame {X_1,…, X_n} the identity _[X_i,X_j] = _X_i_X_j - _X_j_X_i holds. Observe _[X_i,X_j] = δ_σ(i)jλ_σ^2(i)_X_σ^2(i) - δ_σ(j)i λ_σ^2(j)_X_σ^2(j) =δ_σ(i)j λ_σ^2(i)(λ_σ^4(i)E_σ^4(i)σ^2(i) - λ_σ^3(i) E_σ^3(i)σ(i)) -δ_σ(j)iλ_σ^2(j)(λ_σ^4(j)E_σ^4(j)σ^2(j) - λ_σ^3(j) E_σ^3(j)σ(j)) =δ_σ(i)j λ_σ^2(i)λ_σ^4(i)E_σ^4(i)σ^2(i) - δ_σ(i)jλ_σ^2(i)λ_σ^3(i) E_σ^3(i)σ(i) -δ_σ(j)iλ_σ^2(j)λ_σ^4(j)E_σ^4(j)σ^2(j) + δ_σ(j)iλ_σ^2(j)λ_σ^3(j) E_σ^3(j)σ(j) = -δ_σ(i)jλ_σ^2(i)λ_σ^3(i)E_σ^3(i)σ(i) + δ_σ(j)iλ_σ^2(j)λ_σ^3(j)E_σ^3(j)σ(j) where equality of the last two terms follows from λ_kλ_σ^2(k) = 0 for any k. Computing _X_i_X_j we find _X_i_X_j = (λ_σ^2(i)E_σ^2(i)σ(i) - λ_σ(i)E_σ(i)σ^-1(i))(λ_σ^2(j)E_σ^2(j)σ(j) - λ_σ(j)E_σ(j)σ^-1(j)) =λ_σ^2(i)λ_σ^2(j)δ_iσ(j)E_σ^2(i)σ(j) - λ_σ(i)λ_σ^2(j)δ_iσ^3(j)E_σ(i)σ(j) -λ_σ^2(i)λ_σ(j)δ_ijE_σ^2(i)σ^-1(j) + λ_σ(i)λ_σ(j)δ_iσ^2(j)E_σ(i)σ^-1(j) =λ_σ^2(i)λ_σ^2(j)δ_iσ(j)E_σ^2(i)σ(j) - λ_σ^2(i)λ_σ(j)δ_ij E_σ^2(i)σ^-1(j) where the last equality holds by δ_iσ^3(j)λ_σ(i)λ_σ^2(j) = 0 i ≠σ^3(j) λ_σ^4(j)λ_σ^2(j) = 0 i = σ^3(j) δ_iσ^2(j)λ_σ(i)λ_σ(j) = 0 i ≠σ^2(j) λ_σ^3(j)λ_σ(j) = 0 i = σ^2(j). Thus we have the following: _X_i_X_j - _X_j_X_i =λ_σ^2(i)λ_σ^2(j)δ_iσ(j)E_σ^2(i)σ(j) - λ_σ^2(i)λ_σ(j)δ_ij E_σ^2(i)σ^-1(j) - λ_σ^2(j)λ_σ^2(i)δ_σ(i)jE_σ^2(j)σ(i) + λ_σ^2(j)λ_σ(i)δ_ji E_σ^2(j)σ^-1(i) = λ_σ^2(i)λ_σ^2(j)δ_iσ(j)E_σ^2(i)σ(j) - λ_σ^2(j)λ_σ^2(i)δ_σ(i)jE_σ^2(j)σ(i) = λ_σ^3(j)λ_σ^2(j)δ_i σ(j)E_σ^3(j)σ(j) - λ_σ^3(j)λ_σ^2(i)δ_σ(i)j E_σ^3(i)σ(i) = -δ_σ(i)jλ_σ^2(i)λ_σ^3(i)E_σ^3(i)σ(i) + δ_σ(j)iλ_σ^2(j)λ_σ^3(j)E_σ^3(j)σ(j) = _[X_i,X_j]. Now that we have an association between directed Milnor graphs and Lie algebras with Milnor frames we may more easily construct examples of Lie algebras with Milnor frames. Suppose we have two directed Milnor graphs 𝒢 = ({v_1,…, v_n} = V = A ∪ B,E) and 𝒢' = ({v_1', …, v_n'} = V' = A' ∪ B',E') where E ∩ A, E' ∩ A' ≠∅. Additionally suppose that v_1,v_2 ∈ A and w_1,w_2 ∈ A'. Define 𝒢_1#𝒢_2 = (V ∪ V', F) to be the graph obtained by deleting the edges (v_n-1, v_1), (v_n, v_2), (w_n-1,w_1), (w_n, w_2) and forming the edges (v_n-1, w_1), (v_n, w_2), (w_m-1, v_1), (w_m, v_2). Through relabeling we let {u_1 = v_1, …, u_n = v_n, u_n+1 = w_1, u_n+m = w_m} = V ∪ V' where one can see F = {(u_i,u_σ^2(i)) 1 ≤ i ≤ (n+m)}. Furthermore for any f ∈ F, there exists u_i ∈ A ∪ A' such that f is (u_i,u_σ^2(i)) or (u_σ^-2(i), u_i) so that 𝒢#𝒢' is a directed Milnor graph. It turns out if 𝒢 is associated to the Lie algebra 𝔤 and 𝒢' is associated to the Lie algebra 𝔤', then 𝒢' #𝒢 is associated to the direct sum 𝔤⊕𝔤'. Let X_1, …, X_n be the Milnor frame constructed from the directed Milnor graph 𝒢 with structure constants {λ_1, …, λ_n} and {Y_1, …, Y_m} be the Milnor frame constructed from the directed Milnor graph 𝒢' with structure constants {η_1, …, η_m}. Define W_i = (X_i,0) for 1 ≤ i ≤ n and W_n +j = (0,Y_j) for 1 ≤ j ≤ m. We claim that {W_k 1 ≤ k ≤ n+m} forms a Milnor frame. For 1 ≤ k ≤ n-2, and 1 ≤ℓ≤ m-2, _W_k = _X_k ⊕0 = (λ_σ^2(k)(E_σ^2(k)σ(k))_n×n - λ_σ(k)(E_σ(k)σ^-1(k))_n×n) ⊕0 = λ_σ^2(k)(E_σ^2(k)σ(k))_(n+m)×(n+m) - λ_σ(k)(E_σ(k)σ^-1(k))_(n+m) ×(n+m) _W_n+ ℓ = 0 ⊕_Y_ℓ =0 ⊕(η_σ^2(ℓ)(E_σ^2(ℓ)σ(ℓ))_n×n - η_σ(ℓ)(E_σ(ℓ)σ^-1(ℓ))_n×n) = η_σ^2(k)(E_σ^2(n + ℓ)σ(n+ℓ))_(n+m)×(n+m) - η_σ(k)(E_σ(n+ ℓ)σ^-1(n+ℓ))_(n+m) ×(n+m). Finally _W_n-1 = _W_n = _W_n+m-1 = _W_n+m = 0. And so 𝒢#𝒢' corresponds to 𝔤⊕𝔤'. Given a Milnor graph 𝒢 one may consider reversing the above process to obtain two Milnor graphs 𝒢_1,𝒢_2 such that 𝒢_1 #𝒢_2 = 𝒢. This suggests that any Lie algebra with a Milnor frame splits into lower-dimensional Lie algebras with Milnor frames as stated in Theorem <ref>. Before we prove Theorem <ref> we prove the following lemmas. Let 𝔤 be a 3 dimensional Lie algebra with a Milnor frame with structure constants λ_i = λ_j = 0 and λ_k ≠ 0 for {i,j,k} = {1,2,3}. Then 𝔤≅𝔥^3 If 𝔤 is defined through the bracket relation [X_i,X_j] = λ_k X_k then by setting Y_1 = X_i, Y_2 = X_j and Y_3 = X_k, we obtain [Y_1,Y_2] = λ_3Y_3. By scaling Y_3 to λ_3Y_3, {Y_1, Y_2, λ_3Y_3} forms a Milnor frame. This shows that 𝔤≅𝔥^3. Let 𝔤 be a 4-dimensional Lie algebra with a Milnor frame with structure constants λ_i = λ_j = 0 and λ_k,λ_ℓ≠ 0 for {i,j,k,ℓ} = {1,2,3,4}. Then 𝔤≅𝔥^4. Because {X_1,X_2,X_3,X_4} is a Milnor frame, λ_kλ_ℓ≠ 0 implies that σ(ℓ) = k or σ(k) = ℓ. Without loss of generality, assume our bracket relations are defined as [X_i,X_j] = λ_kX_k [X_j,X_k] = λ_ℓ X_ℓ By relabeling and rescaling we obtain that {X_i = Y_1, X_j = Y_2, λ_kX_k = Y_3, λ_kλ_ℓ X_ℓ = Y_ℓ} forms a Milnor frame. This gives the relation 𝔤≅𝔥^4. If 𝔤 is abelian then we are done. Suppose otherwise and let ℐ⊂{1,…, n} such that λ_i ≠ 0 and λ_σ^-1(i) = 0. If i ∈{1, …, n} such that λ_i,λ_σ^-1(i)≠ 0 then λ_σ^-2(i) = 0 and so σ^-1(i) ∈ℐ. Thus ℐ≠∅. Consider the adjoint operators of X_σ^-2(i), X_σ^-1(i), X_i, and X_σ(i): _X_σ^-2(i) = λ_iE_iσ^-1(i) - λ_σ^-1(i)E_σ^-1(i)σ^-3(i) = λ_iE_iσ^-1(i) _X_σ^-1(i) = λ_σ(i)E_σ(i)i - λ_iE_iσ^-2(i) _X_i = λ_σ^2(i)E_σ^2(i)σ(i) - λ_σ(i) E_σ(i)σ^-1(i) = -λ_σ(i) E_σ(i)σ^-1(i) _X_σ(i) = λ_σ^3(i)E_σ^3(i)σ^2(i) - λ_σ^2(i) E_σ^2(i)i = λ_σ^3(i)E_σ^3(i)σ^2(i) If λ_σ(i) = 0 then ∀ X ∈Span{X_σ^-2(i), X_σ^-1(i), X_i}=:𝔥_i^3, _X(𝔥_i^3) ⊂𝔥_i^3) so that 𝔥_i^3 is a sub-algebra. If λ_σ(i)≠ 0 then λ_σ^3(i) = 0 and so _X_σ(i) = 0. Thus ∀ X ∈SpanX_σ^-2(i), X_σ^-1(i), X_i, X_σ(i)=:𝔥_i^4, _X(𝔥_i^4) ⊂𝔥_i^4 making 𝔥_i^4 a subalgebra. Now we proceed by induction on the dimension of the Lie algebra. Assume that any Lie algebra of dimension k < n with a Milnor frame splits as stated in the theorem. Let {X_1, …, X_n}, n ≥ 4, be a Milnor frame for the non-abelian Lie algebra 𝔤. Noting that the operator S_k: 𝔤→𝔤, defined by c^iX_i ↦ c^i X_σ^k(i), takes Milnor frames to Milnor frames we may suppose without loss of generality that λ_3 ≠ 0. We have two cases: either λ_4 = 0 or λ_4 ≠ 0. Suppose λ_4 = 0. We show that Span{X_i}_i ∉{1,2,3} forms a subalgebra. Because _X_i = λ_σ^2(i)E_σ^2(i)σ(i) - λ_σ(i)E_σ(i)σ^-1(i) we only need to consider the collection of i ∉{1,2,3} such that σ(i),σ^2(i) ∈{1,2,3}. Because σ(i) = 3 i = 2 and σ^2(i) = 3 i = 1, it must be the case that σ(i), σ^2(i) ∈{1,2}. Because λ_1 = 0 = λ_2, for any i such that σ(i),σ^2(i) ∈{1,2,3} _X_i = λ_σ^2(i)E_σ^2(i)σ(i) - λ_σ(i)E_σ(i)σ^-1(i) = 0 . This shows that Span{X_i}_i ∉{1,2,3} forms a subalgebra. Suppose that λ_4 ≠ 0. We only need to consider the collection of i ∉{1,2,3,4} such that σ(i), σ^2(i) ∈{1,2,3,4}. If σ(i), σ^2(i) = 4, then i ∈{2,3}. So any i ∉{1,2,3,4}, σ(i), σ^2(i) ∈{1,2}. Thus _X_i = 0 for any i ∉{1,2,3,4} with σ(i),σ^2(i) ∈{1,2,3,4} and so Span{X_i}_i∉{1,2,3,4} is a subalgebra. By using the adjoint operator definition of a Milnor frame, one can see that these subalgebras form a Milnor frame. Through induction and Lemmas <ref> and <ref>, we obtain the desired result. § GEOMETRIC PROPERTIES §.§ Metric Lie Algebras with an Orthonormal Milnor Frame For this section we consider the collection of metric Lie algebras with an orthonormal Milnor frame. §.§.§ Ricci Tensors Suppose we have a metric Lie algebra (𝔤,g) with an orthonormal Milnor frame. By Theorem <ref> the Lie algebra 𝔤 is isomorphic to (⊕𝔥^3) ⊕(⊕𝔥^4) ⊕𝔞 where 𝔞 is an abelian Lie algebra. Due to 𝔤 admitting an orthonormal Milnor frame, the metric g can be represented as g = (⊕ g|_𝔥^3) ⊕ (⊕ g|_𝔥^4) ⊕ (⊕ g|_𝔞) and so _g |_𝔤 = (⊕_g|_𝔥^4) ⊕ (⊕_g |_𝔥^4) ⊕ (_g |_𝔞). With this in mind, to determine information about the Ricci tensor for (𝔤,g), it suffces to determine information about the Ricci tensors for (𝔥^3, g|_𝔥^3) and (𝔥^4, g|_𝔥^4). Let (𝔥^3, g) have an orthonormal Milnor frame whose non-trivial structure constant is λ_3. A result of <cit.> shows that _g|_𝔥^3 = λ_3^2/2[ -1 0 0; 0 -1 0; 0 0 1 ]. Let {X_1, …, X_4} be an orthonormal Milnor frame for 𝔥^4 with non trivial structure constants λ_3 and λ_4. The sectional curvatures can be computed using the formula found in Lemma 1.1 of <cit.>. The sectional curvature between any two elements of the Milnor frame can be found in Figure <ref>. By Theorem 1.1, Lauret and Will <cit.> _g(X_i,X_j) = 0 for i ≠ j. By summing each row of Figure <ref> we obtain the matrix representation of the Ricci tensor: _g|_𝔥^4 = 1/2[ -λ_3^2 0 0 0; 0 -λ_3^2 - λ_4^2 0 0; 0 0 λ_3^2 -λ_4^2 0; 0 0 0 λ_4^2 ]. The eigenvalues of the Ricci signatures for _g|_𝔥^3 and _g|_𝔥^4 admit positive and negative terms which coincides with Theorem 2.4 of <cit.>. An immediate consequence of this theorem is that any non-commutative nilpotent metric Lie algebra does not admit an Einstein metric, a metric g for which Ric_g = λ g for some λ∈ R. A known extension of Einstein metrics are metrics which satisfy the Ricci soliton equation. For a Riemannian manifold (M,g), the metric g is a Ricci soliton if g satisfies the equation -2_g = λ g + ℒ_X g, λ∈ R where X is a vector field and ℒ_X is the Lie derivative in the direction of X. §.§.§ Ricci-Soliton Equation and Derivations Given a metric Lie algebra (𝔤,g) and an orthonormal frame {X_1, …, X_n}, the Ricci tensor _g has a matrix representation with respect to the frame, [ _g(X_i,X_j) ]_n × n, as shown in examples <ref> and <ref>. Let (𝔤, g) be a nilpotent metric Lie algebra. Whenever a metric g admits a Ricci tensor of the form _g ∈ R I + Der(𝔤) ∈ M_n× n( R), where Der(𝔤) is the set of derivations on 𝔤, we say that g is a Ricci nilsoliton. By Corollary 2 of <cit.> and Theorem 1.1 of <cit.>, g is a Ricci nilsoliton if and only if g is a Ricci soliton. For example the Ricci tensor <ref> can be represented as λ_3^2/2[ -1 0 0; 0 -1 0; 0 0 1 ] = -3λ_3^2/2I + λ_3^2/2[ 2 0 0; 0 2 0; 0 0 4 ] = -3I + D. where D is a derivation. The vector fields which satisfy (<ref>) for (𝔥^3, g) and (𝔥^4,g') cannot be left invariant <cit.>. By Theorem <ref> if (𝔤,g) is a metric Lie algebra with an orthonormal Milnor frame, then (𝔤,g) is a Ricci nilsoliton where the vector field which satisfies equation (<ref>) is not left-invariant. Let (𝔥^3,g) be a metric Lie algebra with an orthonormal Milnor frame whose non-trivial structure constant is λ_3 ≠ 0. By Theorem 4.3 of <cit.> the matrix representation for the Ricci quadratic form is _g = λ_3^2/2[ -1 0 0; 0 -1 0; 0 0 1 ]. The above matrix may be written as λ_3^2/2[ -1 0 0; 0 -1 0; 0 0 1 ] = -3λ_3^2/2I + λ_3^2[ 1 0 0; 0 1 0; 0 0 2 ] = -3λ_3^2/2I + D where D is a derivation. Suppose (𝔥^4, g) has an orthonormal Milnor frame. We shall show precisely when g is a Ricci nilsoliton. Suppose (𝔥^4,g) has an orthonormal Milnor frame {X_1,…, X_4} such that the structure constants are λ_1,λ_2 = 0 and λ_3, λ_4 ≠ 0. Then g is a Ricci nilsoliton if and only if |λ_3| = |λ_4|. If |λ_3| = |λ_4| then λ_3^2 = λ_4^2. The matrix representation of _g with respect to the frame {X_1, …, X_4} can be written as 2_g = [ -λ_3^2 0 0 0; 0 -λ_3^2 - λ_4^2 0 0; 0 0 λ_3^2 -λ_4^2 0; 0 0 0 λ_4^2 ] = [ -λ_3^2 0 0 0; 0 -2λ_3^2 0 0; 0 0 0 0; 0 0 0 λ_3^2 ] = λ_3^2[ -1 0 0 0; 0 -2 0 0; 0 0 0 0; 0 0 0 1 ] where [ -1 0 0 0; 0 -2 0 0; 0 0 0 0; 0 0 0 1 ] = -3I + [ 2 0 0 0; 0 1 0 0; 0 0 3 0; 0 0 0 4 ] = -3I + D and so by (<ref>) and (<ref>) 2_g = -3λ_3^2 I + λ_3^2D where D is a derivation. Thus g is a Ricci nilsoliton. Now suppose that _g is a Ricci nilsoliton. Let D be a derivation such that _g = cI + D for some constant c ∈ R. Because _g is diagonalized with respect to the frame {X_1,…, X_4}, D must be diagonalized. For each i, let D_i ∈ R so that DX_i = D_iX_i. Then λ_3D_3X_3 = D(λ_3X_3) = D[X_1,X_2] = [DX_1, X_2] + [X_1,DX_2] = (D_1 + D_2)[X_1,X_2] = λ_3(D_1 + D_2)X_3 and so D_3 = D_1 + D_2. Similarly λ_4D_4X_4 = D[X_2,X_3] = [DX_2,X_3] + [X_2,DX_3] = λ_4(D_2 + D_3)X_4 and so D_4 = D_2 + D_3 = D_1 + 2D_2. We obtain the system of equations -λ_3^2 = c + D_1 -λ_3^2 - λ_4^2 = c + D_2 λ_3^2 - λ_4^2 = c + D_1 + D_2 λ_4^2 = c + D_1 + 2D_2 which gives us the equation [ -1 -1 0; -2 -1 -3; 2 2 3 ][ c; D_1; D_2 ] = λ_3^2[ 1; 1; 1 ] and so [ c; D_1; D_2 ] = λ_3^2/3[ -3 -3 -3; 0 3 3; 2 0 1 ][ 1; 1; 1 ] = λ_3^2[ -3; 2; 1 ]. Thus λ_4^2 = c + D_1 + 2D_2 = λ_3^2( -3 + 2 + 2) = λ_3^2 which implies |λ_4|= |λ_3|. Now we may generalize to any metric Lie algebra with an orthonormal Milnor frame. Let (𝔤, g) be a Lie algebra with an orthonormal Milnor frame {X_1, …, X_n} whose structure constants are λ_1, …, λ_n ∈ R. The metric g is a Ricci nilsoliton if and only if for any i such that Span{X_i, X_σ(i), X_σ^2(i), X_σ^3(i)}≅𝔥^4, |λ_σ^2(i)| = |λ_σ^3(i)|. §.§ Non-orthogonal Milnor frames Let (𝔤,g) be a metric Lie algebra with a Milnor frame. By Theorem <ref> we know that 𝔤≅ (⊕𝔥^3) ⊕ (⊕𝔥^4) ⊕𝔞. Let us assume that such a decomposition of 𝔤 is pair-wise orthogonal. Each 𝔥^3 is a 3-dimensional unimodular metric Lie algebra, and so by Lemma 4.1 of <cit.> there exists an orthonormal Milnor frame of 𝔥^3. Thus in order for 𝔤 to have an orthonormal Milnor frame, the subalgebras in the decomposition of 𝔤 isomorphic to 𝔥^4 must have an orthonormal Milnor frame. Now we determine precisely when 𝔥^4 admits an orthonormal Milnor frame. §.§.§ Metrics on 𝔥^4 Let 𝔤 be a Lie algebra formed by the bracket relations [X_2,X_4] = X_1, [X_3,X_4] = X_2. By setting Y_1 = X_2 + X_3, Y_2 = X_4, Y_3 = X_1 + X_2, Y_4 = -X_1 we obtain 𝔥^4 as shown in Figure <ref>. Applying the Gram-Schmidt algorithm to the frame {X_1, …, X_4} gives us an orthonormal frame {F_1, …, F_4} for which there are at most three non-trivial structure constants C_2,4^1,C_3,4^2 > 0, C_3,4^1 ∈ R as shown in page 254 of <cit.>. I found it easier to determine information about the structure constants with respect to the orthonormal frame {F_1,…, F_4} as opposed to the structure constants of the orthonormal frame obtained by applying the Gram-Schmidt algorithm to {Y_1, …, Y_4}. We now show that 𝔥^4 has an orthonormal Milnor frame if and only if C_3,4^1 = 0. Let {F_1, F_2, F_3,F_4} be an orthonormal frame with a Lie algebra 𝔤 generated by the following Lie bracket relations: a = C_2,4^1> 0, b = C_3,4^1 ∈ R, and c= C_3,4^2 > 0. Let O(4) be the orthogonal group of 4× 4 matrices with real coefficients. There exists T ∈ O(4) which makes {TF_1,TF_2,TF_3,TF_4} into a Milnor frame with 2 non-zero structure constants if and only b = 0. We prove the above proposition by contradiction. Let T ∈ O(4) be a linear operator such that {TF_1,TF_2,TF_3,TF_4} forms a Milnor frame. By Lemma <ref> we may assume that the non-trivial structure constants of this Milnor frame are λ_3, λ_4 ≠ 0 and T ∈ O(4). For any i,j such that [TF_i,TF_j] = 0 0 = [TF_i,TF_j] = [T_i^pF_p,T_j^qF_q] = T_i^pT_j^q[F_p,F_q] = [a(T_i^2T_j^4 - T_i^4T_j^2) + b(T_i^3T_j^4 - T_i^4T_j^3)]F_1 + c(T_i^3T_j^4 - T_i^4T_j^3)F_2. As a result T_i^3T_j^4 = T_i^4T_j^3 and T_i^2T_j^4 = T_i^4T_j^2. By the fact that [𝔤,𝔤] ∈{F_1,F_2}, [TF_1,TF_2] = λ_3TF_3 T_3^3 = T_3^4 = 0 [TF_2,TF_3] = λ_4TF_4 T_4^3 = T_4^4 = 0. We claim that T_1^4 is necessarily trivial. Suppose otherwise. Because T_3^4 = 0 and [TF_1,TF_3] = [TF_1,TF_4] = 0, 0 = T_1^2T_3^4 = T_1^4T_3^2 T_3^2 = 0. Similarly 0 = T_1^2T_4^4 = T_1^4T_4^2 T_4^2 = 0 so that the vectors [T_1^4 … T_4^4]^t and [T_1^3, … , T_4^3]^t are linearly dependent, a contradiction to T ∈ O(4). Because T_j^4 = 0 for j = 1,3,4 and T ∈ O(4), T^4_2T_2^j=∑_k=1^4 T^4_kT_k^j = δ_4j. We obtain that T^4_2 = ± 1 which implies T_2^1 = T_2^2 = T_2^3 = 0. Similarly T_1^3T_1^j = ∑_k T_k^3T_k^j = δ_3j implies T_1^3 = ± 1 and T_1^1 = T_1^2 = T_1^4 = 0. The matrix representation of T under the basis (F_1,…, F_4) is given by T = [ 0 0 γ ϵ; 0 0 δ ι; α 0 0 0; 0 β 0 0 ] where α,β∈{-1,1} and γ,δ, ϵ, ι∈ R. Because [TF_2,TF_3] = λ_4TF_4 and _F_1 = 0, ι = 0. In order for 0 = g(TF_3,TF_4) = γϵ, γ = 0. Finally [TF_1,TF_2] = αβ[F_3,F_4] = αβ(bF_1 + cF_2) = λ_3TF_3 = λ_3δ F_2. Considering that αβ∈{-1,1}, it must be the case that the linear operator T turns the frame {F_1,F_2,F_3,F_4} into an orthonormal Milnor frame if and only if b = 0. As a result of Theorem <ref> we can construct a metric g so that the metric Lie algebra (𝔥^4, g) does not admit an orthonormal Milnor frame. If (𝔥^4,g) has an orthonormal Milnor frame {X_1,…, X_4}, then there exists T ∈ O(4) such that {TX_1, …, TX_4} = {F_1, …, F_4} where {F_1, …, F_4} is as in (<ref>). Thus {T^-1F_1, …, T^-1F_4} is an orthonormal Milnor frame which implies that g([F_3,F_4],F_1) = 0. An example of a metric g such that g([F_3,F_4],F_1) ≠ 0 is found in Lemma 3 of  <cit.>. In Section <ref>, we determined that the set of metrics which admit an orthonormal Milnor frame {X_1,…, X_4} whose non-trivial structure constants are λ_3,λ_4 ≠ 0 such that |λ_3| = |λ_4| are Ricci nilsolitons. A result of Theorems <ref> and <ref> shall classify all metrics on 𝔥^4 which are Ricci nilsolitons. Let g be a metric on 𝔥^4. Then g is a Ricci nilsoliton if and only if there exists an orthonormal Milnor frame {X_1, …, X_4} with non-trivial structure constants λ_3,λ_4 ≠ 0 such that |λ_3| = |λ_4|, i.e if and only if (𝔥^4,g) has an orthonormal Milnor frame where the Ricci signature is (–,0,+). Let {F_1, …, F_4} be an orthonormal frame for the metric Lie algebra (𝔥^4, g) whose structure constants are C_2,4^1 = a > 0, C_3,4^1 = b ∈ R and C_3,4^2 = c > 0. The matrix representation of _g with respect to the frame {F_1,…, F_4} is of the form 2_g = [ a^2 + b^2 bc 0 0; bc c^2 - a^2 -ab 0; 0 -ab -b^2 - c^2 0; 0 0 0 -a^2 - b^2 - c^2 ]. Suppose that _g is a Ricci nilsoliton. Then there exists k ∈ R and D ∈Der(𝔤) such that D = _g - kI. Thus DF_1 = (a^2+b^2-k)F_1 + bcF_2. Because _F_1 = 0, 0 = D[F_1,F_4] = [DF_1, F_4] + [F_1,DF_4] = (a^2 + b^2-k)[F_1,F_4] + bc[F_2,F_4] = abcF_1 where a,c> 0 so that b = 0. By Theorem <ref> (𝔥^4,g) must have an orthonormal Milnor frame {X_1, …, X_4} with non-trivial structure constants λ_3,λ_4 ≠ 0. By Theorem <ref>, |λ_3| = |λ_4| and so the Ricci signature is of the form (–,0,+). It is not the case that the set of metrics which admit a Ricci signature of the form (-,-,0,+) admit an orthonormal Milnor frame. By Lemma 3 of <cit.>, we can find a metric which admits an orthonormal frame {f_1, …, f_4} such that span{f_1, …, f_4} = 𝔥^4 and has non-trivial structure constants C_2,4^1 = C_3,4^2 > 0 and C_2,4^1≠ 0. Because C_2,4^1 ≠ 0, (𝔥^4,g) does not admit an orthonormal Milnor frame. Let 𝔥^4 be a Lie algebra with a frame {f_1, …, f_4} with non-trivial structure constants C_2,4^1, C_3,4^1,C_3,4^2 = 1. Existence of such a Lie algebra is given by Lemma 3 of <cit.>. Let g be a metric which makes {f_1, …, f_4} an orthonormal frame. The Ricci tensor is of the form 2_g = [ 2 1 0 0; 1 0 -1 0; 0 -1 -2 0; 0 0 0 -3 ]. The characteristic polynomial of the above matrix is x(x+3)(x^2-6) and so the signature of _g in (<ref>) is (-,-,0,+). If g is a Ricci nilsoliton then there exists k ∈ R such that D:=_g - kI is a derivation. Because [f_1,f_4] = 0, D[f_1,f_4] = 0 and so 0 = D[f_1,f_4] = [Df_1,f_4] + [F_1,Df_4] = [(2-k)f_1 + f_2, f_4] + [f_1, -3f_4] = f_1 which is a contradiction. Thus g must not be a Ricci nilsoliton. §.§.§ Metrics on 𝔥^3 ⊕𝔥^3 Now we consider the collection of metric Lie algebras 𝔤 which contain an isomorphic copy of 𝔥^3 ⊕𝔥^3. If we are able to provide a metric that does not allow 𝔥^3 ⊕𝔥^3 to have an orthogonal Milnor frame, then we obtain Theorem <ref> as a result. First we prove the following result from linear algebra. Let A,B ∈ M_2( R). Denote the i^th column of an arbitrary matrix C ∈ M_2( R) as C_i. If A and B have the property A_i and B_j are linearly dependent for any i,j ∈{1,2} then either A or B has determinant 0. Suppose that A is non-singular. By our hypothesis B_i = c_ijA_j for some c_ij∈ R and i,j ∈{1,2}. Thus [ A_1 A_2 ][ 0 c_21; c_12 0 ] = [ B_1 B_2 ] = [ A_1 A_2 ][ c_11 0; 0 c_22 ]. Because A is invertible, c_ij = 0 for all i,j which implies B_1 = B_2 = 0. Let (𝔥^3 ⊕𝔥^3, g) be a metric Lie algebra. Let {U_1,U_2,U_3,V_1,V_2,V_3} be a Milnor frame for (𝔥^3 ⊕𝔥^3) where 𝔥^3 ⊕{0} = Span{U_1,U_2,U_3} and {0}⊕𝔥^3 = Span{V_1,V_2,V_3}. If there exists a Lie isomorphism T such that g(T(𝔥^3⊕{0}), T({0}⊕𝔥^3)) = 0 then g(U_3,V_3) = 0. We may always scale the frames {U_1,U_2,U_3} and {V_1,V_2,V_3} so that the structure constants are contained in {0,1}. Without loss of generality we shall assume that the structure constants for the frame {U_1,…, V_3} are contained in {0,1}. Because T is a Lie isomorphism, T_1^iT_2^j[U_i,U_j] = [TU_1,TU_2] = TU_3 = T^k_3U_k. This shows T_3^3 = T_1^1T_2^2 - T_1^2T_2^1, T_3^6 = T_1^4T_2^5- T_1^5T_2^4, and T_3^k = 0 for k = 1,2,4,5. Similarly T_6^3 = T_4^1T_5^2-T_4^2T_5^1, T_6^6 = T_4^4T_5^5 - T_4^5-T_5^4 and T_6^k = 0 for k=1,2,4,5. For i,j such that [P_i,P_j] = 0, P_i,P_j ∈{U_1, …, V_3}, T_i^1T_j^2 - T_i^2T_j^1 = T_i^4T_j^5 - T_i^5T_j^4 = 0. The matrix representation of T can be given by the block matrix T:= [ W 0 X 0; w^t (W) x^t (X); Y 0 Z 0; y^t (Y) z^t (Z) ] Where W,X,Y and Z are 2× 2 matrices, w,x,y,z are 2× 1 matrices, and each 0 is a 2 × 1 matrix. Letting C_i represent the i^th column of a matrix C ∈ M_2( R), we have the additional property that W_i and X_j are linearly dependent for any i,j and similarly Y_i and Z_j are linearly dependent. Suppose that X is singular. If W or Z is singular then T will be singular leading us to a contradiction. Let W and Z be nonsingular. By Lemma <ref> Y is singular. T can be represented as T = [ ω χ; γ ζ ] where ω= [ W 0; w^t (W) ] χ= [ X 0; x^t 0 ] γ= [ Y 0; y^t 0 ] ζ= [ Z 0; z^t (Z) ]. Letting g be represented as g = [ A C; C^t B ] [ ω^t γ^t; χ^t ζ^t ][ A C; C^t B ][ ω χ; γ ζ ] = [ ω^t A + γ^t C^t ω^t C + γ^t B; χ^t A + ζ^t C^t χ^t C + ζ^t B ][ ω χ; γ ζ ] = [ ω^tA ω+ γ^tC^t ω+ ω^t Cγ+ γ^t B γ ω^t A χ+ γ^tC^t χ+ ω^tCζ+ γ^t B ζ; χ^tAω+ ζ^tC^tω+ χ^t C γ+ ζ^t B γ χ^tAχ+ ζ^tC^t χ+ χ^tCζ+ ζ^t B ζ ] so that ω^tAχ + γ^tC^t χ + ω^tCζ + γ^t B ζ = 0. Finally we obtain 0 = (ωU_3)^tA (χV_3) + (γU_3)^t C^t (χV_3) + (ωU_3)C(ζV_3) + (γU_3)^t B (ζV_3) = (W)(Z)(U_3)^t C V_3 = (W)(Z)g(U_3,V_3) where (W)(Z) ≠ 0 so that g(U_3,V_3) = 0. If X is non-singular then by Lemma <ref> W and Z must be singular. In order for T to remain non-singular Y must be nonsingular. If we post-compose T with the Lie isomorphism S = [ 0 I; I 0 ] then a similar argument of the case where X is singular holds to show that g(U_3,V_3) = 0. Taking the contrapositive of the previous theorem states if g(U_3,V_3) ≠ 0, then there are no linear operators T ∈Aut(𝔤) such that g(TU_i,TV_j) = 0 ∀ i,j. There exists a metric g on the Lie algebra (𝔥^3 ⊕𝔥^3) such that (𝔥^3 ⊕𝔥^3, g) does not admit an orthonormal Milnor frame. Let be (𝔤 = 𝔥^3 ⊕𝔥^3,g) be a metric Lie algebra with a Milnor frame {X_1, …, X_6} and T: 𝔤→𝔤 be a linear operator such that {TX_1, …, TX_6} forms a Milnor frame with two non-trivial structure constants. Denote these structure constants as λ_1, …, λ_6 ∈{0,1}. Then either λ_i = λ_σ(i) = 1, λ_i = λ_σ^2(i) = 1, or λ_i = λ_σ^3(i) =1 for some i ∈{1,…, 6}. It cannot be the case that λ_i = λ_σ^2(i) = 1 for some i by Proposition <ref> which leaves us with two cases. If there is some i such that λ_i = λ_σ(i), then 𝔥^4 ⊂𝔥^3 ⊕𝔥^3. By Proposition <ref>, we may choose a metric g so that (𝔥^4, g|_𝔥^4) does not admit an orthonormal Milnor frame and so (𝔥^3 ⊕𝔥^3, g) does not admit an orthonormal Milnor frame. If λ_i = λ_σ^3(i) = 1 for some i, then T ∈Aut(𝔤). Choose a metric g which makes g(X_3,X_6) ≠ 0. For example if g = I + ϵ(E_36 + E_63) for some sufficiently small ϵ > 0 that allows g to be positive definite then g(X_3,X_6) = ϵ > 0. By Proposition <ref>, there is no linear operator T which makes T(𝔥^3 ⊕{0}) the orthogonal complement of T({0}⊕𝔥^3). Thus 𝔥^3 ⊕𝔥^3 does not necessarily admit an orthonormal Milnor frame. Now we prove Theorem <ref>. Let 𝔤 be a Lie algebra with a Milnor frame. Suppose that any metric g admits an orthonormal Milnor frame. Then 𝔥^4 cannot be a subalgebra of 𝔤 and 𝔥^3 ⊕𝔥^3 cannot be a subalgebra of 𝔤. By Theorem <ref>, 𝔤 = 𝔥^3 ⊕𝔞.
http://arxiv.org/abs/2303.06661v1
20230312134332
Bayesian Size-and-Shape regression modelling
[ "Antonio Di Noia", "Gianluca Mastrantonio", "Giovanna Jona Lasinio" ]
stat.ME
[ "stat.ME" ]
Department of Computer Science, ETH Zurich & Faculty of Economics, University of Lugano Department of Mathematical Sciences, Polytechnic of Turin Department of Statistical Sciences, Sapienza University Bayesian Size-and-Shape regression modelling Giovanna Jona Lasinio ============================================ Building on <cit.>, this note presents the Bayesian estimation of a regression model for size-and-shape response variables with Gaussian landmarks. Our proposal fits into the framework of Bayesian latent variable models and allows a highly flexible modelling framework. Bayesian Size-and-Shape regression modelling Giovanna Jona Lasinio ============================================ § INTRODUCTION Shape data naturally arise in many research fields whenever our attention focuses on the shape structure of objects. For example, in biology, there is great interest in modelling the shape features of organisms, relating them to environmental conditions. In <cit.>, a study about the sex differences in the crania of a macaque species is reported, and environmental features could be included as well. Magnetic Resonance data can be seen as size-and-shape data. Their analysis is helpful to assess specific features such as the Fetal alcohol spectrum disorder or Schizophrenia Magnetic Resonance images (see ). Image analysis and computer vision are other natural fields of application. Generally speaking, image recognition could be approached in different ways, and, among others, the shape analysis approach has often given successful results, e.g., digit recognition (). In genetics, it is common to use electrophoretic gel images (), and shape analysis could be successfully adopted to analyse them efficiently. In chemistry, it is fundamental to assess the geometric structure of molecules by using three-dimensional coordinates, e.g., it has been used to evaluate shape features of steroid molecules (). And in bio-informatics, an important task is Protein matching, i.e. aligning molecules to find common geometrical structures in them. Shape analysis could be adopted to deal successfully with these tasks (). Recent advances rely on the development of methodologies to capture and explain changes in the shape of objects. Some smoothing methods have been proposed in <cit.>, but to our knowledge, the only regression methodology for size-and-shape data has been proposed by <cit.> in the marginal likelihood estimation framework. This paper proposes an alternative Bayesian regression methodology for size-and-shape response data. The model fits into the Bayesian latent variable models' framework and should be an appealing alternative since it is not affected by numerical issues e.g. local optima of optimization procedures. The latter is because it relies on a simple and efficient MCMC posterior inference procedure. Moreover, it potentially allows a more flexible model's specification, for example, by adding dependence between landmarks. The posterior distribution estimation is carried out by means of Gibbs sampling and Metropolis-within-Gibbs algorithm. Theoretical results are derived and discussed, some simulation results are provided, and some concluding remarks are given. § A BAYESIAN MODEL FOR SIZE-AND-SHAPE Let 𝐗̃_i∈ℝ^(k+1)× p, with i=1,… , n be a (k+1)× p dimensional configuration matrix, with k≥ p, that represents the Euclidean coordinates of k+1 landmarks (points of interest an object) in dimension p for the i-th recorded object, where p is usually equal to 2 or 3. To perform any size-and-shape inference, we have to remove information about the objects' location and orientation to model the data. Location information is usually removed post-multiplying by the Helmert submatrix 𝐇 <cit.>, with dimension (k+1)× (k+1), which has non-zero entries only on the lower triangular part and has j-th row equal to (-d_j,-d_j, …, -d_j,jd_j, 0,…, 0) where d_j = 1/√(j(j+1)), obtaining the Helmertized configuration 𝐗̆_i = 𝐇𝐗̃_i. The matrix 𝐗̆_i ∈ℝ^k× p is also called pre-form matrix. Following <cit.>, if we decompose 𝐗̆_i using the singular value decomposition, i.e. according to 𝐗̆_i = 𝐔_iΔ_i𝐑̆_i^⊤ where 𝐑̆_i ∈ O(p) i.e. belongs to the space of the p × p orthogonal matrices, it could be readily proven that 𝐑̆_i contains all the information about orientation and 𝐘_i=𝐔_iΔ_i is the size-and-shape version of the original configuration 𝐗̆_i, it represents the object of the inference and the data we are modelling. An important point is that allowing 𝐑̆_i ∈ O(p) the reflection information is lost, and if we want to retain it, we have to assume that 𝐑̆_i ∈SO(p), i.e., 𝐑̆_i is a rotation matrix with |𝐑̆_i| = 1, and SO(p) is the p-dimensional Special Orthogonal group or rotation group. §.§ The model Let us suppose that for each 𝐘_i we have an associated vector of d covariates 𝐳_i = (z_i1,z_i2, … , z_id)^⊤ and we are interested in the relation between 𝐳_i and 𝐘_i. Unfortunately, the size-and-shape space, where 𝐘_i lives, is a non-Euclidean manifold with a very complicated geometric structure that is not easy to handle, and even a distribution for 𝐘_i cannot be easily specified. The idea proposed in <cit.>, which here we extend to a Bayesian setting, is to model this relation using the latent variable 𝐑_i ∈SO(p) and to define a regressive-type relation between 𝐗_i=𝐘_i𝐑_i and 𝐳_i in the following way: vec(𝐗_i) ∼𝒩_k p( vec(∑_h=1^dz_ih𝐁_h), 𝐈_p ⊗Σ), i = 1, … , n, with 𝐗_i ⊥𝐗_i' if i ≠ i', where vec(·) indicates the vectorization of a matrix, Σ is a non singular k × k covariance matrix and 𝐁_h, h = 1, … , d, is a k× p matrix of regressive coefficients. It should be noted that 𝐑_i is latent and hence a non-observable variable, which must not be confused with 𝐑̆_i which is the rotation matrix of the original data. This latent variable approach avoids dependence on the rotation and leads to a proper inference that depends only on 𝐘_1, …, 𝐘_n. To specify our Bayesian proposal of the model, we need to introduce the prior distribution for the model's unknown. To facilitate the notation and the derivation of the full conditionals, we use 𝐗_i,l and 𝐁_i,l to indicate the l-th column of 𝐗_i and 𝐁_i, respectively, we let β_l=(𝐁_1,l^⊤,𝐁_2,l^⊤, …, 𝐁_d,l^⊤)^⊤ β = (β_1^⊤,… , β_p^⊤)^⊤ and we introduce the design matrix 𝐙_i = 𝐈_k⊗𝐳_𝐢^⊤, such that ((𝐙_iβ_1)^⊤, (𝐙_iβ_2)^⊤, … , (𝐙_iβ_p)^⊤)^⊤ = vec(∑_h=1^dz_ih𝐁_h). We then define the Bayesian model in the following way: 𝐗_i,l| β,Σ ∼𝒩_k( 𝐙_iβ_l, Σ), i = 1, … , n, l = 1,…,p, β_l ∼ N_kd(𝐌_l, 𝐕_l), Σ ∼ IW(ν, Ψ), with 𝐗_i,l|β,Σ⊥𝐗_i',l'|β,Σ if i≠ i' or l ≠ l' and where IW denotes the Inverse Wishart distribution. It should be noted that (<ref>) and (<ref>), conditioning on β,Σ, identify the same distribution over the entire 𝐗_1,… , 𝐗_n, the conditioning is needed in (<ref>) since they are considered as random variables. It must be remarked that an identification problem arises from the introduced model specification, which has not been pointed out by <cit.>. To make it evident, we show that the set of parameters {𝐁_1, …, 𝐁_d, Σ} and {𝐁_1Λ, …, 𝐁_dΛ, Σ} where Λ∈SO(p) is a rotation matrix, induce the same density over (𝐔_1, Δ_1, … , 𝐔_n, Δ_n). Let μ_i = ∑_j=1^dz_ij𝐁_j and f indicates a density, we need to prove that f(𝐔_i ,Δ_i; μ_i, Σ)/f(𝐔_i ,Δ_i; μ_iΛ, Σ) = 1, ∀ i = 1,… , n. The density of (𝐔_i, Δ_i) is derived in Theorem 1 by <cit.> which allows us to compute (<ref>) that is f(𝐔_i ,Δ_i; μ_i, Σ)/f(𝐔_i ,Δ_i; μ_iΛ, Σ) = exp(-tr(μ_i^⊤Σ^-1μ_i) - tr(Λ^⊤μ_i^⊤Σ^-1μ_iΛ) /2). From the property of the trace operator, and since Λ^⊤ = Λ^-1, we have that tr(Λ^⊤μ_i^⊤Σ^-1μ_iΛ) = tr(μ_i^⊤Σ^-1μ_iΛΛ^⊤) = tr(μ_i^⊤Σ^-1μ_i), which shows that (<ref>) holds true for any i=1,…,n. For this reason, an identification constraint is needed to prevent any arbitrary rotation and/or reflection of μ_i. This can be achieved by assuming that for one of the 𝐁_h, e.g., the first, we have that [𝐁_h]_wl = 0, l>w, [𝐁_h]_ll≥ 0, l = 1,…, p-1. Equation (<ref>) is also a version of the transformation proposed by <cit.> to identify and isolate the size-and-shape information of the mean configuration μ_i. The constraints can be imposed in two different ways. The first one is by changing the prior distributions over the parameters that identify the constraints in (<ref>) accordingly. The other way is to let the Markov chain Monte Carlo (MCMC) algorithm explore freely the posterior and then remap each 𝐁_h^b, where b indicates the b-th posterior samples, to an identified version 𝐁̃_h^b, via the map 𝐁_h^b↦𝐁̃_h^b:=𝐁_h^bΛ^b, where Λ^b = g(𝐁_h^b) ∈SO(p) is an appropriate rotation matrix defined by a function g: ℝ^k× p→SO(p), such that 𝐁̃_h^b satisfies (<ref>). We prefer the latter since it allows us to define a more straightforward MCMC algorithm, as shown below. §.§ The Markov chain Monte Carlo algorithm To implement the MCMC algorithm, we derive the full conditional distributions of β, Σ, 𝐑_1, 𝐑_2, …, 𝐑_n, i.e., the distribution of one parameter given all the others and the data. Owing to the model specification given in (<ref>), we can easily see that the full conditional of β and Σ are the same that we would obtain in the case of a standard Bayesian regression (see, e.g. ), that is β_l|β_-l,Σ, 𝐑_1, … , 𝐑_n ,𝐘_1, … , 𝐘_n ∼ N_kd(𝐌_l^*, 𝐕_l^*), 𝐌_l^* = 𝐕_l^* ( ∑_i=1^n 𝐙_i^⊤Σ^-1𝐗_i,l + 𝐕_l^-1𝐌_l ), 𝐕_l^* = ( ∑_i=1^n 𝐙_i^⊤Σ^-1𝐙_i + 𝐕_l^-1)^-1 where β_-l denotes the vector β without the element β_l, and Σ|β, 𝐑_1, … , 𝐑_n ,𝐘_1, … , 𝐘_n ∼ IW(ν^*, Ψ^*), ν^* = ν + np, Ψ^* = Ψ + ∑_i=1^n ∑_l=1^p(𝐗_i,l-𝐙_iβ_l)(𝐗_i,l-𝐙_iβ_l)^⊤. For the derivation of 𝐑_i's full conditional, we can resort to the computation reported in <cit.>, which show, in Theorem 1, that such distribution is Matrix Fisher <cit.> with parameter 𝐀_i = μ_i^⊤Σ^-1𝐘_i, and density f(𝐑_i|β, Σ,𝐑_1, … , 𝐑_i-1, 𝐑_i+1, …, 𝐑_n ,𝐘_1, … , 𝐘_n ) ∝exp(tr(𝐑_i𝐀_i^⊤)). Sampling from a Matrix Fisher distribution is generally not easy and requires acceptance-rejection methods, as described in <cit.>. Interestingly, the case p=2 can be easily handled by expressing the rotation matrix as a function of the rotation angle θ_i ∈ [0, 2π), which can be shown to be von-Mises distributed with parameters (η_i,κ_i ) that can be derived setting the equation 𝐑_i𝐀_i^⊤ = κ_i cos (θ_i - η_i). The case p=3 can be handled by expressing 𝐑_i with the Euler angles θ_1∈[0,2π), θ_2∈ [0,π), θ_3∈[0,2π) by means of a 3-dimensional rotation map, and using a Metropolis step. Remark that the full conditionals are easily obtained and in the setting that we propose, any identifiability issue is solved relatively straightforwardly. This is a clear advantage of the Bayesian approach, which allows much more numerically stable estimation procedures. § SIMULATION EXPERIMENTS By means of a simulation experiment, we test the algorithm when p =2 and 3, with k=3 and d=1, meaning that 𝐳_i=1, ∀ i=1,…,n and μ_i = μ, with vec(μ)=(β_1^⊤,β_2^⊤)^⊤ if p=2 and vec(μ)=(β_1^⊤,β_2^⊤,β_3^⊤)^⊤ if p=3. Hence, we are modeling the data assuming that the linear model includes only an intercept and μ can be seen as a mean configuration. We set β_1 = (60,1,100)^⊤, β_2= (10,30,180)^⊤, β_3= (20,400,0.5)^⊤ and Σ=κ𝐈_k and, for each p, we generate scenarios with all possible combination of κ=0.1,0.3 and sample sizes n=20,50,100,300. The algorithm is implemented assuming 𝐌_l = 0_3d, 𝐕_l = 10^6𝐈_3d, ν = k+1 and Ψ = I_k and estimated using 5000 iterations of which 2000 are kept for inferential purposes. The rotation matrices are simulated using a Metropolis step. To evaluate the performance of the method, we report the size-and-shape Riemannian distances (see ) denoted by ρ_p between the true mean configuration μ and the estimated one, i.e., the posterior mean of μ. The results are reported in Table <ref>, where we empirically verified the consistency of the model and, as expected, the error tends to increase as the variability of the data increases. Moreover, for all datasets, the true value of parameters for each element of β_l and Σ was included in the associated 95% credible interval. § FURTHER DEVELOPMENTS In this paper, we showed how a size-and-shape regression model is easily implemented in a Bayesian latent variable framework, we discussed the model's identifiability issues and how to solve them. The present work opens new possibilities in modelling size-and-shape data, especially in the formalization of complex dependence structures, which are possible to handle under the Bayesian setting. Hence, we can imagine dependence structures among landmarks and future developments will see us introducing lattice-type modelling approaches into this field, where landmarks will be treated as locations. In this way, their dependencies will be described using spatially structured covariance matrices. We will also try to account for temporal dependence between observations, allowing us to inspect and model the temporal evolution of shape <cit.>. To conclude, as the linearity assumption could be too restrictive, a more flexible functional relation between the covariates and mean configuration could be introduced in order to account for deviations from linearity. elsarticle-harv
http://arxiv.org/abs/2303.07014v1
20230313112237
Reference-Guided Large-Scale Face Inpainting with Identity and Texture Control
[ "Wuyang Luo", "Su Yang", "Weishan Zhang" ]
cs.CV
[ "cs.CV" ]
IEEE Transactions on Circuits and Systems for Video Technology How to Use the IEEEtran Templates Reference-Guided Large-Scale Face Inpainting with Identity and Texture Control Wuyang Luo, Su Yang, Weishan Zhang This work was supported by State Grid Corporation of China (Grant No. 5500-202011091A-0-0-00). Corresponding author: Su Yang. Wuyang Luo and Su Yang are with the Shanghai Key Laboratory of Intelligent Information Processing, School of Computer Science, Fudan University, Shanghai 200433, China (e-mail: wyluo18@fudan.edu.cn; suyang@fudan.edu.cn). Weishan Zhang is with School of Computer Science and Technology, China University of Petroleum, Qingdao 266580, China (e-mail: zhangws@upc.edu.cn). Copyright © 2023 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending an email to pubs-permissions@ieee.org. March 30, 2023 ========================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================== Face inpainting aims at plausibly predicting missing pixels of face images within a corrupted region. Most existing methods rely on generative models learning a face image distribution from a big dataset, which produces uncontrollable results, especially with large-scale missing regions. To introduce strong control for face inpainting, we propose a novel reference-guided face inpainting method that fills the large-scale missing region with identity and texture control guided by a reference face image. However, generating high-quality results under imposing two control signals is challenging. To tackle such difficulty, we propose a dual control one-stage framework that decouples the reference image into two levels for flexible control: High-level identity information and low-level texture information, where the identity information figures out the shape of the face and the texture information depicts the component-aware texture. To synthesize high-quality results, we design two novel modules referred to as Half-AdaIN and Component-Wise Style Injector (CWSI) to inject the two kinds of control information into the inpainting processing. Our method produces realistic results with identity and texture control faithful to reference images. To the best of our knowledge, it is the first work to concurrently apply identity and component-level controls in face inpainting to promise more precise and controllable results. Code is available at <https://github.com/WuyangLuo/RefFaceInpainting> Reference-Guided Face Inpainting, Large-Scale Missing Region, Identity and Texture Control. § INTRODUCTION Image inpainting refers to filling up masked areas while keeping coherence with context. However, it is an ill-posed problem because a corrupted image can correspond to countless plausible completed results. Recent successful image inpainting methods rely on generative models learning a distribution from a big dataset and then predicting pixels of masked regions by known regions, which makes the generated content hold in a generic sense. This uncontrollability is unacceptable for face inpainting with large-scale missing regions. Because human eyes are extremely sensitive to face images, especially when the person in the photo is someone you know. In this case, inpainted results may be far from what the user desires. Recent works introduce a reference image to control the face inpainting process, called reference-guided face inpainting. It is a critical technique due to its wide applications, such as face frontalization <cit.>, restoration <cit.>, and generation <cit.>. In this work, we concurrently introduce separate control of identity and texture into face inpainting, as shown in Fig. <ref>. The existing works can be summarized into three frameworks, as shown in Fig. <ref>. Recognition-based framework <cit.> forces the identity of the inpainted image and the ground truth to be consistent using identity loss when training. This approach can only provide limited identity preservation. More importantly, it cannot freely control the identity of the output. Input concatenation framework <cit.> concatenates the corrupted image and the reference image as input. This strategy always produces incongruous results due to discrepancies between corrupted and reference images in terms of color and pose. Two-stage framework <cit.> combines face inpainting and face swapping. It cascades two generators: The first generator is responsible for completing the face, and the second modifies the identity using identity features extracted from the reference image. Input concatenation and two-stage frameworks can effectively control the high-level identity of the results, but they ignore low-level features of reference images, such as texture. Consequently, previous methods suffer from limited control and low-quality results. In this work, we propose a novel one-stage framework with dual control to concurrently exploit the high-level identity information and low-level texture information of reference images for controlling face inpainting and obtaining more realistic results. There are two key differences between our proposed approach and the existing methods. First, we decouple the reference image into high-level identity information and low-level texture style via two separate feature extractors to control the inpainting process. Identity information dominates the global structure and layout of large missing regions while texture information describes the diverse styles of face components, so this decoupled design enables our model to leverage control information from different perspectives and provides more flexibility. However, previous methods only consider identity information. Second, the two-stage framework splits the task into two separate steps: Face inpainting and face swapping, which leads to a larger number of parameters due to the fact that it requires two networks to achieve the goal. In contrast, our one-stage framework end-to-end optimizes our task within a neat model, achieving better performance with fewer parameters. It is technically challenging to impose identity and texture control on an inpainting model independently and concurrently. For identity control, an identity vector can be injected into the generator via AdaIN <cit.>, which is employed for face swapping <cit.>. However, AdaIN is initially designed for the style transfer task, which is proven to wash away the original style of feature maps <cit.>, such as colors and textures. For our image inpainting task, the generated regions must be style-consistent with the known regions. Applying AdaIN directly to the entire feature map may result in inconsistent styles, as shown in Fig. <ref>. Therefore, we propose a light-overhead but effectively improved module referred to as Half-AdaIN, where we let half of the feature maps go through the AdaIN operation, and the remaining channels bypass AdaIN to avoid completely washing away the style of the input image. For texture control, we design a Component-Wise Style Injector (CWSI) to locate, extract, and inject texture information of pre-defined face components. Precisely, CWSI first extracts the style codes of the reference image using a region-wise style encoder. Then, CWSI parses the feature maps to obtain the intermediate-level segmentation map for locating face component regions. Finally, CWSI injects style codes into corresponding component regions. To improve the texture control performance, we use a three-mode training scheme to approach better overall results. Our contributions are summarized as follows: ∙ We introduce precise separate control of identity and texture into face inpainting, for which we propose a novel dual control one-stage framework for reference-guided face inpainting. ∙ We design two new modules: Half-AdaIN and Component-Wise Style Injector (CWSI). They effectively inject identity and texture information to impose fine-grained controls on global profiles and local details simultaneously. ∙ Extensive experiments are performed to show that our method outperforms the state-of-the-art methods and can provide flexible control subject to reference images in terms of identity and texture. § RELATED WORKS §.§ Image Inpainting The existing inpainting methods can be divided into two categories: Traditional methods and deep learning based methods. Traditional methods use the remaining pixels to fill missing pixels, including diffusion-based methods <cit.> and patch-based methods <cit.>. These methods perform well on stationary textures. However, they often fail to synthesize satisfactory results for complex scenes because they do not understand high-level semantics. The methods based on deep learning can learn to understand the high-level semantics of images by training neural networks on large-scale datasets. Recent works have been devoted to improving image inpainting performance by introducing adversarial training <cit.>, contextual attention mechanism <cit.>, new convolutions scheme <cit.>, additional information <cit.>, diversity <cit.>, memory <cit.>, and vision transformer <cit.>. As a prevalent branch of image inpainting, face inpainting has benefited a lot from image inpainting. Face inpainting methods often use rich prior knowledge or external conditions of human faces to impose constraints improving performance, such as semantic structure <cit.>, attributes <cit.>, example images <cit.>, identity <cit.>, symmetry <cit.>, and correlation among facial parts <cit.>. However, the existing methods only apply distribution learned from big datasets to direct inpainting, so the global structure as well as fine details are in general out of control, and not able to fit well into any specific desire. §.§ User-Guided Image Inpainting Some works introduced user interaction based clues to guide inpainting for control, such as segmentation maps <cit.>, line <cit.>, transformation <cit.>, image library <cit.>, structures <cit.>, color <cit.>, and text <cit.>. Moreover, introducing another image as a reference is an intuitive way to exert comprehensive control. However, few works <cit.> have been developed to make use of all the potential clues from the reference image <cit.>. <cit.> only considers how to inpaint a specific component within a small local area and does not care about the global structure. <cit.> only inserts reference images at the beginning of the generator and cannot control finely the final outcome. <cit.> requires the reference image and the inpainted image to be consistent in content, lighting, and view, which is impractical in many scenarios. <cit.> only considers high-level identity consistency but neglects local texture information. This paper proposes a new framework for reference-guided face inpainting tasks to make full use of the control information provided by the reference image in terms of identity and texture. §.§ Conditional Face Generation Conditional face generation attempts to synthesize face images based on input conditions. It contains various subtasks, such as face image translation <cit.>, face swapping <cit.>, talking head synthesis <cit.>, face frontalization <cit.>, and face stylization <cit.>. Our work is related to two previous methods <cit.>. SimSwap <cit.> utilizes the AdaIN operation to build its generator, which transfers the identity information of the source face into the target face at feature level for arbitrary face swapping. To inject identity features while preserving the other important original features, we propose an improved version of AdaIN, referred to as Half-AdaIN. SEAN <cit.> synthesizes face images from segmentation maps, which can control the style of each semantic region individually. They utilize a style encoder network to extract the style of each region. We reuse their design to extract style codes from reference images and then further employ the proposed CWSI for component-aware style injection serving face inpainting. The proposed method introduces controllability to face inpainting so it can achieve an effect that looks similar to face swapping. However, our face inpainting task fundamentally differs from face swapping: (1) Different input: The input of our task is a face image with an arbitrary hole. Therefore, the structure of the input face is incomplete, e.g., missing nose or mouth; the input of face swapping is a complete face image. (2) Different goals: Face inpainting aims to reconstruct the missing region to match the known region. For example, if the central region of the input face is invisible, the face inpainting method needs to generate components of the face, such as the nose, at appropriate locations. Face swapping aims to change the overall identity of the input to another identity. Face swapping can change all identity-related elements, such as the shape of the nose and the size of the eyes. But face swapping does not need to reconstruct the structure. (3) Different outputs: Face inpainting fills the hole and generates a complete face. However, the content inside the hole is to some extent uncontrollable, e.g., if the upper part of the face falls into the missing region, the position and shape of the generated eyes may be different if using different face inpainting models. Face swapping does not need to reconstruct the structure of the face, so its output and input are aligned in terms of position and pose. § METHOD We describe our approach in a top-down manner. We first introduce the architecture of our generator and then give details of two novel modules for identity and texture control. Our generator has two inputs: (1) The corrupted image with the corresponding mask whose value is 0 in the missing region and 1 in the known region; (2) The reference image provides control information that users desire. The generator adopts an encoder-decoder architecture with skip connections <cit.>, as illustrated in Fig. <ref>(a). Specifically, the encoder is composed of several successive gated convolutional layers <cit.> with stride 2. The decoder is composed of several Half-AdaIN with upsampling operations. In addition, two CWSI are inserted into the decoder at the resolution of 64 × 64 and 128 × 128. For the inpainting task, we generally believe that the encoder can transfer the available information from the known pixels to missing pixels by gradually increasing the receptive field, and the decoder is responsible for the reconstruction of details <cit.>, so we only place the control modules in the decoder. In order to force the training generator to produce more realistic outputs, we employ a global discriminator and three local discriminators against the generator. We use SN-PatchGAN <cit.> as our global discriminator. The local discriminators are focused on specific sub-regions, including two eyes and mouths, which helps the generator synthesize high-frequency textures in these regions. The discriminators are omitted in Fig. <ref>. §.§ Identity Control 1) Identity Feature Extraction: We employ a well-trained face recognizer model <cit.> as the identity feature extractor. We take the output of the last layer prior to the classifier and normalize this 512-dimensional embedding as the identity vector Z_id. Compared to using reference images as guidance directly <cit.>, the high-level identity embedding extracted from the recognition model trained on large-scale face datasets can figure out more representative identity features. The identity embedding largely ignores pose, background, and lighting. Thus, it is unnecessary to require rigorous spatial alignment between the corrupted image and the reference image. 2) Half-AdaIN For Identity Injection: The previous face swapping work <cit.> borrows the AdaIN <cit.> operation to inject the identity feature. However, if we naively reuse AdaIN for our task, it produces many low-quality results as shown in Fig. <ref>. AdaIN washes away the original style of feature maps revealed by <cit.>, so it is inappropriate for our task that requires injecting an external identity vector while keeping coherence between generated content and known pixels. To tackle this problem, we propose a simple but effectively improved module referred to as Half-AdaIN, as illustrated in Fig. <ref>(b). The key novelty is that we split the input feature maps for different cues, half for identity control and the other half for preserving the original contextual information. Let F ∈ℝ^C × H × W and Z_id∈ℝ^C_id denote input feature maps and the identity vector, respectively. Here, C is the number of channels, and H and W represent spatial dimensions. First, F passes through a standard convolutional layer to obtain F∈ℝ^C × H × W. Then, we split F into two equal slices along the channel dimension. Thus, we get two tensors F_1∈ℝ^C/2 × H × W([0: C/2) channels) and F_2∈ℝ^C/2 × H × W([C/2: C) channels). We inject identity information by applying a standard AdaIN to F_1. Specifically, first, F_1 is convolved to F_1, and then we perform instance normalization on F_1: F̅_̅1̅=F_1-μ/σ where μ∈ℝ^C/2 and σ∈ℝ^C/2 are the channel-wise means and standard deviations of F_1. Then, we modulate feature maps with scaling parameters γ and shifting parameters β learned from identity embedding Z_id. The modulation process is formulated as: F_1= γ⊙F̅_̅1̅⊕β where γ∈ℝ^C and β∈ℝ^C are generated from Z_id through two fully connected layers and expanded to match the spatial resolution of F̅_̅1̅. ⊙ and ⊕ are element-wise multiplication and addition, respectively. For F_2, to adaptively distinguish valid and invalid pixels during the inpainting process, we apply a spatial attention mechanism following gated convolution <cit.>. Specifically, we generate a soft weight map W using F_2 through a convolutional layer followed by a sigmoid operation to make the values of W between 0 and 1. Finally, the output of the Half-AdaIN is formulated as: F_out= ReLU(F_1 (F_2⊙ W)) where (··) means concatenating two feature maps along the channel dimension and ReLU(·) is ReLU activation function. §.§ Texture Control The texture information of the face component region is difficult to capture due to its small area and diversity. To extract image-specific local texture, we define five face regions with rich textures: Left eye, right eye, left eyebrow, right eyebrow, and lip. For texture control, we explicitly extract the texture information of these regions from the reference image and inject them into the corresponding regions of the corrupted image. 1) Region-Wise Style Code Extraction: First, we obtain the segmentation map S ∈𝕃^N × H × W of the reference image via a well-trained face parsing network <cit.>. Here, N is the number of semantic classes defined by the parsing network. H and W represent the height and width. Then, we can find five pre-defined regions according to S, and distill their style codes from the reference image using the same style encoder of SEAN <cit.>. Specifically, a region-wise pooling layer is applied at the last layer of the style encoder, and we extract a 512-dimensional style code matrix SM ∈ℝ^5 × 512. Note that if a component has any pixels in the non-masked region, we ignore it and fill its style code value with 0. 2) Component-Wise Style Injector (CWSI): The structure of CWSI is shown in Fug. <ref>(c). Let F ∈ℝ^C × H × W denote the input feature maps. The generator must online predict a segmentation map associated with F to locate the five pre-defined regions. To this end, we send F into a segmentation branch to obtain its segmentation map S̅∈𝕃^N × H × W and select the five pre-defined regions S∈𝕃^5 × H × W. The segmentation branch consists of two resnet blocks <cit.> and a softmax layer. We broadcast the style code into the corresponding region according to S through a matrix multiplication: z_style=SM^⊤×S where SM^⊤ denotes the transposed matrix of SM. Thus, z_style∈ℝ^512 × H × W has the same layout as S but is filled by the style codes from SM. Finally, we use a denormalization operation similar to SPADE <cit.> to inject texture features. Specifically, we learn two parameters γ and β from z_style to modulate F: F= ReLU(γ⊙ IN(F) ⊕β) where IN(·) denotes instance normalization. 3) Training Scheme For Texture Control: The success of texture control highly relies on the performance of CWSI's segmentation branch. If we cannot provide aligned supervision signals, texture control will fail, as described in Section 4.8. Ideally, we need an aligned segmentation map S_f to match the current inpainted result online when training, as illustrated in Fig. <ref>(a). In practice, we can only pre-generate S_gt from ground truth as supervision signals for segmentation branches. However, it cannot be guaranteed that S_gt could be aligned with the inpainted result precisely in the working pipeline when the masked region is large, especially for small eye and mouth regions. The general training scheme suffers from always appearing misalignment, if we only utilizes regular masks (inpainting mode) to generate corrupted images, where the training scheme as such is referred to as Single-Mode Training (SMT) depicted in Fig. <ref>(c). To overcome the misalignment problem, we introduce a Three-Mode Training scheme (TMT) with two additional modes referred to as segmentation mode and style extracting mode, as shown in Fig. <ref>(b). Segmentation mode utilizes a small mask that does not cover the face’s central region and takes ground truth as the reference image. Under such settings, we force the generator to focus on improving the performance of the segmentation branch. Style extracting mode employs a special mask corresponding with the five pre-defined facial components to enhance training on the facial components for texture control injection. In two additional modes, S_gt is aligned with the inpainted result because missing regions are set to be small. TMT applies three training modes iteratively for each training step. Specifically, we alternately perform segmentation mode and style extracting mode between two adjacent inpainting modes, as described in Fig. <ref>(d). §.§ Loss Function 1) Pixel Reconstruction Loss ℒ_R calculates the L1 distance between the inpainted image and the ground truth in RGB space. 2) Perceptual Loss ℒ_P <cit.> is used to force the output of the generator to be closer to the ground truth in a pre-trained VGG-19 <cit.> feature space at multiple layers. 3) Identity-preserving Loss ℒ_id is used to force the generated image's identity to be consistent with the reference image's identity. It is formulated as: ℒ_id=1- cos(z_id(I_G), z_i d(I_r)) where cos (·, ·) represents the cosine similarity of two vectors. 4) Semantic Segmentation Loss ℒ_S is employed for training the segmentation branches of CWSI. We supervise the output of each segmentation branch using cross-entropy loss of semantic segmentation task <cit.>. 5) Global Adversarial Loss ℒ_adv,G follows SNPatchGAN <cit.> but with the hinge version <cit.>. It is applied to the entire image and evaluates whether the entire image is coherent as a whole. 6) Local Adversarial Loss ℒ_adv,L is calculated on three sub-regions (left eye, right eye, and mouth) using the same loss function as the global adversarial loss following the previous work <cit.>. Then, the losses of the three regions are summed as the final local adversarial loss. The overall Loss can be written as: ℒ= λ_Rℒ_R + λ_Pℒ_P + λ_idℒ_id + λ_Sℒ_S + ℒ_adv, G + I_adv, Lℒ_adv, L Here, λ_R=20, λ_P=10, λ_id=3, λ_S=2.5. I_adv, L is 1 in inpainting mode and 0 in other modes. § EXPERIMENTS §.§ Dataset Our task needs a high-quality dataset for training. Based on Celeb-ID <cit.>, we build a dataset suitable for our task. Celeb-ID contains around 1700 individual identities and a total of 100K images, but it contains a large number of extremely blurred and occluded photos. We manually eliminated the low-quality images. In the end, our dataset contains a total of 16,259 identities and 94,770 images and at least two photos are provided for each identity. 1,500 identities are used for testing, and the rest are used for training. §.§ Evaluation Metrics 1) Fréchet Inception Distance (FID) <cit.> utilizes a pre-trained Inception-v3 <cit.> network to extract features and measure the distance between generated samples and real samples. It has been widely demonstrated that it is consistent with human visual perception. Lower FID value indicates higher fidelity. 2) Learned perceptual image patch similarity (LPIPS) <cit.> evaluates the similarity between the generated image and the corresponding ground truth in a pairwise manner. A lower LPIPS indicates that the generated image is closer to the target. 3) ID retrieval accuracy (IDR): We randomly select two images as the corrupted images and the reference image for each identity in the test set, respectively. The unselected images are put into a retrieval pool. The identity embeddings are extracted from the inpainted image and the retrieval pool images, using a different face recognition model <cit.>. Then, the pair-wise distance is calculated using cosine similarity. We look for the nearest sample in the retrieval pool for each completed result and check whether they belong to the same identity. The accuracy of such retrieval is reported as identity retrieval accuracy (IDR). §.§ Implementation Details All images are resized to 256 × 256, and the cropped sizes of eyes and mouth are 55 × 60, and 44 × 90, respectively, in calculating the local adversarial loss. In order to simulate a more general application scenario, we use free-form masks with different sizes. We employ Adam <cit.> optimizers for both the generator and the discriminators with momentum β_1=0.5 and β_2=0.999. The learning rate is set to 0.0002. We only update the parameters of the style encoder in style extracting mode. The proposed model is trained for 300 epochs on a single RTX 3090 GPU. §.§ Baselines We introduce additional three types of baselines for an extensive comparison. 1) Reference-Guided Face Inpainting Method: Zhao et al. <cit.> are the most relevant works to our method and also uses a reference image to control inpainted results. 2) General Image Inpainting Method: We investigate the performance of two currently leading inpainting methods, ICT <cit.> and CoMod <cit.>. They show impressive results dealing with large-region masks. 3) Combination Of Image Inpainting And Face Swapping: Because the general inpainting method does not employ the reference image, we combine the image inpainting and face swapping as new baselines for a fairer comparison. Specifically, the results of ICT or CoMod with reference images are fed into a face-swapping method SimSwap <cit.>. SimSwap is capable of transferring the identity of an arbitrary source face into an arbitrary target face. Some famous open-source tools <cit.> are not considered because they require specialized training for different inputs. §.§ Quantitative and Qualitative Comparison Fig. <ref> provides a visual comparison. Zhao et al. <cit.> suffers from serious style inconsistency and misalignment. Since <cit.> directly uses the reference image as the condition, it is difficult for their generator to decompose information into identity and texture from the reference image. General face inpainting <cit.> methods are able to produce visually pleasing results. However, they lack controllability and cannot produce desired results guided by specific reference images. Combination methods can control the inpainted result, but they suffer from several significant drawbacks: (1) Simply combining two methods leads to error accumulation. For example, face swapping will produce unpleasant results if the inpainting method produces some distorted structures. (2) Although the face swapping approach can inject identity information, it ignores the texture information provided by the reference image. Ge et al. <cit.> only employ identity loss to constrain the inpainted results, which cannot effectively preserve identity information. SwapInpaint <cit.> can generate identity-consistent results but ignores local texture information provided by the reference image. Our method can generate high-quality results consistent with the reference image in terms of identity and texture. Significant performance gains benefit from our separate injection of identity and texture information, as well as the end-to-end joint optimization in the proposed comprehensive framework. As shown in Table <ref>, the quantitative results also demonstrate that our method can yield realistic results and maintain a high degree of consistency with reference images. §.§ Cross-Identity Face Inpainting Our model can also achieve cross-identity face inpainting, which is similar to face swapping. However, it should be noted that our task is fundamentally different from face swapping. Face swapping can see the layout of the source image, but our task needs to predict the content in the missing region. Correspondingly, our results are demonstrated in Fig. <ref>. §.§ Separately Control Identity and Texture Due to our decoupled design, our model can flexibly control identity and texture. Furthermore, we use two different reference images to generate identity vectors and style codes to demonstrate how the decoupled controls work in cooperation with each other. Some visual results are shown in Fig. <ref>. §.§ Ablation Study 1) Identity Control: Identity information is introduced to control the identity of the result. We replace all Half-AdaIN with standard convolutional layers but still use identity preserving loss (w AdaIN). As shown in Fig. <ref>, the model without identity control cannot recall the identity information of the reference image. The quantitative results in Table <ref> show the effectiveness of identity control, especially from the perspective of retrieval accuracy. We also report Face Recognition Rate (FRR). Specifically, we utilize a well-trained face recognizer <cit.> to calculate the distance between generated and reference images. The threshold value is set to 0.7 2) Effect of Half-AdaIN: We design Half-AdaIN to inject identity information for generating high-quality results. The distinct point of Half-AdaIN is that it preserves the contextual style from corrupted images. We replace all Half-AdaIN with AdaIN (w/o Half-AdaIN). The visual results drop significantly and produce style inconsistency as illustrated in <ref>. Quantitative results are given in Table <ref>, which indicates that Half-AdaIN contributes to the performance gain. 3) Effect of CWSI: We develop CWSI to effectively control the texture of face component regions. We remove all CWSI in our model as a baseline (w/o CWSI). Fig. <ref> shows that the results generated by baseline are inconsistent with the reference image in texture style. This shows that CWSI can effectively extract the texture information of pre-defined regions from the reference image and inject them into the corresponding regions of the inpainted image. 4) Effect of Training Scheme: Three-mode Training (TMT) scheme is designed for more efficient generation of intermediate segmentation maps and accurate injection of texture features into corresponding regions. We set a baseline ("w SMT") using Single-Mode Training scheme. We apply the masks similar to those of segmentation mode , so the outputs of the segmentation branch should be the same as ground truth segmentation maps. Then, we evaluate the performance of the segmentation branch with the resolution of 128 × 128 for the two different training schemes. Some visual results are shown in Fig. <ref>(a). It is clear that SMT produces more false predictions on small face component regions, especially in mouth and eye regions. Quantitative results in Table <ref> show that TMT helps the generator significantly improve the segmentation branch's performance in terms of Mean Intersection over Union (mIoU) and Pixel Accuracy (Acc). We demonstrate some inpainted examples, as shown in Fig. <ref>(b). We observe an apparent texture inconsistency between SMT's results and the reference images in component regions. This inconsistency is caused by SMT not generating accurate segmentation maps to locate face components. §.§ Cross-Dataset Evaluation To demonstrate the generalization of the proposed method, we conduct a cross-dataset evaluation on CelebA dataset <cit.>. The generator is trained with the Celeb-ID dataset, where we utilize a pre-trained arcface model <cit.> to extract identity vectors. We randomly selected 2000 identities from CelebA dataset and generated masks with random rates. The Qualitative and quantitative comparisons, as shown in Fig. <ref> and Table <ref>, reveal that the proposed method can generate more realistic results and achieve better consistency with reference images. The results in Fig. <ref> demonstrate more results of our model on CelebA dataset. §.§ Failure cases We show some failure cases in Figure <ref>. Our model may produce unsatisfactory results if the input images have extreme poses. There are two reasons for this phenomenon: (1) Most training set images are frontal. Images with extreme poses are rare. Therefore, the generator does not have enough training samples. (2) Face images with extreme poses are difficult to inpaint due to their diversity and complexity. §.§ Efficiency The average running time per image and FLOPs during testing are listed in Table <ref>. This experiment is performed on a NVIDIA RTX 3090 GPU. § CONCLUSION In this paper, we propose a comprehensive framework for reference-guided face inpainting. Our approach can efficiently control the generated results guided by a reference image. To accurately inject two types of control information and produce high-quality results, we gracefully designed modules: Half-AdaIN and CWSI. Half-AdaIN is a variant of AdaIN, which injects identity information while preserving the contextual style of the input face. CWSI can inject component-specific texture information precisely into the corresponding face regions by parsing feature maps. The proposed model can provide separate control for identity and texture over missing regions. Extensive experiments verify the superiority and practicability of our method. However, our method remains limited in processing face images with extreme poses, which needs to be addressed in future work. IEEEtran
http://arxiv.org/abs/2303.06778v1
20230312233818
Sublevel Set Approximation in The Hausdorff and Volume Metric with Application to Path Planning and Obstacle Avoidance
[ "Morgan Jones" ]
math.OC
[ "math.OC" ]
Study of Multiuser Scheduling with Enhanced Greedy Techniques for Multicell and Cell-Free Massive MIMO Networks Saeed Mashdour^⋆, Rodrigo C. de Lamare ^⋆,† and João P. S. H. Lima ^ ^⋆ Centre for Telecommunications Studies, Pontifical Catholic University of Rio de Janeiro, Brazil ^† Department of Electronic Engineering, University of York, United Kingdom ^ CPqD, Campinas, Brazil smashdour@gmail.com, delamare@cetuc.puc-rio.br, jsales@cpqd.com.br This work was supported by CNPq and CPqD. ========================================================================================================================================================================================================================================================================================================================================================================================================== plain plain Under what circumstances does the “closeness" of two functions imply the “closeness" of their respective sublevel sets? In this paper, we answer this question by showing that if a sequence of functions converges strictly from above/below to a function, V, in the L^∞ (or L^1) norm then these functions yield a sequence sublevel sets that converge to the sublevel set of V with respect to the Hausdorff metric (or volume metric). Based on these theoretical results we propose Sum-of-Squares (SOS) numerical schemes for the optimal outer/inner polynomial sublevel set approximation of various sets, including intersections and unions of semialgebraic sets, Minkowski sums, Pontryagin differences and discrete points. We present several numerical examples demonstrating the usefulness of our proposed algorithm including approximating sets of discrete points to solve machine learning binary classification problems and approximating Minkowski sums to construct C-spaces for computing optimal collision-free paths for Dubin's car. § INTRODUCTION The notion of a set is a fundamental object of the modern mathematical toolkit, simply defined as a collection of elements. Sets are ubiquitous throughout control theory and are the language we use to represent frequently encountered concepts such as uncertainty <cit.>, regions of attraction <cit.>, reachable states <cit.>, attractors <cit.>, admissible inputs <cit.>, feasible states <cit.>, etc. Even for simple, low-dimensional problems, such sets can contain vast complexities and be numerically challenging to manipulate and analyze. Take the Lorenz attractor, for example. As modern engineering systems become increasingly complex, we can expect that this problem will be exacerbated as the sets we encounter become ever more unwieldy. In this context, we present several fundamental results for the approximation of sets, along with associated implementable numerical schemes based on Sum-of-Square (SOS) programming. For some given set X ⊂^n, the goal of this paper is to find an outer or inner set approximation of X. Specifically, we would like to compute another set Y ⊂^n such that X ⊆ Y (outer approximation) or Y ⊆ X (inner approximation) and Y ≈ X, where the approximation is defined with respect to some set metric. Previous attempts at solving this set approximation problem were based on the fact that the volume of an ellipsoid, {x ∈^n: x^⊤ A x <0 }, is proportional to (A^-1). Then an equivalent optimization problem can be constructed for computing outer ellipsoid approximations by minimizing the convex objective function -log(A) <cit.>. This approach of determinant maximization has been heuristically generalized to the problem of computing outer SOS polynomial sublevel approximations <cit.>. Alternative heuristic matrix trace maximization schemes have also been proposed <cit.>. More recently, in the special case of using star convex semialgebraic sets, an heuristic approach based on sublevel set scaling has been proposed in <cit.>, demonstrating impressive numerical set approximation results based on SOS programming. An approach based on L^1 maximization, similar to some of the schemes proposed in this paper, has been proposed in <cit.>. However, the work of  <cit.> only considers the specific problem of approximating Pontryagin differences and is still heuristic in the sense that convergence of the proposed numerical schemes is not shown. The only previous work that proposes a non-heuristic numerical method for set approximation is <cit.>. In <cit.> sets defined by quantifiers are approximated in the volume metric to arbitrary accuracy. In this paper we extend <cit.> to the volume metric approximation of more general sets, represented as sublevel sets of integrable functions. Moreover, we propose a new fundamental result for the approximation sets in the Hausdorff metric. Other works that have dealt with the problem of set approximation in the Hausdorff metric include the excellent work of <cit.> that considered the problem of mollifying feasible constraints and helped to inspire the proof of the Hausdorff set approximations in this paper. The main contributions of this paper is to show that when X ⊂^n can be written as a sublevel set of some function V the following holds: * Approximating V in the L^∞ norm from above by some function J yields a sublevel set Y={x ∈Λ : J(x)<γ} that provides an arbitrarily accurate inner approximation of X in the Hausdorff metric. * Approximating V in the L^1 norm from above by some function J yields a sublevel set Y={x ∈Λ : J(x)<γ} that provides an arbitrarily accurate inner approximation of X in the volume metric. The above sublevel set approximation results provide us with guiding principles for the design of numerical procedures for set approximation. Firstly, given a set, X, we must write X as a sublevel set of some function V. Fortunately, this requirement is not difficult to satisfy for many of the sets encountered in control theory and in this work we find V is explicitly for intersections and unions of semialgebraic sets, Minkowski sums, Pontryagin differences and discrete points. Secondly, given a function V we must approximate V from above. That is we must find a function J that minimizes ||V-J|| such that V(x) ≤ J(x), where ||·|| is the L^1 or L^∞ norm. By introducing auxiliary variables we show that this optimization problem can be lifted to a convex optimization problem and solved by tightening the inequality constraints to SOS constraints. Further to this we establish that we can approximate these sets in the Volume/Hausdorff metric by a polynomial sublevel set arbitrarily well by solving the resulting SOS optimization problems with sufficiently large polynomial degrees. §.§ Application to Path Planning and Obstacle Avoidance The path planning of autonomous systems is the computational problem of finding the sequence of inputs that moves a given object from an initial condition to a target set while avoiding obstacles. Computing optimal paths is a well researched subject, with a broad range of practical uses ranging from the navigation of UAVs <cit.> to the precise movements of robotic manipulators <cit.>. Many popular algorithms for solving the path planning problem, such as A^* or Dijkstra, do not inherently account for the size and shape of the object. A common method for overcoming this problem is to transform the workspace of the problem to a Configuration-space (C-space), where in C-space the object is represented by a single point and obstacles are enlarged to account for the loss of size and shape of the object. The enlarged obstacles in C-space are given by the Minkowski sum of the sets representing the object and obstacles. In special convex cases the Minkowski sum can be found as a closed form solution <cit.>, however, unfortunately there is no analytical expression for the Minkowski sum of two general sets. In the absence of an analytical expression for Minkowski sums we rely on numerical approximations. Numerical schemes have previously been proposed for the case of ellipsoid objects and convex objects <cit.> and also for more general sets using SOS and log heuristics <cit.>. In this paper we apply our proposed SOS based numerical scheme for set approximation, with convergence guarantees, to the problem of approximating Minkowski sums in order to construct C-spaces. In this C-space we then apply the methods proposed in <cit.> to compute the optimal input sequence that drives a Dubin's car to a target set in a minimum number of steps while avoiding obstacles. § NOTATION For A ⊂^n we denote the indicator function by 1_A : ^n → that is defined as 1_A(x) = 1 if x ∈ A 0 otherwise. For B ⊆^n, μ(B):=∫_^n1_B (x) dx is the Lebesgue measure of B. We denote the Hausdorff metric (given in Eq. (<ref>)) by D_H and the volume metric (given in Eq. (<ref>)) by D_V. We denote the power set of ^n, the set of all subsets of ^n, as P(^n)={X:X⊂^n }. For two sets A,B ∈^n we denote A/B= {x ∈ A: x ∉ B}. For x ∈^n we denote ||x||_p= ( ∑_i =1^n x_i^p )^1/p. For η>0 and y ∈^n we denote the set B_η(y)= {x∈^n : ||x-y||_2< η}. We say f: Ω→ is such that f ∈ L^1(Ω,) if ||f||_L^1(Ω,):=∫_Ω |f(x)| dx < ∞. We define the L^∞ norm as ||f||_L^∞(Ω,):=sup_x ∈Ω |f(x)|. We denote the space of polynomials p: ^n → by [x] and polynomials with degree at most d ∈ by _d[x]. We say p ∈_2d[x] is Sum-of-Squares (SOS) if there exists p_i ∈_d[x] such that p(x) = ∑_i=1^k (p_i(x))^2. We denote ∑_SOS^d to be the set of SOS polynomials of at most degree d ∈ and the set of all SOS polynomials as ∑_SOS. For two sets A,B ⊂^n we denote the Minkowski sum by A ⊕ B (defined in Eq. (<ref>)) and Pontryagin difference by A ⊖ B (defined in Eq. (<ref>)). If M is a subspace of a vector space X we denote equivalence relation ∼_M for x,y ∈ X by x ∼_M y if x-y ∈ M. We denote quotient space by X M:={{y ∈ X: y ∼_M x }: x ∈ X}. § SUBLEVEL SET APPROXIMATION For a given set X ⊂^n the goal of this paper is to solve the following problem, Y^* ∈inf_Y ∈ C D_S(X,Y), where D_S: P(^n) × P(^n) → [0, ∞) is some set metric providing a notion of how close set Y^* is to X and C ⊂ P(^n) is the set of feasible sets. The decision variables in Opt. (<ref>) are sets, which are uncountable objects. This poses a challenge as it is difficult to search and hence optimize over sets effectively. To make such set optimization problems tractable, we need to find ways to parameterize our decision variables. The approach we take to overcome this problem is to consider problems where both our target set, X, and our decision variable, Y, are sublevel sets of functions, taking the following forms X={x ∈Λ: V(x)<γ} and Y={x ∈Λ: J(x)< γ}, where Λ⊂^n and γ∈. Then, rather than attempting to directly solve the “geometric" set optimiziation problem in Eq (<ref>), we consider the following associated “algebriac" optimization problem, J^* ∈inf_J ∈ F D_F(V,J), where D_F: L^1(^n , ) × L^1(^n , ) → [0,∞) is some function metric providing a notion of the distance between the functions V and J and F is some finite dimensional function space. The decision variables of Opt. (<ref>) are functions and hence can be easily optimized over by parametrizing the decision variables using basis functions. We next turn our attention to the question of when does solving Opt. (<ref>) yield a close solution to Opt. (<ref>)? More specifically, if X={x ∈Λ: V(x)< γ}, Y={x ∈Λ: J(x)< γ} and J ≈ V when is it true that X ≈ Y? In the following subsections we answer this question by showing that, for a given function, V:^n →, a compact set, Λ⊂^n, and a sequence of functions, {J_d}_d ∈, the following hold: * If J_d(x) ≥ V(x) for all x ∈Λ and J_d → V as d →∞ in the L^∞(Λ,^n) norm then for any γ>0 we have that {x ∈Λ: J_d(x)< γ}→{x ∈Λ: V(x)< γ} with respect to the Hausdorff metric (defined in Eq. (<ref>)). * If V(x) ≤ J_d(x) for all x ∈Λ and J_d → V as d →∞ in the L^1(Λ,^n) norm then for any γ>0 we have that {x ∈Λ: J_d(x) < γ}→{x ∈Λ: V(x) < γ} in the volume metric (defined in Eq. (<ref>)). §.§ Sublevel Set Approximation In The Hausdorff Metric For sets A,B ⊂^n, we denote the Hausdorff metric as D_H(A,B), defining D_H(A,B):=max{ H(A,B), H(B,A) } , where H(A,B):=sup_x ∈ A D(x,B) and D(x,B):=inf_y ∈ B{x-y_2}. We now show that uniform convergence of functions yields sublevel approximation in the Hausdorff metric. Consider a compact set Λ⊂^n, a function V : Λ→, and a family of functions {J_d }_d ∈ that satisfies the following properties: * For any d ∈ we have V(x) ≤ J_d(x) for all x ∈Λ. * lim_d →∞sup_x ∈Λ |V(x) -J_d(x)| =0. Then for all γ∈ we have that, lim_d →∞ D_H ({x ∈Λ: J_d(x)< γ},{x ∈Λ: V(x)< γ})=0. Throughout this proof we use the following notation X_d:={x ∈Λ: J_d(x)< γ} and X^*:={x ∈Λ: V(x)< γ}. Now, recall from Eq. (<ref>) that the Hausdorff metric for two sets X_d, X^* ⊂^n is defined as the maximum of two terms, D_H(X_d,X^*):=max{ H(X_d,X^*), H(X^*,X_d) }, where H(X_d,X^*):=sup_x ∈ X_d D(x,X^*) and D(x,X^*):=inf_y ∈ X^*{x-y_2}. This naturally leads us to split the remainder of the proof into two parts. In Part 1 of the proof we show that the first term is such that H(X_d,X^*)=0 for all d ∈. In Part 2 of the proof we show that for all >0 there exists N ∈ such that for all d>N the second term is such that H(X^*,X_d)<. Then Parts 1 and 2 of the proof can be used together to show Eq. (<ref>), completing the proof. Part 1 of proof: In this part of the proof we show H( X_d,X^*)=0 for all d ∈. Since V(x) ≤ J_d(x) for all x ∈Λ it follows that X_d ⊆ X^* for any d ∈. Thus for all d ∈ and x ∈ X_d we have that D(x,X^*)=0. Therefore it clearly follows H(X_d,X^*)=sup_x ∈ X_d D(x,X^*)=0 for all d ∈. Part 2 of proof: In this part of the proof we show that for all >0 there exists N ∈ such that for all d>N we have H(X^*, X_d)<. For contradiction suppose the negation, that there exists δ>0 such that H(X^*, X_d) > δ for all d ∈. Then for each d ∈ there exists x_d ∈ X^* such that D(x_d,X_d) ≥δ for all d ∈. Now, X_d ⊆Λ and Λ is compact. Therefore the sequence {x_d}_d ∈⊆Λ is bounded. Thus, by the Bolzano Weierstrass Theorem (Thm. <ref> found in Appendix <ref>), there exists a convergent subsequence {y_n}_n ∈⊆{x_d}_d ∈. Let us denote the limit point of {y_n}_n ∈ by y^* ∈Λ. Since {x_d}_d ∈ satisfies Eq. (<ref>) and {y_n}_n ∈⊆{x_d}_d ∈ it follows D(y_n,X_n) ≥δ for all n ∈. Moreover, because x_d ∈ X^* for all d ∈ and {y_n}_n ∈⊆{x_d}_d ∈ it follows y_n ∈ X^* for all n ∈. Hence, _n:=γ - V(y_n) >0 for all n ∈. On the other hand, since lim_d →∞sup_x ∈Λ |V(x) -J_d(x)| =0 it follows for each n ∈ there exists N_n ∈ such that J_d(y_n) - V(y_n)< _n for all d> N_n. Since _n := γ - V(y_n) >0, it follows by Eq. (<ref>) that J_d(y_n) < γ for all d> N_n, which implies y_n ∈ X_d for all d> N_n. Now, since y_n → y^* there exists N ∈ such that ||y_n - y^*||_2< δ/4 for all n >N. Fixing n >N and selecting d>max{N,N_n} (as in Eq. (<ref>) so y_n ∈ X_d for d>N_n) we have that D(y_d, X_d)= inf_x ∈ X_d ||y_d - x ||_2 ≤ ||y_d - y_n||_2 ≤ ||y_d - y^*||_2 + ||y_n - y^*||_2 ≤δ/2, contradicting Eq. (<ref>). Thus it follows that for all >0 there exists N ∈ such that for all d>N we have H(X^*, X_d)<. The conditions that V(x) ≤ J_d(x) and lim_d →∞sup_x ∈Λ |V(x) -J_d(x)| =0 in Thm. <ref> cannot be relaxed. In Section <ref> we have presented two counterexamples showing that if either of these conditions are relaxed then it is not necessary true that the sublevel sets of J_d converge to the sublevel set of V in the Hausdorff metric. §.§ Sublevel Set Approximation in The Volume Metric For Lebesgue measurable sets A,B ⊂^n, we denote the volume metric as D_V(A,B), where D_V(A,B):=μ( (A/B) ∪ (B/A) ), recalling from Sec. <ref> that we denote μ(A) as the Lebesgue measure of the set A ⊂^n. Consider a Lebesgue measurable set Λ⊂^n, a function V ∈ L^1(Λ, ), and a family of functions {J_d ∈ L^1(Λ, ): d ∈} that satisfies the following properties: * For any d ∈ we have V(x) ≤ J_d(x) for all x ∈Λ. * lim_d →∞ ||V -J_d||_L^1(Λ, ) =0. Then for all γ∈ we have that lim_d →∞ D_V ({x ∈Λ: J_d(x) < γ} , {x ∈Λ: V(x) < γ}) =0. Let us denote Ṽ(x)=-V(x) and J̃_d(x)= - J_d(x). It follows that J̃_d(x) ≤Ṽ(x) for all x ∈Λ and lim_d →∞ ||Ṽ -J̃_d||_L^1(Λ, ) =0. Therefore, by Prop. <ref> (found in the appendix) it follows that for any γ∈ we have that, lim_d →∞ D_V ({x ∈Λ : Ṽ(x) ≤γ}, {x ∈Λ : J̃_d(x) ≤γ}) =0. Now, Λ={x ∈Λ : V(x) < γ}∪{x ∈Λ : V(x) ≥γ} = {x ∈Λ : V(x) < γ}∪{x ∈Λ : Ṽ(x) ≤ -γ}. Therefore {x ∈Λ : V(x) < γ} = Λ / {x ∈Λ : Ṽ(x) ≤ -γ}, and by a similar argument {x ∈Λ : J_d(x) < γ} = Λ / {x ∈Λ : J̃_d(x) ≤ -γ}. Thus, by Lem. <ref> (found in the appendix) and since {x ∈Λ : J̃_d(x) ≤γ}⊆Λ, we have that D_V ({x ∈Λ : V(x) < γ}, {x ∈Λ : J_d(x) < γ}) = D_V ( Λ/ {x ∈Λ : Ṽ(x) < -γ}, Λ/ {x ∈Λ : J̃_d(x) < -γ}) = D_V ({x ∈Λ : Ṽ(x) ≤ -γ}, {x ∈Λ : J̃_d(x) ≤ -γ}). Now by Eqs (<ref>) and (<ref>) it follows that Eq. (<ref>) holds. § SUBLEVEL SET APPROXIMATION USING SOS PROGRAMMING Given some set X ⊂^n we would like to approximate, Theorems <ref> and <ref> illuminate the following steps we must take: * Write the set X as a sublevel set of some function V. * Approximate the function V by a uniformly bounding function in the L^∞ norm or L^1 norm (depending whether or not the set approximation is required to be with respect to the Hausdorff or volume metric). Step 1 is always viable since by Prop. <ref> (found in the appendix), it follows that for any compact set X ⊂^n there always exists a smooth function V such that X={x ∈^n: V(x) ≤ 0}. However, for numerical implementation it will be necessary to have an analytical expression of such a function V. Later, in the following subsections, we will present several analytical expressions of V for various classes of sets including intersections and unions of semialgebraic sets, Minkowski sums, Pontryagin differences and discrete points. Before proceeding to these subsections we next briefly discuss the general approach we take to solving Step 2 in our strategy, approximating V by a uniformly bounding function in either the L^∞ or L^1 norm. An optimization problem for L^∞ approximation For a given function V ∈ C^∞(^n,) let us consider the problem of approximating V uniformly from above in the L^∞ norm, J_d^* ∈ inf_J_d ∈_d[x]sup_x ∈Λ |V(x)-J_d(x)| such that V(x) ≤ J_d(x) for all x ∈Λ. Unfortunately, the objective function of Opt. (<ref>) , sup_x ∈Λ |V(x)-J_d(x)|, is not differentiable. This lack of differentiability causes problems later as our numerical implementation uses polynomial optimization to solve this problem. Fortunately, it is possible to lift the problem to a convex problem by introducing extra decision variables in the following way, J_d^* ∈ inf_J_d ∈_d[x], P_d ∈_d[x], γ∈γ such that P_d(x) ≤ V(x) ≤ J_d(x) for all x ∈Λ, J_d(x)-P_d(x)< γ for all x ∈Λ. Now, any solution, J_d^*, to Opt. (<ref>) is feasible to Opt. (<ref>) and minimizes the objective of Opt. (<ref>) to a value of less than or equal to γ. An optimization problem for L^1 approximation For a given function V ∈ C^∞(^n,) let us consider the problem of approximating V uniformly from above in the L^1 norm, J_d^* ∈ sup_J_d ∈_d[x]∫_Λ |J_d(x)-V(x)| dx such that V(x) ≤ J_d(x) for all x ∈Λ. Unfortunately, we have a similar problem as we did with Opt. (<ref>), that the objective function of Opt. (<ref>) is not differentiable and hence Opt. (<ref>) is not readily solvable using polynomial optimization. However, since the constraints of Opt. (<ref>) enforce V(x) ≤ J_d(x) it follows that ∫_Λ |J_d(x)-V(x)| dx= ∫_Λ J_d(x) dx- ∫_Λ V(x) dx. Since ∫_Λ V(x) dx is a constant it is equivalent to minimize ∫_Λ J_d(x) dx as it is to minimize ∫_Λ |J_d(x)-V(x)| dx. Hence, rather than solving Opt. (<ref>) we solve, J_d^* ∈ inf_J_d ∈_d[x]∫_Λ J_d(x) dx such that V(x) ≤ J_d(x) for all x ∈Λ. Opt. (<ref>) only yields inner sublevel set approximations of {x ∈Λ: V(x)< γ} since V(x) ≤ J_d(x) implies {x ∈Λ: J_d(x) ≤γ}⊆{x ∈Λ: V(x) ≤γ}. In contrast Opt. (<ref>) yields both inner and outer sublevel set approximations since {x ∈Λ: J_d(x) ≤γ}⊆{x ∈Λ: V(x) ≤γ}⊆{x ∈Λ: P_d(x) ≤γ}. It is also useful to consider a similar optimization problem to Opt. (<ref>) that yields outer sublevel set approximations J_d^* ∈ sup_J_d ∈_d[x]∫_Λ J(x) dx such that J_d(x) ≤ V(x) for all x ∈Λ. SOS implementation of L^∞ and L^1 approximation To solve Opts (<ref>) (<ref>) and (<ref>) we tighten the problem by replacing all inequality constraints to SOS constraints. This tightening results in a SOS optimization problem that yields a single polynomial sublevel set approximation of several types of sets. Unfortunately, it is non-trivial to tighten Opts (<ref>) (<ref>) and (<ref>) because, as we will see, for many set approximation problems the associated V is non-polynomial and hence we cannot directly constrain V(x) ≤ J_d(x) or P_d(x) ≤ V(x) using SOS. In the subsequent subsections we consider the following cases, * V(x)=max_1 ≤ i ≤ m g_i(x) associated with intersections of semialgebraic sets (see Lemma <ref>). * V(x):=min_1 ≤ i ≤ m g_i(x) associated with intersections unions of semialgebraic sets (see Lemma <ref>). * V(x):=inf_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x-w) associated with intersections Minkowski sums (see Lemma <ref>). * V(x):=sup_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x+w) associated with intersections Pontryagin differences (see Lemma <ref>). * V(x):=1-1_{x_i}_i=1^N(x) associated with discrete points (see Lemma <ref>). For brevity we next only discuss the case of using SOS to constrain V(x) ≤ J_d(x) or P_d(x) ≤ V(x) when V(x)=max_1 ≤ i ≤ m g_i(x) and g_i ∈[x] for each 1 ≤ i ≤ m. Other forms of V can also be constrained using a similar approach since, with the exception of discrete points, each V involves max/min operators. For V(x)=max_1 ≤ i ≤ m g_i(x) it is straightforward to constrain V(x) ≤ J_d(x) by enforcing g_i(x) ≤ J_d(x) for 1 ≤ i ≤ m which tightens to the SOS constraint J_d-g_i ∈∑_SOS for 1 ≤ i ≤ m. On the other hand it is slightly more difficult to constrain P_d(x) ≤ V(x). This is because if we set P_d(x) ≤ g_i(x) for all 1 ≤ i ≤ m then P_d(x) ≤min_1 ≤ i ≤ m g_i(x) <max_1 ≤ i ≤ m g_i(x)=V(x) implying that P_d cannot be made arbitrarily close to V since |V(x)-P_d(x)| ≥max_1 ≤ i ≤ m g_i(x)-min_1 ≤ i ≤ m g_i(x)>0. To enforce P_d(x) ≤ V(x) in a non-conservative manner we enforce P_d(x) ≤ g_i(x) for x ∈{y∈Λ: g_i(y)≥ g_j(y) for all i j }. This constraint is now a polynomial inequality over a semialgebraic set and therefore can be readily tightened to an SOS constraint. §.§ Approximation of Semialgebraic Sets In this subsection we solve the problem of approximating semialgebraic sets, sets of the form X={x ∈^n: g_i(x) < 0 for all 1 ≤ i ≤ m }, where g_i ∈[x] for 1 ≤ i ≤ m. Throughout this section we will assume X ⊂^n is a compact set and hence WLOG we assume X={x ∈Λ: g_i(x) < 0 for all 1 ≤ i ≤ m }, where Λ⊂^n is some sufficiently large compact set and g_i ∈[x] for 1 ≤ i ≤ m. In the following Lemma we show that semialgebraic sets can be written as a sublevel set of a single function. Consider X={x ∈Λ: g_i(x) < 0 for all 1 ≤ i ≤ m } then X={x ∈Λ: V(x)<0 }, where V(x):=max_1 ≤ i ≤ m g_i(x). Suppose y ∈ X then g_i(y) < 0 for all 1 ≤ i ≤ m and hence V(y)=max_1 ≤ i ≤ m g_i(y)<0. Hence, y ∈{x ∈Λ: V(x)<0 } implying that X ⊆{x ∈Λ: V(x)<0 }. On the other hand suppose y ∈{x ∈Λ: V(x)<0 }. Then V(y)=max_1 ≤ i ≤ m g_i(y)<0 implying g_i(y) < 0 for all 1 ≤ i ≤ m and hence y ∈ X. Therefore {x ∈Λ: V(x)<0 }⊆ X. Hence {x ∈Λ: V(x)<0 } = X. It is now clear from Lemma <ref> and Theorems <ref> and <ref> that in order to approximate the set in Eq. (<ref>) we must solve Opt. (<ref>) or Opt. (<ref>) for V(x)=max_1 ≤ i ≤ m g_i(x). WLOG we assume Λ⊂^n is a ball with sufficiently large radius, that is Λ={x ∈^n: ||x||_2<r}. We now propose the following SOS tightening of Opt. (<ref>) for V(x):=max_1 ≤ i ≤ m g_i(x), (J_d^*,P_d^*,γ_d^*) ∈inf_J_d ∈_d[x], P_d ∈_d[x], γ∈γ such that (g_i(x) - P_d(x)) - s_i,1(x)(r^2 - ||x||_2^2) - ∑_j=1^m s_i,j,2(x)(g_i(x) - g_j(x)) ∈∑_SOS^d for all 1 ≤ i ≤ m, J_d(x)-g_i(x) - s_i,3(x)(r^2 - ||x||_2^2) ∈∑_SOS^d for all 1 ≤ i ≤ m, γ -( J_d(x)-P_d(x)) -s_4(x)(r^2 - ||x||_2^2) ∈∑_SOS^d, s_i,1(x) ∈∑_SOS^d, s_i,j,2(x) ∈∑_SOS^d, s_i,3(x) ∈∑_SOS^d, s_4(x) ∈∑_SOS^d for all i,j ∈{1,...,m}. In a similar way to how we tightened Opt. (<ref>) to get Opt. (<ref>) we next tighten Opt. (<ref>) for V(x):=max_1 ≤ i ≤ m g_i(x) to get, J_d^* ∈ inf_J_d ∈_d[x]∫_Λ J_d(x) dx such that J_d(x) - g_i(x) - s_i(x)(r^2 - ||x||_2^2) ∈∑_SOS^d for 1 ≤ i ≤ m, s_i(x) ∈∑_SOS^d for 1 ≤ i ≤ m. §.§ Approximation of Unions of Semialgebraic Sets In this subsection we solve the problem of approximating the union of semialgebraic sets, X= ∪_i=1^m_1{x ∈Λ: g_i,j(x) < 0 for all 1 ≤ j ≤ m_2 }, where g_i,j∈[x] for 1 ≤ i ≤ m_1 and 1 ≤ j ≤ m_2. For simplicity we will only consider the case m_2=1. In the following Lemma we show that unions of semialgebraic sets can be written as a sublevel set of a single function. Consider X=∪_i=1^m {x ∈Λ: g_i(x) < 0 } then X={x ∈Λ: V(x)<0 }, where V(x):=min_1 ≤ i ≤ m g_i(x). Follows by a similar argument as Lem. <ref>. To approximate sets of the form given in Eq. (<ref>) we now propose the following SOS tightening of Opt. (<ref>) for V(x):=min_1 ≤ i ≤ m g_i(x), (J_d^*,P_d^*,γ_d^*) ∈inf_J_d ∈_d[x], P_d ∈_d[x], γ∈γ such that (g_i(x) - P_d(x)) - s_i,1(x)(r^2 - ||x||_2^2) ∈∑_SOS^d for all 1 ≤ i ≤ m, (J_d(x)-g_i(x)) - s_i,2(x)(r^2 - ||x||_2^2) - ∑_j=1^m s_i,j,3(x)(g_j(x) - g_i(x)) ∈∑_SOS^d for all 1 ≤ i ≤ m, γ -( J_d(x)-P_d(x)) -s_4(x)(r^2 - ||x||_2^2) ∈∑_SOS^d, s_i,1(x) ∈∑_SOS^d, s_i,2(x) ∈∑_SOS^d, s_i,j,3(x) ∈∑_SOS^d, , s_4(x) ∈∑_SOS^d for all i,j ∈{1,...,m}. We next propose the following SOS tightening of Opt. (<ref>) for V(x):=min_1 ≤ i ≤ m g_i(x), J_d^* ∈ sup_J_d ∈_d[x]∫_Λ J_d(x) dx such that g_i(x) - J_d(x) - s_i(x)(r^2 - ||x||_2^2) ∈∑_SOS^d for 1 ≤ i ≤ m, s_i (x)∈∑_SOS^d for 1 ≤ i ≤ m. Note, solving Opt. (<ref>) results in both a lower (P_d) and upper (J_d) approximation of V(x):=min_1 ≤ i ≤ m g_i(x), whereas, solving Opt. (<ref>) only results in a lower approximation. Unfortunately, Theorems <ref> and <ref> only apply for upper function approximations and hence we are unable to use these theorems to show Opt. (<ref>) yields an arbitrary accurate sublevel set approximation of the set given in Eq. (<ref>). We could construct a similar SOS problem to Opt. (<ref>) that results in a upper approximation in a non-conservative way using a similar argument as in Eq. (<ref>) but this would result in more SOS decision variables. Alternatively, we will later show that Opt. (<ref>) yields a sublevel approximation to the non-strict/relaxed version the set given of Eq. (<ref>). That is, Opt. (<ref>) can be used to approximate the following set, X= ∪_i=1^m{x ∈Λ: g_i(x) ≤ 0}, where g_i ∈[x] for 1 ≤ i ≤ m. §.§ Approximation of Minkowski Sums Given two sets A,B ⊂^n their Minkowski sum is defined as A ⊕ B = {a+b ∈^n : a ∈ A and b ∈ B }. We next consider the problem of approximating the set X=A ⊕ B, where A,B ⊂^n can be written as sublevel sets. That is we consider the problem of approximating the following, X={x ∈Λ: g_1(x) ≤ 0 }⊕{x ∈Λ: g_2(x) ≤ 0 }, where g_1,g_2 ∈ C^∞. Note that this is non-restrictive since Prop. <ref> shows any compact set can be written as a sublevel set and Lemmas <ref> and <ref> give this sublevel set in an analytical form for intersections or unions of semialgebraic sets. In the following lemma we show sets satisfying Eq. (<ref>) can be written as the sublevel set of a single function. Consider X:={x ∈Λ: g_1(x) ≤ 0 }⊕{x ∈Λ: g_2(x) ≤ 0 }, where Λ⊂^n is a compact set and g_1,g_2 ∈ C(Λ,), then X={x ∈Λ: V(x) ≤ 0 }, where V(x):=inf_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x-w). Suppose x ∈ X then there exists z_1 ∈{x ∈Λ: g_1(x) ≤ 0 } and z_2 ∈{x ∈Λ: g_2(x) ≤ 0 } such that x =z_1+z_2. Hence, V(x)= inf_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x-w) ≤ g_1(x-z_2)= g_1(z_1) ≤ 0, since z_1 ∈{x ∈Λ: g_1(x) ≤ 0 }. Therefore, x ∈{y ∈Λ: V(y) ≤ 0 } implying X ⊆{x ∈Λ: V(x) ≤ 0 }. On the other hand suppose x ∈{y ∈Λ: V(y) ≤ 0 }. Note that by Lem. <ref> (found in the appendix) it follows that {z ∈Λ: g_2(z) ≤ 0 } is compact. Now, by the extreme value theorem, continuous functions attain their extreme values over compact sets implying that there exists z_2 ∈inf_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x-w) such that g_1(x-z_2)=V(x). Let z_1=x-z_2. Because V(x) ≤ 0 it follows that g_1(z_1)= g_1(x-z_2)=V(x) ≤ 0. Hence, z_1 ∈{x ∈Λ: g_1(x) ≤ 0 }. Therefore it follows that x ∈ X and hence X ⊂{y ∈Λ: V(y) ≤ 0 }. Thus X={x ∈Λ: V(x) ≤ 0 }. For simplicity we next consider the special case of approximating A ⊕ B where A is a union of sublevel sets and B is a semialgebraic set. That is we consider the problem of approximating the following set, X:= ∪_i=1^m_1{x ∈Λ: g_1,i(x) ≤ 0 } ⊕{x ∈Λ: g_2,j(x) ≤ 0 for 1 ≤ j ≤ m_2 }, where g_1,i, g_2,j∈[x] for all 1 ≤ i ≤ m_1 and 1 ≤ j ≤ m_2. Other cases where one or both of A or B is a union or intersection of semialgebraic sets can be handled by a similar methodology. Now, by similar arguments to Lemmas <ref> and <ref> and the use of Lemma <ref> it is clear that X, given in Eq. (<ref>), is such that X={x ∈Λ: V(x) ≤ 0 } where V(x)=inf_w ∈{z ∈Λ: max_1 ≤ j ≤ m_2 g_2,j(z) ≤ 0 }min_1 ≤ i ≤ m_1 g_1,i(x-w). Unlike in Subsections <ref> and <ref>, in this subsection we do not provide a SOS tightening of Opt. (<ref>) due to the complexity of using SOS to enforce the constraint V(x)≤ J_d(x) when V is given in Eq. (<ref>). Indeed, we could increase the problems dimension and enforce, J_d(x) - g_1,i(x-w) - s_i,0(x,u,w)(g_1,i(x-u) - g_1,i(x-w)) -∑_j=1^m_2 s_i,j,1(x,w,u)(g_1,j(x-w) -g_1,i(x-w)) + ∑_j=1^m_2 s_i,j,2(x,w,u)g_2,j(w)+ ∑_j=1^m_2 s_i,j,3(x,w,u)g_2,j(u) - s_i,4(x,w,u)(r^2 - ||(x,u,w)||_2^2) ∈∑_SOS for 1 ≤ i ≤ m_1, s_i,0,s_i,j,1, s_i,j,2, s_i,j,3, s_i,4∈∑_SOS for 1 ≤ i ≤ m_1 & 1 ≤ j≤ m_2 However, this approach results in a very large SOS optimization problem. Fortunately, it is relatively easy to enforce the constraint J_d(x) ≤ V(x). This is the only constraint that is required to be tightened in Opt. (<ref>). Thus, to approximate sets of the form given in Eq. (<ref>) we now propose the following SOS tightening of Opt. (<ref>) for V(x):=inf_w ∈{z ∈Λ: max_1 ≤ j ≤ m_2 g_2,j(z) ≤ 0 }min_1 ≤ i ≤ m_1 g_1,i(x-w), J_d^* ∈ sup_J_d ∈_d[x]∫_Λ J_d(x) dx such that g_1,i(x-w) - J_d(x) - s_i,1(x,w)(r^2 - ||(x,w)||_2^2) +∑_j=1^m_2 s_i,j,2(x,w)g_2,j(w) ∈∑_SOS^d for 1 ≤ i ≤ m_1, s_i,1(x) ∈∑_SOS^d for 1 ≤ i ≤ m_1, s_i,j,2(x) ∈∑_SOS^d for 1 ≤ i ≤ m_1 and 1 ≤ j ≤ m_2. §.§ Approximation of Pontryagin Differences Given two sets A,B ⊂^n their Pontryagin difference is defined as A ⊖ B = {a ∈ A: a+b ∈ A for all b ∈ B }. We next show that the Pontryagin difference of two sublevel sets can be written as a sublevel set of a single function. Consider X:={x ∈Λ: g_1(x) < 0 }⊖{x ∈Λ: g_2(x) ≤ 0 }, where Λ⊂^n is a compact set and g_1,g_2 ∈ C(Λ,), then X={x ∈Λ: V(x) < 0 }, where V(x):=sup_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x+w). We first show Eq. (<ref>). Suppose x ∈ X then it must follow that g_1(x+w)<0 for all w ∈{z ∈Λ: g_2(z) ≤ 0 }. Note that by Lem. <ref> (found in the appendix) it follows that {z ∈Λ: g_2(z) ≤ 0 } is compact. Now, by the extreme value theorem continuous functions attain their extreme values over compact sets implying that there exists w^* ∈{z ∈Λ: g_2(z) ≤ 0 } such that g_1(x+w^*)=sup_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x+w). Hence V(x)=sup_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x+w)=g_1(x+w^*)<0 implying that x ∈{z ∈Λ: V(z) < 0 } and hence X ⊆{x ∈Λ: V(x) < 0 }. On the other hand if x ∈{z ∈Λ: V(z) < 0 } it follows that sup_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x+w)<0. Hence, g_1(x+w) ≤sup_w ∈{z ∈Λ: g_2(z) ≤ 0 } g_1(x+w) < 0 for all w ∈{z ∈Λ: g_2(z) ≤ 0 } implying x+w ∈{x ∈Λ: g_1(x) < 0 } for all w ∈{z ∈Λ: g_2(z) ≤ 0 } . Thus it follows that x ∈ X. For simplicity we consider the special case of approximating A ⊖ B where both A and B are semialgebraic sets. Other cases where one or both of A or B is a union or intersection of semialgebraic sets can be handled by a similar methodology. That is we consider the problem of approximating the following set, X:= {x ∈Λ: g_1,i(x) < 0 for 1 ≤ i ≤ m_1 } ⊖{x ∈Λ: g_2,j(x) ≤ 0 for 1 ≤ j ≤ m_2 }, where g_1,i, g_2,j∈[x] for all 1 ≤ i ≤ m_1 and 1 ≤ j ≤ m_2. Other cases where one or both of A or B is a union or intersection of semialgebraic sets can be handled by a similar methodology. Now, by Lemmas <ref> and <ref> it is clear that X, given in Eq. (<ref>), is such that X={x ∈Λ: V(x) < 0 } where V(x)=sup_w ∈{z ∈Λ: max_1 ≤ j ≤ m_2 g_2,j(z) ≤ 0 }max_1 ≤ i ≤ m_1 g_1,i(x+w). Similarly to Subsection <ref>, we do not provide a tightening of the Opt. (<ref>) due to the complexity of using SOS to enforce the constraint J_d(x) ≤ V(x) when V is given in Eq. (<ref>) To approximate sets given in Eq. (<ref>) we now propose the following SOS tightening of Opt. (<ref>) for V(x):=sup_w ∈{z ∈Λ: max_1 ≤ j ≤ m_2 g_2,j(z) ≤ 0 }max_1 ≤ i ≤ m_1 g_1,i(x+w), J_d^* ∈ inf_J_d ∈_d[x]∫_Λ J_d(x) dx such that J_d(x)- g_1,i(x+w) - s_i,1(x,w)(r^2 - ||(x,w)||_2^2) +∑_j=1^m_2 s_i,j,2(x,w)g_2,j(w) ∈∑_SOS^d for 1 ≤ i ≤ m_1, s_i,1∈∑_SOS^d for 1 ≤ i ≤ m_1, s_i,j,2∈∑_SOS^d for 1 ≤ i ≤ m_1 and 1 ≤ j ≤ m_2. §.§ Approximation of Discrete Points In this section we consider the problem of approximating a set of discrete points, {x_i}_i=1^N ⊂^n. We first note that it is possible to write a set of discrete points as a sublevel set of a polynomial without any computation by considering the function V(x)= ∏_i=1^N (x_i - x)^2. However, this polynomial function has a very large degree, double the number of data points. We next show that sets of discrete points can be written as a sublevel set of a simpler function. This will allow us to derive an SOS optimization problem to approximate this simple function by a polynomial with relatively small degree, yielding a low degree polynomial sublevel approximation of {x_i}_i=1^N ⊂^n. Consider X={x_i}_i=1^N ⊂Λ. Then X={x ∈Λ: V(x) ≤ 0 }, where V(x)=1-1_{x_i}_i=1^N(x). Follows trivially. We do not provide an SOS tightening for Opt. (<ref>) when V(x)=1-1_{x_i}_i=1^N(x) because in order for us to prove that the resulting polynomial sublevel set approximation can be arbitrarily small with respect to the Hausdorff metric we rely on Thm. <ref>. Thm. <ref> requires that our polynomial approximations of V converge in the L^∞ norm. Unfortunately, this V is not continuous so it is not possible to approximate it uniformly using smooth functions like polynomials. Fortunately, V is an integrable function so it is possible to approximate it by a polynomial in the L^1 norm using the following SOS tightening of Opt. (<ref>), J_d^* ∈ sup_J_d ∈_d[x]∫_Λ J_d(x) dx such that J_d(x_i) <0 for 1 ≤ i ≤ N, 1-J_d(x) - s_0(x)(r^2 -||x||_2^2) ∈∑_SOS^d, s_0(x) ∈∑_SOS^d. § CONVERGENCE OF OUR PROPOSED SOS PROGRAMS In the previous sections we proposed several SOS optimization problems to approximate various functions, V, whose sublevel sets yield several important classes of sets (intersections and unions of semialgebraic sets, Minkowski sums, Pontryagin differences and discrete points). In this section we use Theorems <ref> and <ref> to prove that the sequences of solutions to our SOS problems produce sequences of sublevel sets that each converge to the associated target set in the Hausdorff or volume metric. We begin this section with showing convergence in the Hausdorff metric. It holds that, lim_d →∞ D_H ({x ∈Λ: J_d^*(x)<0} , X ) =0, {x ∈Λ: J_d^*(x)<0}⊆ X, where Λ:={x ∈^n: ||x||_2 ≤ r} and the set X and the sequence of functions {J_d^*}_d ∈⊂[x] satisfy either of the following: * X is a semialgebraic set, given by Eq. (<ref>), and {J_d^*}_d ∈⊂[x] solve the family of d-degree SOS optimization problems given in Eq. (<ref>). * X is a union of semialgebraic sets given by Eq. (<ref>) and {J_d^*}_d ∈⊂[x] solve the family of d-degree SOS optimization problems given in Eq. (<ref>). Convergence to semialgebraic sets: We first prove the first case where X is a semialgebraic set, given by Eq. (<ref>), and {J_d^*}_d ∈⊂[x] solve the family of d-degree SOS optimization problems given in Eq. (<ref>). Now, it follows that if we show that J_d^*(x) ≥ V(x) for all x ∈Λ, lim_d →∞||J_d^*-V||_L^∞(Λ,)=0, where V(x):=max_1 ≤ i ≤ m g_i(x), then Eqs (<ref>) and (<ref>) hold and the proof is complete. This is because Lem. <ref> shows that X={x ∈Λ: V(x)<0} and therefore if Eq. (<ref>) holds then clearly Eq. (<ref>) must hold. Moreover, if Eqs (<ref>) and (<ref>) hold then by Theorem <ref> it must follow that lim_d →∞ D_H ({x ∈Λ: J_d^*(x)<0} , {x ∈Λ: V(x)<0} ). It is then clear Eq. (<ref>) holds. We first show Eq. (<ref>). Because J_d^* solves Opt. (<ref>) it follows that it must be feasible to Opt. (<ref>) and hence satisfies each constraint. In particular there must exist SOS variables s_2,i∈∑_SOS^d such that J_d^*(x) - g_i(x) -s_2,i(x)(r^2 - ||x||_2^2) ∈∑_SOS^d for 1 ≤ i ≤ m. Hence, it follows by Eq. (<ref>) and the positivity of SOS polynomials that J_d^*(x) ≥ g_i(x) for all x ∈Λ and 1≤ i ≤ m. Therefore J_d^*(x) ≥max_1 ≤ i ≤ m g_i(x)=V(x) and thus Eq. (<ref>) holds. We next show that Eq. (<ref>) holds. Let >0, by Cor. <ref>, found in Appendix <ref>, there exists H_1,H_2 ∈[x] such that, sup_ x ∈Λ |V(x) - H_j(x) | < /4 for j ∈{1,2}, H_1(x) > g_i(x) for all x ∈ B_r(0) and 1 ≤ i ≤ m, H_2(x) < g_i(x) for all x ∈ B_r(0) ∩Y̅_̅i̅ and 1 ≤ i ≤ m, where Y̅_̅i̅ :={y ∈Λ: g_i(y) ≥ g_j(y) for 1 ≤ j ≤ m }. Since H_1(x)-g_i(x) >0 for all x ∈ B_r(0) and 1 ≤ i ≤ m and also since B_r(0) is compact semialgebraic set it follows by Thm. <ref> that there exists SOS polynomials {s_2,i}_i ∈{1,..,m}⊂∑_SOS and s_0,1 ∈∑_SOS such that, H_1(x)-g_i(x)-s_2,i(x)(r^2 - ||x||_2^2)=s_0,1 (x). Moreover, by a similar argument, since g_i(x)- H_2(x) >0 for all x ∈ B_r(0) ∩Y̅_̅i̅ and 1 ≤ i ≤ m and also since B_r(0)∩Y̅_̅i̅ is compact semialgebraic set it follows by Thm. <ref> that there exists SOS polynomials {s_1,i,j}_(i,j) ∈{1,..,m}×{1,..,m}⊂∑_SOS, {s_1,i}_i ∈{1,..,m}⊂∑_SOS and s_0,2 ∈∑_SOS such that, g_i(x)-H_2(x) -s_1,i(x) (r^2 - ||x||_2^2) -∑_j=1^m s_1,i,j(x)(g_i(x)-g_j(x)) =s_0,2(x). Now clearly, H_2(x)< max_1 ≤ i ≤ m g_i(x) =V(x)< H_1(x) for all x ∈ B_r(0) implying γ_H -(H_2(x) - H_1(x)) ≥ (H_2(x) - H_1(x)) = (H_2(x)-V(x))+ (V(x) - H_1(x))>0 for all x ∈ B_r(0), where γ_H :=2 sup_x ∈ B_r(0){H_2(x) - H_1(x)}. Therefore by Thm. <ref> there exists SOS polynomials s_3∈∑_SOS and and s_0,3 ∈∑_SOS such that, γ_H -(H_2(x) - H_1(x)) -s_3(x)(r^2 - ||x||_2^2) =s_0,3(x). Furthermore, by Eq. (<ref>) it follows that γ_H≤ 2sup_x ∈ B_r(0)|H_2(x)-V(x)| + 2sup_x ∈ B_r(0)|V(x)-H_1(x)| < . Now, let d_0:=max{ deg(H_1),deg(H_2), max_i,j ∈{1,...,m}{s_1,i,j}, max_i ∈{1,...,m}{s_2,i}, s_3, max_i ∈{1,2,3}{s_0,i}}. It then follows by Eqs (<ref>), (<ref>) and (<ref>) that (H_2,H_1,γ_H) is a feasible solution to Opt. (<ref>) for degree d ≥ d_0. Hence, the value of the objective resulting from the optimal solutions, (J_d^*,P_d^*, γ_d^*) for d ≥ d_0, will be less than or equal to the value of the objective function resulting from the feasible solution (H_2,H_1,γ_H). Therefore by Eq. (<ref>) we have that, γ^*_d≤γ_H< for all d ≥ d_0. Now, since (J_d^*,P_d^*, γ_d^*) is the optimal solution to Opt. (<ref>) it satisfies all of the constraints of Opt. (<ref>). Since SOS polynomials are non-negative it then follows J^*_d(x) ≥ g_i(x) for all x ∈ B_r(0) and 1 ≤ i ≤ m, P^*_d(x) ≤ g_i(x) for all x ∈ B_r(0) ∩Y̅_̅i̅ and 1 ≤ i ≤ m, J^*_d(x)- P^*_d(x) ≤γ_d^* for all x ∈ B_r(0), implying P^*_d(x) ≤ V(x) ≤ J^*_d(x) for all B_r(0) and hence |J^*_d(x) - V(x)| = J^*_d(x) - V(x) ≤ J^*_d(x) - P^*_d(x) ≤γ_d^* for all x ∈ B_r(0). Therefore, by Eqs (<ref>) and (<ref>) it follows that sup_x ∈ B_r(0) |J^*_d(x) - V(x)|≤γ_d^*< for d ≥ d_0. Now, >0 was arbitrarily chosen and thus Eq. (<ref>) shows Eq. (<ref>), completing the proof. Convergence to unions of semialgebraic sets: Consider the case when X is given by Eq. (<ref>) and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). Then Eqs (<ref>) and (<ref>) hold by a similar argument to the proof of convergence to to semialgebraic sets, where instead of showing lim_d →∞||J_d^*-max_1 ≤ i ≤ m g_i||_L^∞(Λ,)=0 (as in Eq. (<ref>)) we show lim_d →∞||J_d^*-min_1 ≤ i ≤ m g_i||_L^∞(Λ,)=0. Note, the solutions, {J_d}_d ∈, to Opts (<ref>) and (<ref>) provide inner sublevel set approximations as shown in Eq. (<ref>). However, it is still possible to construct an outer sublevel set approximation using P_d^* since in both cases P_d^*(x) ≤ V(x) and lim_d →∞ ||P_d- V||_L^∞(Λ,)=0. Unfortunately, as shown in Counterexample <ref> (found in the appendix), it is not necessarily true that {x ∈Λ: P^*_d(x)<γ}→{x ∈Λ: V(x)<γ} in the Hausdorff metric. Fortunately, it is fairly straight forward to show {x ∈Λ: P^*_d(x) ≤γ}→{x ∈Λ: V(x) ≤γ} in the volume metric using Prop. <ref>. We next use Theorem <ref> to show that the SOS programs we proposed in Section <ref>, that approximate in the L^1 norm from above, yield polynomial sublevel sets that converge in the volume metric to semialgebraic sets or Pontryagin differences. It holds that, lim_d →∞ D_V ({x ∈Λ: J_d^*(x) < 0} , X ) =0, {x ∈Λ: J_d^*(x)<0}⊆ X, where Λ:={x ∈^n: ||x||_2 ≤ r} and the set X and the sequence of solutions {J_d^*}_d ∈⊂[x] satisfy either of the following: * X is a semialgebraic set, given by Eq. (<ref>), and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). * X is a Pontryagin difference, given by Eq. (<ref>), and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). Convergence to semialgebraic sets: We first show Eqs (<ref>) and (<ref>) hols in the case X is a semialgebraic set, given by Eq. (<ref>), and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). Now, it follows that if we show that J_d^*(x) ≥ V(x) for all x ∈Λ, lim_d →∞||J_d^*-V||_L^1(Λ,)=0, where V(x):=max_1 ≤ i ≤ m g_i(x), then Eqs (<ref>) and (<ref>) hold and the proof is complete. This is because by Lem. <ref> we have that X={x ∈Λ: V(x)<0}. Then if Eqs (<ref>) and (<ref>) hold then clearly Eq. (<ref>) is satisfied and, by Thm. <ref>, it must follow that lim_d →∞ D_V({x ∈Λ: J_d^*(x)<0} , {x ∈Λ: V(x)<0} ). It is then clear Eq. (<ref>) holds. We first show Eq. (<ref>). Because J_d^* solves Opt. (<ref>) it follows that it must be feasible to Opt. (<ref>) and hence satisfies each constraint. In particular there must exist SOS variables s_i∈∑_SOS^d such that J_d^*(x) - g_i(x) -s_i(x)(r^2 - ||x||_2^2) ∈∑_SOS^d for 1 ≤ i ≤ m. Hence, it follows by Eq. (<ref>) and the positivity of SOS polynomials that J_d^*(x) ≥ g_i(x) for all x ∈Λ and 1≤ i ≤ m. Therefore J_d^*(x) ≥max_1 ≤ i ≤ m g_i(x)=V(x) and thus Eq. (<ref>) holds. We next show Eq. (<ref>). Consider the sequence of functions, {G_d^*}_d ∈⊂[x], that solve the family of d-degree SOS optimization problems given in Eq. (<ref>). This sequence of functions is also feasible to Opt. (<ref>). Therefore the value of the objective function of Opt. (<ref>) resulting from G_d^* will be greater than the optimal solution J_d^*. That is ∫_Λ J_d^*(x) dx ≤∫_Λ G_d^*(x) dx. Moreover, by Eq. (<ref>), in the proof of Thm. <ref>, we have that lim_d →∞||G_d^*-V||_L^∞(B_r(0),)=0. Hence, lim_d →∞∫_Λ |V(x) - J_d^*(x)| dx = lim_d →∞∫_Λ V(x) - J_d^*(x) dx ≤lim_d →∞∫_Λ V(x) - G_d^*(x) dx ≤lim_d →∞μ(Λ) ||V-G_d||_L^1(B_r(0),)=0. Therefore, Eq. (<ref>) is shown completing the proof. Convergence to Pontryagin differences: Consider the case where X is given by Eq. (<ref>), and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). Note, in Eq. (<ref>) that it was shown that X={x ∈Λ: V(x) < 0 }, where V(x):=sup_w ∈{z ∈Λ: max_1 ≤ i ≤ m_2 g_2,i(z) ≤ 0 }max_1 ≤ i ≤ m_1 g_1,i(x-w). The rest of the proof follows by a similar argument to the convergence to semialgebraic sets proof, where we use Cor. <ref> (found in the appendix) to approximate V uniformly from above by a polynomial. We then show that this polynomial approximation is feasible to Opt. (<ref>) for sufficiently large d ∈ using Theorem <ref> (found in the appendix). Because this feasible solution to Opt. (<ref>) is arbitrarily close to V, it can then be shown that the true solution of Opt. (<ref>) approximates V from above with arbitrary precision with respect to the L^1 norm. Hence, Eq. (<ref>) follows by Thm. <ref>. It is also clear that Eq. (<ref>) since J_d^*(x) ≥ V(x). Thm. <ref> shows that the SOS programs we proposed in Section <ref>, that approximate in the L^1 norm from above, converge to various sets defined by strict sublevel sets. We next show that the SOS programs we proposed in Section <ref>, that approximate in the L^1 norm from below, yield polynomial sublevel sets that converge in the volume metric to unions of semialgebraic sets or Minkowski sums or discrete points defined by non-strict sublevel sets. It holds that, lim_d →∞ D_V ({x ∈Λ: J_d^*(x) ≤ 0} , X ) =0, X ⊆{x ∈Λ: J_d^*(x) ≤ 0}, where Λ:={x ∈^n: ||x||_2 ≤ r} and the set X and the sequence of solutions {J_d^*}_d ∈⊂[x] satisfy either of the following: * X is a union of semialgebraic sets, given by Eq. (<ref>), and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). * X is a Minkowski sum, given by Eq. (<ref>), and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). * X is a set of discrete points, given by X={x_i}_i=1^N⊂^n, and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). Convergence to unions of semialgebraic sets: Consider the case when X is given by Eq. (<ref>) and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). By a similar argument to the proof of Thm. <ref> that showed Eqs (<ref>) and (<ref>) hold, it is possible to use Prop. <ref> to show that V(x) ≥ J_d^*(x) for all x ∈Λ, lim_d →∞||J_d^*-V||_L^1(Λ,)=0, for V(x):=min_1 ≤ i ≤ m g_i(x). Then by Prop. <ref> it follows that lim_d →∞ D_V({x ∈Λ: V(x) ≤ 0}, {x ∈Λ: J_d(x) ≤ 0 } )=0. By a similar argument to Lem. <ref> it follows that X={x ∈Λ: V(x) ≤ 0}, where X is given by Eq. (<ref>). Therefore it is clear Eq. (<ref>) holds. Moreover, since V(x) ≥ J_d^*(x) it is clear that Eq. (<ref>) holds. Convergence to Minkowski sums: Consider the case where X is given by Eq. (<ref>), and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). Note in Eq. (<ref>) that it was shown that X={x ∈Λ: V(x) ≤ 0 }, where V(x):=inf_w ∈{z ∈Λ: max_1 ≤ i ≤ m_2 g_2,i(z) ≤ 0 }min_1 ≤ i ≤ m_1 g_1,i(x-w). The rest of the proof follows by a similar argument to the convergence to unions of semialgebraic sets proof, where we use Lem. <ref> (found in the appendix) to approximate V uniformly from below by a polynomial. We then show this polynomial approximation is feasible to Opt. (<ref>) for sufficiently large d ∈ using Theorem <ref> (found in the appendix). Because this feasible solution to Opt. (<ref>) is arbitrarily close to V, it can then be shown that the true solution of Opt. (<ref>) approximates V from below with arbitrary precision with respect to the L^1 norm. Hence, Eq. (<ref>) follows by Prop. <ref>. Moreover, since V(x) ≥ J_d^*(x) it is clear that Eq. (<ref>) holds. Convergence to Discrete Points: Consider the case where X={x_i}_i=1^N, and {J_d^*}_d ∈⊂[x] is given in Eq. (<ref>). Note in Lem. <ref> it was shown that X={x ∈Λ: V(x) ≤ 0 }, where V(x):=1 - 1_{x_i}_i=1^N(x). The rest of this proof again follows by a similar argument to proof of convergence to unions of semialgebraic sets or Minkowski sums. This time we use Prop. <ref> to approximate V uniformly from below by a polynomial. We then show that this polynomial is feasible to Opt. (<ref>) for sufficiently large enough degree using Theorem <ref>. Because this feasible solution to Opt. (<ref>) is arbitrarily close to V, it can then be shown that the true solution of Opt. (<ref>) approximates V from below with arbitrary precision with respect to the L^1 norm. Hence, Eq. (<ref>) follows by Prop. <ref>. Moreover, since V(x) ≥ J_d^*(x) it is clear that Eq. (<ref>) holds. § NUMERICAL EXAMPLES In this section we use the SOS programs we proposed in Sec. <ref> to approximate various sets. We first approximate unions of semialgebraic sets in the Hausdorff and volume metric. We then approximate Minkowski sums and Pontryagin differences in the volume metric. We finish the section with three numerical examples that have practical motivations, the approximation of Region of Attractions (ROAs) and attractor sets of nonlinear systems via the outer bounding sets of discrete points, and the Minkowski sum of obstacles and vehicle shape sets to construct a C-space in which collision free path planning can be computed in. All SOS programs are solved using Yalmip <cit.> with SDP solver Mosek <cit.>. [Approximation of unions of semialgebraic sets] Consider the union of semialgebraic sets ∪_i=1^3 X_i= ∪_i=1^3 {x ∈^2: g_i(x)<0 } where g_1(x) = x_1^2 + x_2^2 -0.075 , g_2(x) = (x_1-0.15)^2 + (x_2-0.15)^2 -0.025, g_3(x) = (x_1+0.25)^2 + (x_2 + 0.25)^2 -0.001. In Fig. <ref> we have plotted ∪_i=1^3 X_i as the green region along with several approximations of the form {x∈^n: P(x)<0 }. For our Hausdorff approximation P=P_d and P_d is found by solving SOS Opt. (<ref>). For our volume approximation P=J_d and J_d is found by solving SOS Opt. (<ref>). Fig. <ref> shows several outer approximations for d=2,10 & 18. As expected from the convergence proofs given in Sec. <ref>, in both cases we see as the degree increases our set approximation improves. Interestingly the degree 18 Hausdorff approximation seems to give a better representation of the topology than the degree 18 volume approximation by showing some separation between X_2 and X_3. [Approximation of Minkowski sums and Pontryagin differences] In <cit.> the Minkowski sum of the following sets was heuristically approximated, X_1 ={x ∈^2:x_1^2+x_2^2 - 0.25^2<0 } X_2 = {x ∈^2: x_1-0.5<0, -0.5-x_1<0, -x_2-0.5<0, x_2-x_1-0.5<0,x_1+x_2-0.5<0 } In Fig <ref> we have plotted both the sets X_1 and X_2 as the gold and purple regions respectively (note that there is an axis scale change between Sub-figures <ref> and <ref>). In Fig. <ref> we have plotted X_1 ⊕ X_2 as the green region, which was found by discretizing both X_1 and X_2 and adding each element together. We have also plotted our outer approximations of X_1 ⊕ X_2 that take the form {x∈^2: J_d(x) ≤ 0} where J_d is found by solving SOS Opt. (<ref>) for d=2,6 & 12. In Fig. <ref> we have plotted X_1 ⊖ X_2 as the green region, which was found by discretizing both X_1 and X_2. We have also plotted our inner approximations of X_1 ⊖ X_2 that take the form {x∈^2: J_d(x) < 0} where J_d is found by solving SOS Opt. (<ref>) for d=8,10 & 16. As expected from the convergence proofs given in Sec. <ref>, in both cases we see as the degree increases our set approximation improves. [Approximation of ROAs] The ROA is defined as the set of initial conditions for which a systems trajectories tend to an equilibrium point. We next consider the problem of approximating the ROA of the single machine infinite bus system given by the following nonlinear Ordinary Differential Equation (ODE): [ ẋ_1(t); ẋ_2(t) ]=[ x_2(t); (1/2H)(P_m-P_e sin(x_1(t)+δ_ep)-Dx_2(t)) ], where H=0.0106, X_t=0.28, P_m=1, E_s=1.21, V=1, P_e=(E_s V)/(P_m X_t), D=0.03 and δ_ep=sin^-1(1/P_e). Using a similar method to <cit.> we simulate ODE (<ref>) for various initial conditions, x(0)=x_0 ∈^2. Using these simulations we construct a labelled data set where each data point represents an initial condition that is either an element of the ROA or not. To approximate the ROA we must then solve this machine learning binary classification problem by computing the decision boundary of our labelled data set. We solve this problem by only considering the stable data points, {x_i}_i=1^N. We then use our proposed SOS algorithm to compute an outer approximation of {x_i}_i=1^N. In Fig. <ref> we have plotted our estimation of the ROA as the red region, that is of the form {x∈^2: J_d(x) ≤ 0} where J_d is found by solving SOS Opt. (<ref>) for d=14. [Approximation of attractor sets] The Lorenz system can be modelled as the following nonlinear ODE, [ ẋ_1(t); ẋ_2(t); ẋ_3(t) ]=[ σ( x_2(t)-x_1(t) ); ρ x_1(t) -x_2(t) -x_1(t) x_3(t); x_1(t) x_2(t) - β x_3(t) ], where (σ, ρ,β)=(10,28,8/3). It is well known that the Lorenz system exhibits a global attractor set in which all trajectories converge towards. The problem of approximating the Lorenz attractor from data can be posed as a machine learning classification problem <cit.>. One way to approach this classification problem is by collecting discrete points, {x_i}_i=1^N, of terminal points of trajectories simulated for large amounts of time. Assuming our simulation time is sufficiently large, each of the discrete points, {x_i}_i=1^N, will be inside the attractor set. In Fig. <ref> we have plotted our approximation of {x_i}_i=1^N as the red region, that is of the form {x∈^3: J_d(x) ≤ 0} where J_d is found by solving SOS Opt. (<ref>) for d=15. [Approximation of C-space for collision free path planning] Dubin's car is the name given to the following discrete time system, x(t+1)=[ x_1(t) + νcos(x_3(t)); x_2(t) + νsin(x_3(t)); x_3(t) + ν/Ltan(u(t)) ], where (x_1(t), x_2(t)) ∈^2 is the position of the car at time t ∈, x_3(t) ∈ denotes the angle that the car is pointing towards, u(t) ∈ is the steering angle input, ν∈ is the fixed speed of the car, and L>0 is a parameter that determines the turning radius of the car. In Fig. <ref> Dubin's car at various time stages is described by the set coloured purple and is given by X_1={x ∈^2: x_1^2 + x_2^2 -0.1^2<0 }. Furthermore, several obstacles are described by golden coloured sublevel sets X_2:=∩_i=1^6 {x ∈^2: g_i(x)<0 }, where g_star(x) =0.1-2.5 x_1^2 x_2^2-0.05(x_1+x_2)^2, g_1(x) = g_star(5x+[0.2, -0.2]^⊤ ) g_2(x) = [ 0.75+x_1; -x_1; -x_2+0.85; -((0.85-0.7)/(0.75))x_1-0.85+x_2 ] g_3(x) = g_2([ cos((π+1)/2) -sin((π+1)/2); sin((π+1)/2) cos((π+1)/2) ]^-1 x ) g_4(x) = [ x_1; 0.25-x_1; 0.85+ x_2; -0.8-x_2 ], g_5(x) = [ x_1-0.1; 0.5-x_1; 0.4+ x_2; -0.2-x_2 ] , g_6(x) = [ x_1-0.4; 0.75-x_1; 0.4+ x_2; 0.8-x_2 ]. Note, some of the sets that describe our obstacles were taken from the previous works of <cit.> and <cit.>. In Fig. <ref> we have plotted our outer sublevel set approximation of X_1 ⊕ X_2 as the red region. This approximation was obtained by solving Opt. (<ref>) for d=12. Based on this approximation of X_1 ⊕ X_2 we then applied the Dynamic Programming (DP) algorithm proposed in <cit.> to compute the optimal path collision free path. That is we derived a sequence of inputs u(0), u(1), …, u(T) that drives the system described in Eq. (<ref>) from an initial condition, x(0)=x_0, to the target set, given by the blue square, in the minimum number of steps while avoiding the enlarged obstacles in the C-space, given by our approximation of X_1 ⊕ X_2. As shown in Fig. <ref>, solving the path planning problem in C-space for obstacles X_1 ⊕ X_2, ensures that there is no collisions in the workspace when the shape of Dubin's car is accounted for. § CONCLUSION We have established a link between the L^∞ and L^1 function metrics and the Hausdorff and volume set metrics, respectively, allowing us to construct SOS programs for accurately approximating sets encountered throughout control theory. Specifically, we have shown that if functions are close in the L^∞ norm and one uniformly bounds the other, their sublevel sets are close in the Hausdorff metric. Likewise, if we change the function metric to the L^1 norm, the respective sublevel sets are close in the volume metric. By applying our methodology to approximating sets of discrete points, we have proposed a new machine learning binary classification algorithm that accurately finds decision boundaries for problems with low-dimensional, error-free, and dense data sets. We have applied this new classification algorithm to the problem of approximating ROAs or attractor sets of nonlinear ODEs. Furthermore, our set approximation approach allows us to numerically approximate Minkowski sums, which can be used to compute optimal collision-free paths. [ < g r a p h i c s > ]Morgan Jones received the Mmath degree in mathematics from The University of Oxford, England in 2016 and PhD degree from Arizona State University, USA in 2021. Since 2022 he has been a lecturer in the department of Automatic Control and Systems Engineering at the University of Sheffield. His research primarily focuses on the estimation of reachable sets, attractors and regions of attraction for nonlinear ODEs. Furthermore, he has an interest in extensions of the dynamic programing framework to non-separable cost functions. ieeetr § APPENDIX §.§ The Volume Metric Recall from Section <ref> that D_V(A,B):=μ( (A/B) ∪ (B/A) ), where μ(A) is the Lebesgue measure of A ⊂^n. D: X × X → is a metric if the following is satisfied for all x,y ∈ X, * D(x,y) ≥ 0, * D(x,y)=0 iff x=y, * D(x,y)=D(y,x), * D(x,z) ≤ D(x,y) + D(y,z). The sublevel approximation results presented in this appendix are required in the proof of Theorem <ref>. Consider the quotient space, X:= B {X ⊂^n : X ∅, μ(X) =0 }, where B is the set of all Lebesgue measurable sets. Then D_V: X × X → is a metric. Consider Lebesgue measurable sets A,B ⊂^n. Suppose A and B have finite Lebesgue measure and B ⊆ A, then D_V(A,B) =μ(A/B)= μ(A)- μ (B). Consider a Lebesgue measurable set Λ⊂^n, a function V ∈ L^1(Λ, ), and a family of functions {J_d ∈ L^1(Λ, ): d ∈} that satisfies the following properties: * For any d ∈ we have J_d(x) ≤ V(x) for all x ∈Λ. * lim_d →∞ ||V -J_d||_L^1(Λ, ) =0. Then for all γ∈ lim_d →∞ D_V ({x ∈Λ : V(x) ≤γ}, {x ∈Λ : J_d(x) ≤γ}) =0. §.§ Counterexamples: When Close Functions Have Distant Sublevel Sets We first show that if we slightly change the conditions of Thm. <ref> to have J_d(x)≤ V(x) (rather than V(x) ≤ J_d(x)) then we can no longer establish that the sublevel sets of V and J_d will be close. We show there exists γ∈, Λ⊂, V ∈ L^1(Λ,) and {J_d}_d ∈⊂ L^1(Λ,) such that J_d(x)≤ V(x) for all x ∈Λ and lim_d →∞ ||V(x) - J_d(x)||_L^∞(Λ,) dx=0 but lim_d →∞ D_H({ x ∈Λ : V(x) < γ}, {x ∈Λ : J_d(x) < γ}) 0. Let Λ:=[-10,10], γ:=1, V(x):=1-1_[1,2](x) and J_d(x)= 1-1_[1,2](x) - 1/d. Clearly, lim_d →∞ ||V(x) - J_d(x)||_L^∞(Λ,) dx=lim_d →∞1/d=0. However, { x ∈Λ : V(x) < 1 } = [1,2]. { x ∈Λ : J_d(x) < 1 } = Λ. Note, Counterexample <ref> does not contradict Prop. <ref> that deals with the same case where J_d lower bounds V. This is because Prop. <ref> shows that the non-strict sublevel sets are close in the volume metric. Indeed, { x ∈Λ : V(x) ≤ 1 }= { x ∈Λ : J_d(x) ≤ 1 } so there is no contradiction in this case. We consider what happens if we change the other condition of Thm. <ref> where instead of having ||J_d - V||_L^∞(Λ,)→ 0 we only have ||J_d - V||_L^1(Λ,)→ 0. We show there exists γ∈, Λ⊂, V ∈ L^1(Λ,) and {J_d}_d ∈⊂ L^1(Λ,) such that V(x) ≤ J_d(x) for all x ∈Λ and lim_d →∞ ||V(x) - J_d(x)||_L^1(Λ,) =0 but lim_d →∞ D_H({ x ∈Λ : V(x) < γ}, {x ∈Λ : J_d(x) < γ}) 0. Let Λ:=[-10,10], γ:=1, V(x): =1_[1,2](x)-1 and J_d(x):= 1_[1,2](x)-1 + 1_[0,1/d](x). Clearly, lim_d →∞ ||V(x) - J_d(x)||_L^∞(Λ,) =lim_d →∞sup_x ∈Λ1_[0,1/d](x) =1 0 and lim_d →∞ ||V(x) - J_d(x)||_L^1(Λ,)= lim_d →∞∫_Λ1_[0,1/d](x) dx = lim_d →∞∫_0^1/d 1dx =0. However, { x ∈Λ : V(x) < 1 } = [1,2] . { x ∈Λ : J_d(x) < 1 } = [0,1/d] ∪[1,2]. Hence lim_d →∞ D_H({ x ∈Λ : V(x) < γ}, {x ∈Λ : J_d(x) < γ}) = lim_d →∞ D_H( [1,2], [0,1/d] ∪[1,2])=1 0 Although Counterexample <ref> shows that if functions are close in the L1 norm then their sublevel sets may not be close in the Hausdorff metric this does not contradict Theorem <ref>, that shows that these sublevel sets must be close in the volume metric. This holds true in the case of Counterexample <ref> since lim_d →∞ D_V({ x ∈Λ : V(x) < γ}, {x ∈Λ : J_d(x) < γ}) = lim_d →∞ D_V( [1,2], [0,1/d] ∪[1,2])= lim_d →∞μ([0,1/d])= 0 §.§ Polynomial Approximation In Sec. <ref> we characterized several sets (intersections and unions of semialgebraic sets, Minkowski sums, Pontryagin differences and discrete points) by sublevel sets of various functions. We now show that we can approximate these functions arbitrarily well by polynomials that are also feasible to our associated SOS optimization problems. In order to approximate these functions we use the Weierstrass approximation theorem. Let E ⊂^n be an open set and f ∈ C^1(E, ). For any compact set K ⊆ E and >0 there exists g ∈[x] such that sup_x ∈ K| f(x) - g(x)| < . We next show that there exists a polynomial that is feasible to Opt. (<ref>) and that arbitrarily approximates the function, V(x):=min_1 ≤ i ≤ m g_i(x), whose sublevel set characterizes the set given in Eq. (<ref>). Consider a compact set Λ⊂^n, functions g_i ∈ LocLip(Λ,) for 1 ≤ i ≤ m, a scalar r>0, and V(x):= min_1 ≤ i ≤ m{ g_i(x) }. Then for any >0 there exists H_1,H_2 ∈[x] such that sup_ x ∈Λ |V(x) - H_j(x) | < for j ∈{1,2}, H_1(x) < g_i(x) for all x ∈ B_r(0) and 1 ≤ i ≤ m, H_2 (x)> g_i(x) for all x ∈ B_r(0) ∩ Y_i and 1 ≤ i ≤ m, where Y_i :={y ∈Λ: g_i(y) ≤ g_j(y) for 1 ≤ j ≤ m }. We first show the existence of H_1 ∈[x] that satisfies Eq. (<ref>). Since Λ⊂^n and B_r(0) are compact sets it follows that there exists R>0 such that Λ∪ B_r(0) ⊂ B_R(0). Let >0. Since V is continuous by Lem. <ref> it follows by Thm. <ref> that there exists P ∈[x] such that sup_ x ∈ B_R(0) |V(x) - P(x) | </4. Let H_1(x):=P(x) - /4. Then |V(x) - H_1(x) | = |V(x) - P(x) + /2| < |V(x) - P(x)| + /4 < /2 for all x ∈ B_R(0), and hence sup_ x ∈Λ |V(x) - H_1(x) | ≤/2 <. Moreover, since |V(x) - P(x)|</4 for all x ∈ B_R(0) we have that P(x)<V(x) + /4 for all x ∈ B_R(0) . Hence H_1(x)<V(x) + /4-/4= V(x)= min_1 ≤ j ≤ m{ g_j(x) }≤ g_i(x) for all 1 ≤ i ≤ m and x ∈ B_r(0) ⊂ B_R(0). We next show the existence of H_2 ∈[x] that satisfies Eq. (<ref>). This time let H_2(x):=P(x) +/4. Then |V(x) - H_2(x) | = |V(x) - P(x) - /2| < |V(x) - P(x)| + /4 < /2 for all x ∈ B_R(0), and hence sup_ x ∈Λ |V(x) - H_2(x) | <. Moreover, since |V(x) - P(x)|</4 for all x ∈ B_R(0) we have that P(x) > V(x) - /4 for all x ∈ B_R(0). Hence H_2(x)>V(x) - /4 + /4=V(x) for all x ∈ B_R(0). Now, when x ∈ Y_i we have V(x)=g_i(x). Therefore, H_2(x)>V(x)=g_i(x) for all x ∈ Y_i ∩ B_r(0). We next show that there exists a polynomial that is feasible to Opt. (<ref>) and that arbitrarily approximates the function, V(x):=max_1 ≤ i ≤ m g_i(x), whose sublevel set characterizes the set given in Eq. (<ref>). Consider a compact set Λ⊂^n, g_i ∈ LocLip(Λ,) for 1 ≤ i ≤ m and V(x):= max_1 ≤ i ≤ m{ g_i(x) }. Then for any >0 there exists H_1,H_2 ∈[x] such that sup_ x ∈Λ |V(x) - H_j(x) | < for j ∈{1,2}, H_1(x) > g_i(x) for all x ∈ B_r(0) and 1 ≤ i ≤ m, H_2(x) < g_i(x) for all x ∈ B_r(0) ∩Y̅_̅i̅ and 1 ≤ i ≤ m, where Y̅_̅i̅ :={y ∈Λ: g_i(y) ≥ g_j(y) for 1 ≤ j ≤ m }. Note that max_1 ≤ i ≤ m{ g_i(x) }= -min_1 ≤ i ≤ m{ -g_i(x) }. Let Ṽ(x):=min_1 ≤ i ≤ m{ -g_i(x) }= -V(x). By Prop. <ref> there exists H̃_̃1̃, H̃_̃2̃∈[x] such that sup_ x ∈Λ |Ṽ(x) - H̃_̃j̃(x) | < for j ∈{1,2}, H̃_̃1̃(x) < -g_i(x) for all x ∈ B_r(0) and 1 ≤ i ≤ m, H̃_̃2̃(x) > -g_i(x) for all x ∈ B_r(0) ∩Ỹ_̃ĩ and 1 ≤ i ≤ m, where Ỹ_̃ĩ :={y ∈Λ: -g_i(y) ≤- g_j(y) for 1 ≤ j ≤ m } = {y ∈Λ: g_i(y) ≥ g_j(y) for 1 ≤ j ≤ m } = Y̅_̅i̅. Let H_1(x):=-H̃_̃1̃(x) and H_2(x):=-H̃_̃2̃(x). Clearly H_1 and H_2 satisfies Eq. (<ref>), completing the proof. We next show that there exists a polynomial that is feasible to Opt. (<ref>) and that arbitrarily approximates the function, V(x):=inf_w ∈{z ∈Λ: g_2,i(z) ≤ 0 for 1 ≤ i ≤ m_2 }min_1 ≤ i ≤ m_1 g_1,i(x-w), whose sublevel set characterizes the set given in Eq. (<ref>). Consider a compact set Λ⊂^n, g_i ∈ LocLip(Λ,) for 1 ≤ i ≤ m and V(x):= inf_w ∈{z ∈Λ: g_2,i(z) ≤ 0 for 1 ≤ i ≤ m_2 }min_1 ≤ i ≤ m_1 g_1,i(x-w). Then for any >0 there exists H ∈[x] such that sup_ x ∈Λ |V(x) - H(x) | < , H(x) < g_1,i(x-w) for all x ∈ B_r(0), w ∈{z ∈Λ: g_2,j(z) ≤ 0 for 1 ≤ j ≤ m_2 } and 1 ≤ i ≤ m_1. Since Λ⊂^n and B_r(0) are compact sets there exists R>0 such that Λ∪ B_r(0) ⊂ B_R(0). Now, by Lem. <ref> it follows that V is a continuous function. Hence, by Thm. <ref>, for any >0 there exists a polynomial P ∈[x] such that sup_ x ∈ B_R(0) |V(x) - P(x) | < /4. Let us consider H(x):=P(x) - /4. Then |V(x) - H(x)| ≤ |V(x) - P(x)| + /4 < /2 for x ∈ B_R(0). Hence, sup_ x ∈Λ |V(x) - H(x) | <. Also note that since |V(x) - P(x)| < /4 for all x ∈ B_R(0) it follows that P(x)< V(x) + /4 and hence H(x)= P(x)- /4< V(x) for all x ∈ B_r(0) ⊂ B_R(0). Therefore P(x) < V(x)= inf_u ∈{z ∈Λ: g_2,j(z) ≤ 0 for 1 ≤ j ≤ m_2 }min_1 ≤ j ≤ m_1 g_1,j(x-u) ≤inf_u ∈{z ∈Λ: g_2,j(z) ≤ 0 for 1 ≤ j ≤ m_2 } g_1,i(x-u) ≤ g_1,i(x-w) for all x ∈ B_r(0), 1 ≤ i ≤ m_1, and w ∈{z ∈Λ: g_2,j(z) ≤ 0 for 1 ≤ j ≤ m_2 }. Thus we have shown Eq. (<ref>) completing the proof. We next show that there exists a polynomial that is feasible to Opt. (<ref>) and that arbitrarily approximates the function, V(x):=sup_w ∈{z ∈Λ: g_2,i(z) ≤ 0 for 1 ≤ i ≤ m_2 }max_1 ≤ i ≤ m_1 g_1,i(x+w), whose sublevel set characterizes the set given in Eq. (<ref>). Consider a compact set Λ⊂^n, g_i ∈ LocLip(Λ,) for 1 ≤ i ≤ m and V(x):= sup_w ∈{z ∈Λ: g_2,i(z) ≤ 0 for 1 ≤ i ≤ m_2 }max_1 ≤ i ≤ m_1 g_1,i(x+w). Then for any >0 there exists H ∈[x] such that sup_ x ∈Λ |V(x) - H(x) | < , H(x) > g_1,i(x+w) for all x ∈ B_r(0), w ∈{z ∈Λ: g_2,j(z) ≤ 0 for 1 ≤ j ≤ m_2 } and 1 ≤ i ≤ m_1. Follows by a similar argument to Lem. <ref>. We next show that there exists a polynomial that is feasible to Opt. (<ref>) and that arbitrarily approximates the function, V(x):=1-1_{x_i}_i=1^N(x), whose sublevel set characterizes the set given by X={x_i}_i=1^N. Consider a compact set Λ⊂^n and some discrete points {x_i}_i=1^N ⊂Λ. Then, for any >0 there exists a polynomial H ∈[x] such that ||H(x) - V(x)||_L^1(Λ,)< , H(x_i)<0 for all i ∈{1,...,N}, H(x) < 1 for all x ∈Λ, where V(x)=1-1_{x_i}_i=1^N(x). We first show that there exists a smooth function that satisfies Eq. (<ref>). We then approximate this function by a polynomial. Let F(x):=1-∑_i=1^N η( x-x_i/δ), where η∈ C^∞(^n, [0,∞)) is the bump function given by η(x) = 2e exp( 1/||x||_2^2 -1) for ||x||_2<1 0 otherwise. For more information on bump functions see <cit.>. Let C:=∫_^nη(x) dx < ∞ and 0<δ< ( /2 NC)^1/n, then ||V(x) - F(x)||_L^1(Λ,)≤∑_i=1^N ∫_^nη( x-x_i/δ) dx =δ^n ∑_i=1^N ∫_^nη(x) dx=δ^n NC</2. Moreover, F(x_i)=1 - η(0) - ∑_j uη( x_i-x_j/δ) ≤ 1 - η(0)= -1<0. Furthermore, since η(x) ≥ 0 for all x ∈^n it is clear that F(x) = 1-∑_i=1^N η( x-x_i/δ) ≤ 1 for all x ∈^n. Since Λ is a compact set there exists R>0 such that Λ⊂ B_R(0). Now, η∈ C^∞(^n, [0,∞)) and therefore F ∈ C^∞(^n, ). Hence, by Thm. <ref>, there exists a polynomial P ∈[x] such that sup_ x ∈ B_R(0) |F(x) - P(x) | < /4 (1 + μ(Λ)). Let us consider H(x):=P(x) - /4(1 + μ(Λ)). Then |F(x) - H(x)| ≤ |F(x) - P(x)| + /4(1 + μ(Λ)) < /2(1 + μ(Λ)) for x ∈ B_R(0). Eqs (<ref>) and (<ref>) imply that || V- H||_L^1(Λ, ) ≤ || V- F||_L^1(Λ, ) + || F- H||_L^1(Λ, ) ≤/2 + μ(Λ) ||F- H||_L^∞(Λ, ) < . Moreover, by Eq. (<ref>) we have P(x) < F(x) +/4(1 + μ(Λ)) for x ∈ B_R(0) and hence H(x)=P(x) - /4(1 + μ(Λ))< F(x). Therefore by Eqs (<ref>) and (<ref>) it follows that H(x_i) <F(x_i)<0 for all i ∈{1,...,N}, H(x) <F(x)< 1 for all x ∈Λ. §.§ Miscellaneous Results Consider a sequence {x_n}_n ∈⊂^n that is bounded, that is there exists M>0 such that x_n < M for all n ∈. Then there exists a convergent subsequence {y_n}_n ∈⊂{x_n}_n ∈. Consider the semialgebriac set X = {x ∈^n: g_i(x) ≥ 0 for i=1,...,k}. Further suppose {x ∈^n : g_i(x) ≥ 0 } is compact for some i ∈{1,..,k}. If the polynomial f: ^n → satisfies f(x)>0 for all x ∈ X, then there exists SOS polynomials {s_i}_i ∈{1,..,m}⊂∑_SOS such that, f - ∑_i=1^m s_ig_i ∈∑_SOS. Consider some compact set X ⊂^n and polynomial functions {g_i}_i=1^m ∈[x]. Suppose V_1(x) := inf_w ∈ Xmin_1 ≤ i ≤ mg_i(x-w), V_2(x) := sup_w ∈ Xmax_1 ≤ i ≤ m g_i(x+w) , then V_1 and V_2 are continuous functions. For each compact set X ⊂^n there exists a bounded function p∈ C^∞(^n,) such that X= {x ∈^n: p(x) ≤ 0}. If f:^n → is a continuous function then {x ∈^n: f(x) ≤γ}, where γ∈, is a closed set. Furthermore, if Λ⊂^n is compact then {x ∈Λ: f(x) ≤γ} is a compact set. Consider a converging subsequence {x_k}_k=1^∞⊂{x ∈Λ: f(x) ≤γ} such that x_k → x^*. By continuity we have f(x_k) → f(x^*). Since f(x_k) ≤γ for all k it follows f(x^*) ≤γ. Hence, x^* ∈{x ∈Λ: f(x) ≤γ} implying that {x ∈Λ: f(x) ≤γ} is closed. Now, {x ∈Λ: f(x) ≤γ}⊂Λ and Λ is bounded. Since {x ∈Λ: f(x) ≤γ} is closed and bounded it follows that it is compact.
http://arxiv.org/abs/2303.06768v2
20230312222509
The Planner Optimization Problem: Formulations and Frameworks
[ "Yiyuan Lee", "Katie Lee", "Panpan Cai", "David Hsu", "Lydia E. Kavraki" ]
cs.AI
[ "cs.AI", "cs.RO" ]
Wavelet Galerkin Method for an Electromagnetic Scattering Problem Michelle Michelle ================================================================= Identifying internal parameters for planning is crucial to maximizing the performance of a planner. However, automatically tuning internal parameters which are conditioned on the problem instance is especially challenging. A recent line of work focuses on learning planning parameter generators, but lack a consistent problem definition and software framework. This work proposes the unified planner optimization problem (POP) formulation, along with the Open Planner Optimization Framework (OPOF), a highly extensible software framework to specify and to solve these problems in a reusable manner. § INTRODUCTION Planning is a cornerstone of decision making in artificial intelligence. In planning, a planner is given an instance of a problem and utilizes some form of computation to realize a certain goal. Often, the performance of the planner is heavily influenced by a set of internal planning parameters. In order to maximize the performance of the planner, it is crucial to select the best parameters. In this work, we assume the general case where high-quality parameters are hard to derive analytically, especially for highly complex planners. Instead, we focus on how to tune the parameters using a selected set of training problem instances. This essentially treats the planner as a black-box function, and we try out different parameters until we are satisfied with the observed performance of the planner. Methods developed for such a paradigm are extremely general, since they make no assumption about the internals of the planner. To automatically tune a given planner, prevailing methods in what is known as algorithm configuration (AC) <cit.> or hyperparameter optimization (HPO) <cit.> typically find a fixed set of parameters which work best on average across the training set of problem instances. However, we argue that the parameters should be conditioned on the problem instance to achieve maximal performance. In particular, we need to identify a generator which maps a given problem instance to high-quality planning parameters. This is extremely challenging because the space of such possible mappings is much larger and even less understood than the space of planning parameters. An emerging trend of work focuses on some form of this problem – for example by learning belief-dependent macro-actions for online POMDP planners <cit.>; learning workspace- and task-dependent sampling distributions for sampling-based motion planners (SBMPs) <cit.>; and learning belief-dependent attention for autonomous driving <cit.>. While the key ideas and techniques behind these works are almost exactly the same, they lack a consistent problem formulation and have vastly different codebases. In this work, we introduce the general planner optimization problem (POP) formulation which unifies the key ideas behind such recent contributions in tuning planning parameters that are conditioned on the problem instance. Additionally, we provide a highly extensible software framework, the Open Planner Optimization Framework (OPOF), to specify and to solve these problems in a reusable manner. We hope that this will allow the community to approach the problem in a coherent and accelerated manner. OPOF is available open-source at https://opof.kavrakilab.orghttps://opof.kavrakilab.org. § BACKGROUND §.§ Planner Optimization Problem (POP) A planner optimization problem (POP) is a 4-tuple (𝒞, 𝒳, f, 𝒟), where 𝒞 is the problem instance space, 𝒳 is the planning parameter space, f is the planning objective, and 𝒟 is the problem instance distribution. A planner takes as input a problem instance c ∈𝒞 and planning parameters x ∈𝒳, and performs some computation on c using x. It returns a numeric value indicating the quality of the computation, which inherently follows the distribution f(x; c), the planning objective. The goal is to find a generator G_θ(c), mapping problem instances in 𝒞 to planning parameters in 𝒳, such that the expected planning performance is maximized: θmax 𝔼_c ∼𝒟[𝔼_x ∼ G_θ(c)[𝔼[f(x; c)]]]. The generator may be stochastic, in which case samples x ∼ G_θ(c) are produced whenever the generator is called. On the other hand, a deterministic generator always returns the same value x = G_θ(c) for the same problem instance c. An unconditional generator is one whose output is unaffected by its input c. The problem is challenging because the generator G_θ(c) needs to be learned solely through interaction with the planner. In particular, we only have access to the planner which produces samples of f(x; c). We do not assume to have an analytical, much less differentiable, form for f(x; c). §.§ Related work Black-box optimization (BBO). In black-box optimization (BBO) <cit.>, we are tasked with finding inputs that maximize a closed objective function. In particular, we have no knowledge about the analytical expression or derivatives of the function, and can only evaluate the objective function at different inputs. There are 2 broad classes of approaches to solve BBOs. (i) Evolutionary algorithms (ES) <cit.> track a population of points across the input space. The population is modified based on some notion of mutation, crossover, and culling across iterative evaluations against the objective function. (ii) Bayesian optimization (BO) methods <cit.> build a suitable model of the objective function, based on already observed evaluations, and uses the model to acquire subsequent evaluation points in a manner that trades off exploration and exploitation. Algorithm configuration (AC). Algorithm configuration (AC) <cit.>, also known as hyperparameter optimization (HPO) <cit.>, is a form of BBO where we want inputs that work well on average over a set of problem instances. Additionally, the importance of generalization is considered – the inputs optimized for the training set must also work well on a validation set of unseen problem instances. A typical approach is to treat the averaged objective function as the objective function and to solve the derived BBO problem, for which BBO techniques can be applied <cit.>. Planner optimization problem (POP). Our POP formulation (<ref>) is effectively an extension of AC. In a POP, we seek to find a generator mapping problem instances to high-quality inputs for the objective function. This is in contrast to AC, which seeks only a single input that works well on average across the training set. Such conditional solutions are important in AI planning problems, where the optimal planning parameters depend critically on the problem instance. Different forms of POPs have only been explored recently by works such as <cit.>, which apply the Generator-Critic algorithm introduced in <cit.>. A deep neural network is used for the generator, which is trained with the help of a critic, another deep neural network. The critic is trained to model the response of the planner via supervision loss. It serves as a differentiable surrogate objective for the planning objective, enabling training gradients to flow into the generator for gradient-based updates. Through the POP formulation, we hope to unify the key ideas motivating these works. Software Frameworks. POPs require specialized components to support the notion of a generator and to integrate gradient-based deep learning techniques, such as those used in the aforementioned Generator-Critic algorithm. While software frameworks for BBO such as PyPop7 (ES) <cit.> and SMAC3 (BO) <cit.> exist and are actively maintained, rewiring them for POPs would require awkward hacks that would make usage unnatural. Thus, through OPOF, we hope to provide a software framework specially for POPs with intuitive and reusable interfaces, while harnessing the power of deep learning methods exposed via PyTorch <cit.>. § OPOF: OPEN-SOURCE PLANNER OPTIMIZATION FRAMEWORK §.§ Domains: abstracting the planner optimization problem At the core of OPOF lies the domain abstraction for specifying a planner optimization problem. The Domain interface consists of a minimal set of functions to specify the details of a given planner optimization problem – such as the training distribution, the parameter space, and the planner. §.§ Available domains Domains are implemented in external Pip packages, which are installed alongside OPOF. We provide a collection of domains (<ref>), which we expect to grow over time. At the time of OPOF's beta release, the following domains are available: * 2D grid world (<ref>). Small-scale toy domains with easy to understand behavior from classic, discrete planning. Serves as a sanity check against developing algorithms. * SBMP (<ref>). Domains from <cit.> to optimize hyperparameters, samplers, and projections for sampling-based motion planning. The motion planner is given a tight time budget (1 - 3 s), and requires effective parameters to plan reasonably well. * Online POMDP planning (<ref>). Domains from <cit.> to learn macro-actions for improving online POMDP planning. The POMDP planner is given a very tight time budget (100 ms), and discovering effective macro-actions is critical to plan reasonably well. §.§ Built-in algorithms OPOF contains built-in stable implementations of algorithms that solve the planner optimization problem, integrated directly into the core opof package. We expect this list to grow with time. GC is our implementation of the Generator-Critic algorithm introduced across the recent works of <cit.>. Two neural networks are learned simultaneously – a generator network representing the generator G_θ(c) and a critic network. The generator is stochastic, and maps a problem instance c ∈𝒞 to a sample of planning parameters x ∈𝒳. The critic maps c and x into a real distribution modeling f(x; c). During training, the stochastic generator takes a random problem instance c ∈𝒞 and produces a sample x ∈𝒳, which is used to probe the planner. The planner's response, along with c and x, are used to update the critic via supervision loss. The critic then acts as a differentiable surrogate objective for f(x; c), passing gradients to the generator via the chain rule. SMAC is a wrapper around the SMAC3 package <cit.>, an actively maintained tool for algorithm configuration using the latest Bayesian optimization techniques. We use the HPOFacade strategy provided by SMAC3. In the context of the planner optimization problem, SMAC learns only a generator G_θ(c) = θ that is unconditional (i.e. does not change with the problem instance) and deterministic (i.e., always returns the same planning parameters). While SMAC does not exploit information specific to each problem instance, it provides an approach that has strong theoretical grounding and serves as a reasonable baseline and sanity check. § DESIGN DECISIONS §.§ Many domains and many algorithms OPOF is domain-centric – we only impose what a domain should look like, not how it should be solved. Such a choice maximizes the convenience of developing both domains and algorithms separately, by implicitly enforcing components to be reusable. One can easily reuse existing algorithms on a new domain of interest; similarly, one can also reuse existing domains to benchmark a new algorithm of interest. §.§ Portable and convenient packaging OPOF makes extensive use of Pip, the Python package manager, to allow external domains and algorithms to be packaged and distributed in a portable and convenient format. As such, users may, for example, easily install OPOF along with all available domain packages (at the time of OPOF's beta release) with: $ pip install opof opof-grid2d opof-sbmp opof-pomdp. § FUTURE DIRECTIONS We hope to apply/extend the POP formulation and the OPOF software framework in several ways. * Interesting domain applications. POP is a very general formulation that can be applied to a vast range of planners. With OPOF, we hope that this will ease such efforts for planning researchers interested in optimizing planners. * Developing general algorithms. Right now, there is only one practical algorithm, the Generator-Critic (GC) algorithm, which is designed specifically for planner optimization. We hope that OPOF will aid research efforts to produce better and more efficient algorithms. * Harder parameter classes. Existing domains have parameter spaces whose dimensions are reasonably small (<1000). We would like to explore how this framework scales to larger parameter spaces, and the domains for which this would be useful. * Applications outside of optimizing speed. The definition of the planning objective is general, and allows us to apply POP outside of improving planning speed. For example, can we use it to maximize some form of safety or exploration? Or, in an entirely different field such as HRI, can we instead seek to find internal parameters maximizing the observed behavior of some non-differentiable agent? § ACKNOWLEDGMENT This research is supported in part by NSF RI 2008720 and Rice University funds; by Shanghai Jiao Tong University Startup Funding No. WH220403042; and by the National Research Foundation (NRF), Singapore and DSO National Laboratories under the AI Singapore Program (AISG Award No: AISG2-RP-2020-016). § DETAILED DOMAIN DESCRIPTIONS §.§ Grid world Overview. Through the opof-grid2d package, we provide two relatively simple grid world domains (<ref>): RandomWalk2D[size] and Maze2D[size]. We emphasize that we want to discover high-quality planning parameters solely by interacting with the planner, where we treat the planner as a closed black-box function. Specifically, we do not attempt to handcraft parameters specialized to the planner's operation. The goal is to be able to develop general algorithms for the broader planner optimization problem, using the grid world domains merely to test these general algorithms. These general algorithms would apply to harder domains for which the complexity of the planner prevents us from handcrafting specialized parameters. Random walk. In the RandomWalk2D[size] domain (<ref>), an agent starts at a location (green) and moves in random directions according to some fixed probabilities until it reaches the goal (magenta). When attempting to move “into” an obstacle (black) or the borders of the grid, a step is spent but the position of the agent does not change. The probability of moving in each direction is fixed across all steps. The planner optimization problem is to find a generator G_θ(c) that maps a problem instance c (in this case, the combination of board layout and start and goal positions) into direction probabilities (in this case, vectors ∈ℝ^4 with non-negative entries summing to 1), such that the number of steps taken during the random walk is minimized. The training set and testing set each contain 1000 problem instances, where the obstacle, start, and goal positions are uniformly sampled. Maze A* search. In the Maze2D[size] domain (<ref>), A* search <cit.> is run against a heuristic function h(n) to find a path from the start (green) to the goal (green). The heuristic function determines the priority in which nodes are expanded (cells that are in darker red have a lower g(n) + h(n) value, and have higher priority). The maze is assumed to be perfect, i.e., there is exactly one path between any two cells. The planner optimization problem is to find a generator G_θ(c) that maps a problem instance c (in this case, the combination of board layout and start and goal positions) to h(n) (in this case, assignments of values ∈ [0, size^2] to each of the size^2 cells) such that the number of nodes expanded in the A* search is minimized. The training set and testing set each contain 1000 problem instances, where the maze is generated using Wilson's algorithm <cit.>, and the start and goal positions are uniformly sampled. §.§ Sampling-based motion planning (SBMP) Overview. Through the opof-sbmp package, we provide the SBMPHyp[env,planner] domain (<ref>), which explores doing sampling-based motion planning in a specified environment using a specified planner. Unlike the grid world domains, these planners are much more complex and the relationship between the choice of planning parameters and planner performance is unclear. This makes it particularly suitable for OPOF, since we treat the planner as closed black-box function and specifically assume no knowledge of the planner's internals. The planner optimization problem. The robot is tasked with moving its arm(s) from a start configuration to a goal configuration by running a sampling-based motion planner. The planner optimization problem is to find a generator G_θ(c) that maps a problem instance c (in this case, the combination of obstacle poses in the environment and the start and goal robot configurations) to a set of planner hyperparameters (which depend on the planner used), such that the time taken for the motion planner to find a path is minimized. The training set and testing set contain 1000 and 100 problem instances respectively. These problem instances are adapted from MotionBenchMaker <cit.>. Obstacle positions are sampled according to a predefined distribution, while start and goal configurations are sampled using inverse kinematics <cit.> for some environment-specific task. Environments. We provide 3 environments at the time of writing. In Cage, a 6-dof UR5 robot is tasked to pick up a block (green) in a cage (<ref>), starting from a random robot configuration (<ref>). The position and orientation of the cage, as well as the position of the block in the cage, are randomized. In Bookshelf, a 8-dof Fetch robot is tasked to reach for a cylinder in a bookshelf (<ref>), starting from a random robot configuration (<ref>). The position and orientation of the bookshelf and cylinders, as well as the choice of cylinder to reach for, are randomized. In Table, a 14-dof dual-arm Baxter robot must fold its arms crossed in a constricted space underneath a table and in between two vertical bars (<ref>), starting from a random robot configuration (<ref>). The lateral positions of the vertical bars are randomized. Planners. We provide 2 planners at the time of writing. For RRTConnect <cit.>, we grow two random search trees from the start and the goal configurations toward randomly sampled target points in the free space, until the two trees connect. We tune the following parameters: a range ∈ [0.01, 5.00] parameter, which limits how much to extend the trees at each step; and a weight vector ∈ℝ^50 with non-negative entries summing to 1, which controls the sampling of target points using the experience-based sampling scheme adapted from <cit.>. For LBKPIECE1 <cit.>, two random search trees are similarly grown from the start and the goal configurations, but controls the exploration of the configuration space using grid-based projections. We tune the following parameters: range ∈ [0.01, 5.00], border_fraction ∈ [0.001, 1], and min_valid_path_fraction ∈ [0.001, 1], which respectively determine how much to extend the trees at each step, how much to focus exploration on unexplored cells, and the threshold for which partially valid extensions are allowed; and a projection vector [0, 1]^2 × d⊂ℝ^2 × d which corresponds to the linear projection function used to induce the 2-dimensional exploration grid, where d is the robot's number of degrees of freedom. §.§ Online POMDP planning Overview. Through the opof-pomdp package, we provide the POMDPMacro[task,length] domain, which explores doing online POMDP planning for a specified task using the DESPOT <cit.> online POMDP planner. The robot operates in a partially observable world, and tracks a belief over the world's state across actions that it has taken. Given the current belief at each step, the robot must determine a good action (which corresponds to moving a fixed distance toward some heading) to execute. It does so by running the DESPOT online POMDP planner. DESPOT runs some form of anytime Monte-Carlo tree search over possible action and observation sequences, rooted at the current belief, and returns a lower bound for the computed partial policy. The planner optimization problem. Since the tree search is exponential in search depth, POMDPMacro[task,length] explores using open-loop macro-actions to improve the planning efficiency. Here, DESPOT is parameterized with a set of 8 macro-actions, which are 2D cubic Bezier curves stretched and discretized into length number of line segments that determine the heading of each corresponding action in the macro-action. Each Bezier curve is controlled by a control vector ∈ℝ^2 × 3, which determine the control points of the curve. Since the shape of a Bezier curve is invariant up to a fixed constant across the control points, we constrain the control vector to lie on the unit sphere. The planner optimization problem is to find a generator G_θ(c) that maps a problem instance (in this case, the combination of the current belief, represented as a particle filter, and the current task parameters, whose representation depends on the task) to a joint control vector ∈ℝ^8 × 2 × 3 (which determines the shape of the 8 macro-actions), such that the lower bound value reported by DESPOT is maximized. POMDPMacro[task,length] comes with 2 tasks at the time of writing. Light-Dark. In the LightDark task (<ref>), the robot (blue circle) wants to move to and stop exactly at a goal location (green cross). However, it cannot observe its own position in the dark region (gray background), but can do so only in the light region (white vertical strip). It starts with uncertainty over its position (yellow particles) and should discover, through planning, that localizing against the light before attempting to stop at the goal will lead to a higher success rate, despite taking a longer route. The task is parameterized by the goal position and the position of the light strip, which are uniformly selected. Puck-Push. In the PuckPush task (<ref>), a circular robot (blue) pushes a circular puck (yellow circle) toward a goal (green circle). The world has two vertical strips (yellow) which have the same color as the puck, preventing observations of the puck from being made when on top. The robot starts with little uncertainty (red particles) over its position and the puck's position corresponding to sensor noise, which grows as the puck moves across the vertical strips. Furthermore, since both robot and puck are circular, the puck slides across the surface of the robot whenever it is pushed. The robot must discover, through planning, an extremely long-horizon plan that can (i) recover localization of the puck, and can (ii) recover from the sliding effect by retracing to re-push the puck. The task is parameterized by position of the goal region, which is uniformly selected within the white area on the right. POMDPMacro[task,length] differs from the other domain in that the distribution of problem instances 𝒟 is dynamic. It is hard to prescribe a “dataset of beliefs” in online POMDP planning to construct a problem instance distribution. The space of reachable beliefs is too hard to determine beforehand, and too small relative to the entire belief space to sample at random. Instead, POMDPMacro[task,length] loops through episodes of planning and execution, returning the current task parameters and belief at the current step whenever samples from 𝒟 are requested. Such a dynamic distribution adds noise to the training procedure, causing it to slow down. We believe that in the future, accounting for this noise will likely speed up training. § EXPERIMENTAL CONFIGURATION We run GC and SMAC against across ranges of domains. All experiments were done on a machine with an AMD 5900x (24 threads @ 3.70 GHz), an RTX 3060, and 32GB of RAM. The choice of planning objective and range of training domain configurations are detailed as follows: * RandomWalk2D[size]: The planning objective f(x; c) is given as - steps / (4 × size^2), where steps is the number of steps taken to reach the goal. A maximum of 4 × size^2 steps are allowed. We vary size = 5, 11, 21 and allow up to 200K planner calls for training. We use 8 worker threads for training. * Maze2D[size]: The planning objective f(x; c) is given as - steps / n_empty, where steps is the number of nodes expanded before finding the goal and n_empty is the number of obstacle-free cells. We vary size = 5, 11, 21 and allow up to 150K planner calls for training. We use 8 worker threads for training. * SBMPHyp[env,planner]: The planning objective f(x; c) is given as -time, where time is the time taken for the motion planner to find a collision-free path from the start to goal robot configuration. We vary env = Cage, Bookshelf, Table with maximum allowed planning times of 1, 2, 3 seconds respectively, and vary planner = RRTConnect, LBKPIECE1. We allow up to 100K planner calls for training, and use 16 worker threads. * POMDPMacro[env,planner]: The planning objective f(x; c) is given as the lower bound value reported by DESPOT, under a timeout of 100 ms. When evaluating, we instead run the planner across 50 episodes, at each step calling the generator, and compute the average sum of rewards (as opposed to considering the lower bound value for a single belief during training). We vary env = LightDark, PuckPush, using length = 8, 5 respectively, which are suggested to be the optimal macro-action lengths in <cit.>. We allow up to 500K and 1M planner calls respectively for training, and use 16 worker threads. When running GC, we update the generator for every sample of problem instance, planning parameters, and planner call. For SMAC, which does not condition the generator on the problem instance, we instead sample a set of planning parameters, test its average performance across 50 randomly sampled problem instances, and use the average result reported by the planner to update the generator. This is because SMAC's runtime grows cubically in the number of updates — this strategy allows us to use the same number of planner calls but limit the number of actual updates. We instead attempt to make each update more efficient by averaging the results of the planner calls to reduce noise. § EXPERIMENTAL RESULTS Training results are shown in <ref>. After training, we evaluate the trained generators against the training problem distribution, and show the results in <ref>. We also show the key properties of each domain, including the dimensionalities of the space of problem instance and the space of planning parameters. Conditioning improves performance. We note from <ref> and <ref> that in general, GC converges with better performance than SMAC. This is expected, since GC learns a conditional generator which can produce better parameters by exploiting information about the specific problem instance. On the other hand, SMAC maintains the AC formulation of optimization by looking for a single set of parameters that works well on average across the entire training set. It generally performs poorly, since it does not exploit information specific to each problem instance. In rare cases, SMAC is able to perform as well as GC (e.g. SBMPHyp[Bookshelf,LBKPIECE1] and POMDPMacro[PuckPush,5]), indicating that the additional information of individual problem instances do no provide any benefit to GC. SMAC occasionally outperforms GC (e.g. SBMPHyp[Cage,LBKPIECE1]), suggesting that constraining the solution space to be simple (i.e., to the set of unconditional generators) may make it easier to find a good solution. Not conditioning converges faster. From <ref>, SMAC generally converges faster (albeit with poorer performance). This is most noticeable in cases such as SBMPHyp[Table,RRTConnect], SBMPHyp[Bookshelf,LBKPIECE1], and POMDPMacro[PuckPush,5]. This is again expected, since the space of generators considered by GC is strictly larger than that of SMAC, increasing the exploration time needed for GC before converging. Fundamental optimization limits. On the toy domains RandomWalk[size] and Maze2D[size], GC almost completely fails to improve performance once the domain size becomes large enough. This hints that GC has inherent limits with respect to the structure of the problem. Does it fail, because of sample complexity issues, or because of structural priors over the parameter space, or something else? Since these toy domains are relatively well-behaved and easy to understand, there is much room for potential theoretical analysis. 1, 2 Terminated early after 58K and 500K planner calls respectively to keep training times reasonable. Due to the cubic nature of SMAC, the full duration would have required approx. 2.6 and 8.6 days respectively. lll Training performance. We evaluate the generator at regular intervals across checkpoints, and plot the measured planning performance. < g r a p h i c s > < g r a p h i c s > < g r a p h i c s > 1cRandomWalk2D[5] 1cRandomWalk2D[11] 1cRandomWalk2D[21] < g r a p h i c s > < g r a p h i c s > < g r a p h i c s > 1cMaze2D[5] 1cMaze2D[11] 1cMaze2D[21] < g r a p h i c s > < g r a p h i c s > < g r a p h i c s > 1cSBMPHyp[Cage,RRTConnect] 1cSBMPHyp[Bookshelf,RRTConnect] 1cSBMPHyp[Table,RRTConnect] < g r a p h i c s > < g r a p h i c s > < g r a p h i c s > 1cSBMPHyp[Cage,LBKPIECE1] 1cSBMPHyp[Bookshelf,LBKPIECE1] 1cSBMPHyp[Table,LBKPIECE1] < g r a p h i c s > < g r a p h i c s > 1c1*[55pt] < g r a p h i c s > 1cPOMDPMacro[LightDark,8] 1cPOMDPMacro[PuckPush,5]
http://arxiv.org/abs/2303.07204v1
20230313153845
Direct Statistical Simulation using generalised cumulant expansions
[ "G. V. Nivarti", "J. B. Marston", "S. M. Tobias" ]
physics.flu-dyn
[ "physics.flu-dyn", "physics.ao-ph" ]
Social network analysis of Japanese manga: similarities to real-world social networks and trends over decades Naoki Masuda March 30, 2023 ============================================================================================================= In recent years, the Generalised Quasilinear (GQL) approximation has been developed and its efficacy tested against purely quasilinear (QL) approximations <cit.>. GQL systematically interpolates between QL and fully non-linear dynamics by employing a generalised Reynolds decomposition for dynamics in one spatial direction. Here, we present an exact statistical closure for the GQL equations on the doubly periodic β-plane. Closure is achieved at second order using a generalised cumulant approach which we term GCE2. We demonstrate that the GCE2 equations systematically interpolate the statistics between those corresponding to CE2 and fully non-linear systems. GCE2 is shown to yield improved performance over statistical representations of purely QL dynamics (CE2). Hence, GCE2 enables Direct Statistical Simulation of complex mean flows that do not entirely fall within the remit of pure QL theory. DSS; QL; CE2; GQL. § INTRODUCTION Fluid turbulence, where nonlinear interactions occur over a wide range of spatial and temporal scales, plays an important role in engineering, geophysical, astrophysical and even biological fluid mechanics. Much turbulence research focuses on the idealised case of homogeneous and isotropic turbulence, despite the canonical situation involving important inhomogeneities and anisotropies. For example, in geophysical and astrophysical situations rotation and stratification may play an important role in selecting preferred directions, whereas in other cases mean flows and boundaries often lead to both inhomogeneities and anisotropies. For these cases, it is important to develop a framework that builds in inhomogeneity and anisotropy from the outset and turns this “bug" into a “feature”. Such a framework involves constructing equations for the evolution of the statistics of the turbulence; it is important to bear in mind that the presence of anisotropy and inhomogeneity often leads to non-trivial low-order statistics — for example, sustained mean flows that interact strongly with fluctuations. Methods designed for describing the evolution of such flows will perform badly for the homogeneous isotropic case, where mean flows are absent. For a description of the many methods that have been developed and the underlying philosophy of this approach see the review by <cit.>. In general these methods rely on developing equations governing the evolution of the low-order statistics for the flow (often termed the cumulants). Such an approach often requires a closure approximation, where the higher order statistics are either neglected completely or written as functions of the low-order cumulants. However, if the system exhibits quasilinear dynamics, then the system of low order statistical equations closes exactly <cit.> and no further approximations are needed; such a system of statistical equations is known as CE2 (representing a cumulant expansion at second order). Recent years has seen many systematic investigations of the validity of the quasilinear approximation (QL) in representing the full nonlinear dynamics <cit.>; it has been determined that there are certainly circumstances where the QL approximation breaks down and better approximations are needed. Recent research has focused on a generalisation of the quasilinear approximation (termed GQL) that has certain advantages in that it allows energy to be scattered among the turbulent eddies through interaction with the mean flow. This eddy-scattering often leads to a more faithful representation of the nonlinear dynamics than QL, where these interactions are forbidden. In this paper we derive the statistical representation of the GQL approximation (which we term GCE2) and describe the utility of this approach by comparing it with CE2 for two model fluid dynamics problems (one deterministic and one stochastic) describing the interaction of mean flows with turbulence in two dimensions. § GENERALISED CUMULANT EXPANSIONS §.§ The Generalised Quasilinear (GQL) Approximation We consider a system of non-linear dynamical equations for a state vector q(x,t) written as ∂_t q = ℒ[q] + 𝒩[q,q] , with ℒ [·] a linear and 𝒩[·,·] the non-linear (in this case, quadratic) operator. In order to apply the GQL approximation, the state vector q is expanded using a spectral basis along the zonal direction (more generally, the direction exhibiting statistical homogeneity). GQL then proceeds <cit.> by applying a low-pass filter (projection operator) with cutoff Λ in the zonal direction, leading to a generalised Reynolds decomposition of the state vector q = q_ℓ + q_h , where the subscripts (ℓ) and (h) denote low and high zonal wavenumber modes, respectively. For the two dimensional Cartesian models considered here q_ℓ =∑_k=-Λ^Λq_k(y) e^i k x q_h = q - q_ℓ. This decomposition obeys the usual rules of orthogonality and idempotence, and can be simplified to the conventional Reynolds decomposition (into mean and fluctuation) simply by setting Λ = 0. Note, however, that the conventional Reynolds decomposition obeys the equality qq = q q Note that we use the overline to indicate a mean computed as a spatial (zonal) average, but other averages are also possible including ensemble and time averages.). In comparison, (q_ℓq)_ℓ (q_ℓq_ℓ)_ℓ for Λ > 0 under the generalised Reynolds decomposition into low- and high-modes; this inequality is remedied after applying certain interaction rules as follows. Applying the decomposition <ref> to the q in <ref>, gives rise to various classes of non-linear terms that correspond to different triadic interactions involving low- and high- modes. The possible triad interactions can be represented using Feynman diagrams in which low-modes (zonal wavenumber |m| ≤Λ) and high-modes |m| > Λ are denoted using low-frequency and high-frequency wave edges <cit.>. GQL equations retain non-linear self-interactions give rise to low modes, as well as quasilinear interactions between low- and high-modes. Non-linear self-interactions giving rise to high-modes as well as interactions between low and high modes giving rise to low modes are dropped <cit.>. Such elimination of triad interactions (as for constrained triad decimation in pairs <cit.>) and therefore conserves quadratic invariants such as energy and enstrophy. The following GQL equations are obtained by applying these interaction rules ∂_t q_ℓ = ℒ[q_ℓ] + 𝒩_ℓ[q_ℓ,q_ℓ] + 𝒩_ℓ[q_h,q_h], ∂_t q_h = ℒ[q_h] + 𝒩_h[q_h,q_ℓ], for the low- and high-modes. Here, by virtue of discarding the appropriate interactions, GQL recovers the conventional Reynolds equality so that (q_ℓq)_ℓ = (q_ℓq_ℓ)_ℓ. Furthermore, when Λ = 0, we have q_ℓ = q and q_h = q^', and the GQL equations reduce to the well-known system of QL equations <cit.>. Similarly, setting Λ as the full spectral resolution in the zonal direction, we obtain q_ℓ = q and q_h = 0; the GQL equations are identical to the fully-nonlinear (NL) equations <ref> in this limit. Hence, the GQL equations interpolate systematically (though not monotonically) between QL and NL dynamics by varying the zonal spectral cutoff Λ. Crucially, the GQL equations lack high-mode non-linearities which makes GQL amenable to statistical closure as <ref> is formally linear in q_h. We shall make use of this property now. §.§ Deriving the Generalised Cumulant Expansion at Second Order (GCE2) Statistically-closed equations termed CE2 have been derived for quasilinear (QL) equations using cumulant expansions <cit.> and other methods <cit.>. A closure for QL equations is achieved at second order – the equations for the mean and fluctuation terms are used as a starting point for deriving the corresponding equations for the first two cumulants: q and q^'q^', respectively. This strategy allows for Direct Statistical Simulation (DSS) of low-order statistical quantities that correspond to QL dynamics. In a similar manner, statistical closure for GQL dynamics is also achievable at second order using generalised cumulant expansions which employ the notion of the mean implicit within the generalised Reynolds decomposition of <ref>. We thus define the first two generalised cumulants as c_1 ≡q_ℓ, c_2 ≡ (q_h q_h)_ℓ, following the spectral filter (projection operator) notation used earlier. Closed form equations for these generalised cumulants, termed GCE2, are obtained by following a similar approach to that adopted for deriving CE2 equations from QL equations <cit.>. The generalised first cumulant is identical to low modes (analogous to q in CE2). As a result, the equation governing the evolution of the generalised first cumulant c_1 is the same as that for the low modes q_ℓ as given by <ref>: ∂_t c_1 = ℒ[c_1] + 𝒩_ℓ[c_1, c_1] + 𝒩_ℓ[c_2]. The generalised second cumulant is a field bilinear in high modes (akin to the Reynolds stress C = q^'q^' in CE2). The equation for c_2 = (q_h q_h)_ℓ is thus obtained by multiplying the high-mode equations <ref> with high-modes and subsequently projecting down to the low-modes as follows ∂_t (q_h q_h)_ℓ = ( {q_h ∂_t q_h} )_ℓ = ({q_h ℒ[q_h]} )_ℓ + ({q_h 𝒩_h[q_h,q_ℓ]} )_ℓ, ∂_t c_2 = ℒ[c_2] + ({𝒩[c_2, c_1)]})_ℓ. where the curly braces {··} denote symmetrization, i.e. {a b} = a b + b a, and 𝒩_h = 𝒩[·, ·] - 𝒩_ℓ[·, ·] denotes the high-mode spectral projection of the non-linear operator 𝒩[·, ·]. Taken together, <ref> and <ref> form a closed set of equations in terms of generalised cumulants. This allows the implementation of Direct Statistical Simulation of GQL dynamics, i.e. solve directly for statistics that interpolate between QL and NL dynamics. We note however that a recent study has demonstrated that although one can mathematically arrive at the CE2 system starting from the QL equations, the two frameworks are not statistically equivalent <cit.>. This is because, as opposed to QL equations, the CE2 system can be initialised with an ensemble-averaged second cumulant and thereafter sustain solutions wherein the second cumulant has rank > 1. We note therefore that the GCE2 and GQL systems are not equivalent either. However, we emphasise that the ability of GCE2 to predict a generalised second cumulant with rank greater than unity ought to be considered as a feature not a bug, one that motivates further study. This paper has two aims: 1) to test the predictions of GCE2 against those of GQL, thereby demonstrating that, even for a cutoff Λ = 1, GCE2 improves significantly over CE2, and 2) to probe observed divergences between GCE2 and GQL, relating them to the presence of rank instabilities as in the case of CE2 and QL <cit.>. § NUMERICAL IMPLEMENTATION We conduct simulations of a rotating, incompressible fluid on a doubly-periodic β-plane [0,2π]^2. The time evolution of the relative vorticity ζ≡z· (∇× u) is given by ∂_t ζ = β∂_x ψ - κζ + ν∇^2 ζ + J[ψ,ζ] + F, where u is the velocity, J[ψ,ζ] = ∂_xψ∂_y ζ - ∂_x ζ∂_y ψ and the streamfunction ψ≡∇^-2ζ. Gradients of rotation are included via the β term, `bottom friction' via the κ term and viscosity via the ν term. The forcing term F models energy injection into the system. We adopt two different models of forcing (or driving) in this study: 1) a deterministic steady two-scale Kolmogorov-type forcing as used by <cit.> - see equation (<ref>), and 2) a white-in-time stochastic model of forcing adapted from <cit.> - see equation (<ref>). The latter is a commonly-used model that mimics thermal driving. The spectral solver (written in Julia <cit.> and made available online <cit.>) is used to obtain direct numerical solutions of equation (<ref>). Timestepping algorithms are imported from the well-tested ecosystem of the <cit.> package. We use different timestepping methods to simulate flows with different types of driving models. For the deterministically-driven Kolmogorov flow, we use the explicit 5/4 Runge-Kutta method of Dormand-Prince with a fixed timestep of Δ t = 0.001. For the stochastically-driven flow, we use the SRIW1 method of order 1.5. To be consistent, we use the same timestepping algorithm to solve the dynamical equations (QL/GQL/NL) and the statistical equations (CE2/GCE2) for a given flow. Unless specified otherwise, the initial condition consists of random noise of mean power 10^-4. We employ resolutions of 10× 10 for the Kolmogorov flow system and 12× 20 for the stochastically-driven system. The solutions are therefore not extremely turbulent. We have conducted a number of validation tests to ensure that the equations are implemented accurately in our code. Solutions for equations neglecting the dissipative terms have been tested to confirm conservation of energy and enstrophy is satisfied in such regimes. Additionally, the agreement of mean equilibrium solutions for a given energy input with dissipation has also been confirmed across the various equation systems. In the presence of non-linear terms, our tests confirm that setting the spectral cutoff Λ = 0 in GCE2 reproduces CE2 results and setting Λ = N reproduces the fully-nonlinear (NL) results. In addition to the forcing models outlined above, the aforementioned tests are also conducted for a determinstic driving model with relaxation to a point jet <cit.>; here, an additional validation test is available as the GCE2/CE2 as well as GQL/QL results converge to NL for small relaxation times. All these tests have been automated, such that the Github workflows server conducts them each time a code change is pushed to the online repository <cit.>. In the following, we present results comparing GCE2 against GQL for a spectral cutoff Λ = 1. For each forcing model and specified set of parameters, we compare these results against predictions of the NL system as well as of the CE2 and QL equations. Note that, we use overlines to indicate spatial (zonal) averages (not ensemble or time averages) on QL solutions as in the comparisons against CE2. When time averages are used (such as to facilitate comparison of Hövmöller plots), we explicitly state this along with specifying the averaging window in the accompanying text. § RESULTS §.§ Two-scale Kolmogorov forcing <Ref> shows the final time (t = 1000 days) resolved vorticity solution for a flow driven by a two-scale Kolmogorov forcing, i.e. we set F in <ref> to be F(y) = -cos(y) -8cos(4y). and the parameters as ν = 0.02 and β = κ = 0 in <ref>. This system is known to lead to non-trivial dynamics <cit.>. The NL solution (top panel in <ref>) consists of a strong band of positive vorticity centred at y = π surrounded by negative vortical regions, as was observed by <cit.>. The band of positive vorticity appears to be composed of a strong zonal mean and a sinusoidal zonal wave with wavenumber m = 1, the latter contributing to the varying width of the band as a function of x. As noted in <cit.>, this vorticity solution corresponds to a rightward flow on the upper half y> π of the domain and leftward flow in the lower half. The QL solution (middle left panel in <ref>) captures the central positive vorticity band, albeit with an apparently weaker m = 1 harmonic resulting in a band of more uniform height and thickness. For presentation of results, we adopt zonal (spatial in x direction) averaging so that q denotes the zonal mean of quantity q. The zonal mean vorticity ζ predicted by CE2 (middle right) agrees reasonably well with QL dynamics both in magnitude and distribution. The localised negative vorticity regions predicted by QL (middle left panel) in the upper and lower half of the domain are averaged out in the CE2 prediction (middle right panel). The bottom panels in <ref> show the GQL (left) and the resolved GCE2 (right) solutions for a cutoff Λ = 1. These are in very close agreement with the fully-nonlinear solution, improving significantly over the QL/CE2 solutions. <Ref> contains Hövmöller plots of ζ(y,t) showing the evolution of the central band of vorticity with time for the five different equation systems. All solutions evolve from the same initially random noise field of power 10^-4. Time-averaging is conducted in the window 500 < t < 1000 days. Up until time-averaging begins, the QL, GQL and GCE2 systems exhibit noticeable fluctuations in jet location over a relatively small time-scale of t ∼ 10 days. Such fluctuations appear to be much less pronounced in the NL and CE2 systems, wherein the vorticity jet appears to stabilise at its location at around t = 250 days. The time-averaged solution of all five systems are in excellent qualitative agreement, with the possible exception of QL which appears to predict a slightly weaker jet (lighter red colour in the middle left panel). Focussing on subtle quantitative differences, we show time-averaged energy spectra for the various solutions in <ref>. Each panel plots ζ_m,n^*ζ_m,n/(m^2 + n^2) with zonal wavenumbers m running along the x-axis and non-zonal wavenumbers n along the y-axis. Evidently, all equation systems predict energy to be primarily concentrated in two pairs of conjugate modes, namely (m = 0, n = ± 1) and (m = ± 1, n = 0) (N.B. the mode (m = 0,n = 0) denotes the mean across the entire domain and has been set to contain no energy in our solutions). In the fully non-linear case (top panel), the remaining energy is spread over spectrally-local modes within a relatively narrow band of zonal wavenumbers, with remaining zonal wavenumbers containing small but non-zero energy. In QL and CE2 (middle panels), this zonal spreading of energy is limited to |m| ≤ 2, with no energy in modes with larger zonal wavenumbers. On close inspection, minute differences between QL and CE2 can be observed. For instance, QL (middle left panel) contains slightly higher energy in the (m = ± 1, n = 0) harmonic pair (dark orange squares) and a slightly different energy distribution across the zonal mean modes (m = 0,n) as compared with CE2 (middle right panel). The GQL and GCE2 solutions (bottom panels), however, are in excellent agreement with each other. Moreover, they both clearly improve upon the QL/CE2 solution (middle panels) when compared with the NL solution (top panel). Both GQL and GCE2 exhibit similar spreading of energy around the four most energetic modes as seen in NL, albeit with slightly less energy in the outer bands of modes with |m| = 4,5. Crucially, the modes |m| > 5 contain a small amount of energy in a similar manner to NL, and as opposed to QL/CE2 where energy is completely absent in these modes. These results validate GCE2 as a statistical theory for GQL dynamics, with the ability to improve upon predictions of CE2. We now proceed to make quantitative comparisons between the various solutions to elucidate on the qualitative differences observed above. We show the energy distribution over zonal wavenumbers m in the n = 0 slice of the time-averaged energy spectra in <ref> (left panel). NL (black line) contains energy in all non-trivial zonal wavenumbers m ∈ [1,9]. Moving away from the strongest wavenumber m = 1, energy tapers-off rapidly across the wavenumbers m ≤ 4 and more gently along the wavenumbers m ≥ 5. GQL (orange line) and GCE2 (orange dots) mimic this distribution of energy reasonably well; however, the m = 1 mode is slightly stronger and the wavenumbers m ≤ 4 have slightly lower energy in GQL/GCE2 than NL. Interestingly, minor departures of energy between GCE2 and GQL are apparent, particularly for m = 5,7. In comparison, QL (blue line) and CE2 (blue dots) contain most energy in two wavenumbers. Comparing these modes carefully, we note that QL contains significantly more energy in the m = 1 mode than does CE2, showing that QL and CE2 solutions also have disagreements. In the right panel of <ref>, we plot the zonal mean vorticity as a function of the y-coordinate. The centreline vorticity (y = π) of the NL solution is quite well predicted by CE2, followed closely by GQL and GCE2. However, the QL solution departs conspicuously from the remaining predictions at the centreline. Differences between the solutions away from the centreline are relatively small, although, at y ∼ 3π/2, the NL solution is over-predicted by both solution pairs GQL/GCE2 and QL/CE2. Again, the QL and CE2 solutions exhibit significant departures from each other. Though we have noted here a difference between QL and CE2 solutions, no major departures are immediately evident between the GQL and GCE2 solutions . The results above demonstrate that GQL/GCE2 improve upon the predictions of QL/CE2 when compared with the NL solution. Barring the minor differences, these results also validate the predictions of DSS (CE2 or GCE2) against the corresponding dynamical systems (QL or GQL, respectively). Now we focus our attention on investigating the origin of divergences between each solution pair QL/CE2 and GQL/GCE2. As mentioned earlier, <cit.> pointed out recently that divergences can and do arise between the QL and CE2 solutions despite the mathematical correspondence between them. Importantly, they linked such divergences to a rank instability available to the dynamics of the CE2 system and prohibited within the QL system. Divergences occur when the rank of a zonal submatrix C^(m) in the CE2 second cumulant departs from its initial unity value – the corresponding rank in QL must always remain unity, thus constituting an important source of differences. In order to compare GQL against GCE2, the zonal projection of the GCE2 field can be employed. <Ref> simultaneously plots the time-evolution of two different quantities for 0 ≤ t ≤ 20 days. The left vertical axis quantifies the absolute difference in zonal energy |E(m)_CE2 - E(m)_QL| between CE2 and QL for a given zonal mode m plotted using blue lines. The right vertical axis quantifies the rank rank(C^(m)) of the cumulant submatrix C^(m). The top panel in <ref> compares the QL and CE2 solutions considering the zonal mode m = 1. As both systems evolve from an identical random noise initialisation, the difference |E(1)_CE2 - E(1)_QL| (blue line) is zero initially. The zonal energies begin to differ around t = 5 days showing an increasing magnitude of differences with time. Simultaneously with the emergence of differences, the rank of second cumulant submatrix C^(1) in CE2 (orange line) departs from unity, increasing nearly-monotonically until t = 20 days. This is a clear indication of the strong link between the onset of rank instability in CE2 and CE2's divergence from QL as also found by <cit.>. In a similar manner, the bottom panel in <ref> compares the same quantities for GQL and GCE2 with spectral cutoff Λ = 1 for the high mode m = 2. The zonal energy difference |E(2)_GCE2 - E(2)_GQL| (blue line) shows that the respective solutions begin to diverge even before t = 5 days. Again, this happens simultaneously with the departure of the corresponding submatrix C^(2) (orange line) rank from unity. In fact, in this case, we also observe that at times when the solutions have very similar energy (say at t ∼ 8 days), the rank also returns to unity. These results confirm that, akin to divergences observed previously for QL and CE2 <cit.>, predictions of GQL and GCE2 may also diverge from one another as a result of the onset of rank instabilities. §.§ Narrow-band stochastic forcing We now consider a stochastically-driven system on the rotating β-plane. We adopt the formalism detailed in <cit.> which was used for the validation of the Statistical State Dynamics (SSD) model. The forcing term F in the vorticity equation becomes F(x,t) = ε Q (x) η(t), where η(t) is white-in-time Gaussian noise with zero mean and unit variance. Following <cit.>, the forcing spectrum Q(x) is specified in Fourier space as Q (k) = c(k_x)^2 d^2 e^-k_y^2d^2 over a band of zonal wavenumbers k_x ∈ [k_f, k_f + δ k). The constant d = 0.1 and the normalising factor c(k_x) set such that the total contribution of Q(k) is unity for each zonal wavenumber <cit.>, and as a result the total energy injection rate of F(x,t) in <ref> is ε. Here, we have set k_f = 8 and δ k = 2 (two zonal wavenumbers 8, 9 are forced) on a 12×20 grid. <Ref> shows Hövmöller plots ζ(y,t) for a case corresponding to the equatorial β-plane (θ = 0^∘) with β = 10.0 and μ = 0.01. As is customary <cit.>, a hyperviscosity coefficient ν_4 is applied such that the largest wavenumber dissipates energy at unit rate. The energy injection rate (described above) via the forced zonal wavenumbers is ε = 0.02. The dynamical equations (NL,QL and GQL) are solved for 10000 days, whereas the statistical equations (CE2 and GCE2) need only be solved for a tenth of that time. The NL solution (top row in <ref>) consists of two opposed jets of vorticity that migrate gently downwards beginning at t = 5000 days. The migration appears to occur at constant speed (fixed slope in t-y coordinates) as has been identified previously by <cit.>. The QL solution (middle left panel) predicts instead a relocation of the positive vorticity jet from the lower half of the domain to its centreline during the period 2500 < t < 7500 days. After this period, the jet stabilises to a steady position. No vertical movement is recorded in the CE2 solution (middle right panel), which merely captures the dual-jet solution with the sharp inter-jet boundary lying along y = 0 ∀ t ∈ [0,1000] so the migration is not captured by a QL theory, as also determined by <cit.>. The GQL and GCE2 solutions are shown in the bottom row. Whereas GQL (bottom left) appears to predict a mild degree of jet migration, GCE2 (bottom right) records the downward jet migration as observed in NL (top)! Note that the slope in GCE2 must be magnified ten times for an apples-to-apples comparison with that in NL due to the former's much shorter run. Here too then, GCE2 improves significantly over CE2 by capturing jet migration that CE2 can not. In order to elucidate on the differences in jet behaviour recorded by GQL and GCE2, we conducted a series of GQL simulations with different random seed values used to generate the initial conditions. This resulted in an ensemble containing a wide range of jet behaviour, including jet migration and steady jet propagation. In the interest of brevity, we show in <ref> the results of a single GQL run (left) chosen from the ensemble that predicts upward jet movement with a speed of roughly 0.41m^∘ per day. We compared this with a GCE2 simulation (left) initialised with maximum ignorance, i.e. with a full-rank second cumulant initialised with power 10^-6. GCE2 records the identical upward jet migration with a speed of roughly 0.44m^∘ per day. Note that the x-axis ranges in both figures are significantly different, so the slopes do not appear identical visually. It is interesting that GCE2 with a maximum ignorance initial condition predicts upward jet migration rather than in the opposite direction as observed in GCE2 with a unity rank IC (see <ref>). In <ref>, we show time-averaged energy spectra for the different solution methods for the stochastically-forced case shown in <ref>. The fully-nonlinear system (top panel) contains energy in the m = 1 zonal mode, primarily via the n = ± 1 non-zonal wavenumber (which corresponds to the opposed jet configuration). A significant portion of the energy is also present in the m = 1 and m = 2 zonal modes, the remaining being scattered through the entire range of zonal modes but a relatively narrow band of non-zonal modes. In comparison with NL, the QL and CE2 solutions (middle row) consist of localised bands of excited zonal modes. For instance, the m = 1 and m = 2 modes are relatively very weak in the QL and CE2 solutions; so also, the modes m = 6 or m ≥ 9 appear to be absent in comparison to NL. This localisation of energy arises because scattering is unavailable in QL (and therefore CE2) owing to the absence of the required non-linearities; a given zonal mode m becomes energetic in QL only via a corresponding instability of the mean flow. Once energetic, the zonal mode m can transfer its energy back to the mean via self-interactions, but may not transfer energy to another non-mean mode |m| 0. On closer examination, it is revealed that QL and CE2 exhibit differences. The differences between energy distribution over non-zonal wavenumbers in the m = 2 mode are immediately evident between QL (left panel) and CE2 (right panel). In other words, the CE2 solution obtained is not identical to that of a single realisation of QL. As in the Kolmogorov flow case, we hold that these divergences are linked to the rank instability in CE2. The GQL and GCE2 solutions in <ref> (bottom row) improve considerably over the QL/CE2 solutions. The missing zonal modes m = 1,2,6, etc. are found to be energetic in GQL/GCE2. This is because non-linear interactions involving the m = 1 mode that are available within GQL (and thereby GCE2) allow for scattering of energy leading to a broader spread of energy over the range of zonal wavenumbers. It is remarkable though that GQL with a cutoff Λ = 1 appears to be in excellent agreement with NL (top panel). We note that GCE2 diverges from GQL to some extent in the same way CE2 was seen to diverge from the QL solution. Broadly speaking, energy appears to be less spread out in GCE2 as compared to GQL, being more concentrated to small non-zonal wavenumbers. For instance, energy in the m = 1 mode in GCE2 (bottom right panel) is limited to a significantly narrower range of non-zonal wavenumbers |n| ≲ 3. Additionally, the (± 1,0) modes are weaker in GCE2 by an order of magnitude. In light of the divergences shown previously for Kolmogorov forcing, it would suffice here to show a departure in the rank of a second cumulant submatrix to explain the divergences seen above for the stochastically driven case. In <ref>, we show the final-time ranks of second cumulant submatrices. For CE2 (orange bars in the left panel), the zonal modes m = 8,9 are full-rank by virtue of the stochastic driving; however, we note that a number of additional zonal mode submatrices also depart in rank from unity as is held by the corresponding QL solution (blue bars in the left panel). Since there is no pathway of interactions that can transfer energy between the various non-mean zonal modes in QL (and CE2 by extension), each of the zonal modes with non-unity rank must have acquired its own rank instability. This contrasts with GCE2 (orange bars in the right panel) where all high zonal modes |m| > 1 for the spectral cuttoff Λ = 1 are full rank. In essence, scattering of energy allowed within the GQL/GCE2 formalism causes full rank of stochastically-driven modes to be transferred to all remaining zonal modes. We term this rank scattering. Thus we observe that communication matters: moving from CE2 to GCE2 changes significantly the channels of communication so that energy scattering and rank scattering can occur. § CONCLUSIONS In this paper we have tested a method of Direct Statistical Simulation (DSS) that is obtained as a mathematically exact closure for the Generalised Quasilinear (GQL) equations. This method of DSS, which we term GCE2, adopts generalised cumulant expansions and is capable of systematically interpolating between statistics corresponding to quasilinear and fully non-linear equations. We have implemented GCE2 in a numerical code for simulations on the β-plane with two driving models, deterministic and stochastic. Our simulations, which employ a minimal spectral cutoff Λ = 1, confirm that GCE2 improves considerably over CE2, the DSS method corresponding to quasilinear dynamics. We have also shown that statistics of GCE2 may depart from those of GQL due to the rank instability as found recently for QL and CE2 <cit.>. Interestingly, we also confirm the recent conclusions of <cit.> demonstrates that CE2 and QL solutions may diverge at identical parameters despite the fact that CE2 is an exact mathematical closure for QL. Such divergences (also observed by <cit.>) were linked to the emergence of instabilities, particularly the rank instability, that are available within the CE2 system but unavailable in QL. We have found that the GCE2 system is amenable to such instabilities too, and therefore its solutions can and do divergence from solutions of the GQL system. This is a feature rather than a bug. CE2 is a statistical description, whereas any single realisation of QL dynamics is a dynamical one. Hence GCE2 is a powerful method for self-consistently modelling the full dynamics of a range of spectral scales, coupled with the statistics of the quasilinear dynamics of the smaller spectral scales not captured directly by the full dynamics. We acknowledge support of funding from the European Union Horizon 2020 research and innovation programme (grant agreement no. D5S-DLV-786780). JBM and SMT are supported in part by a grant from the Simons Foundation (Grant No. 662962, GF). jfm
http://arxiv.org/abs/2303.06982v1
20230313103244
Analysing the Masked predictive coding training criterion for pre-training a Speech Representation Model
[ "Hemant Yadav", "Sunayana Sitaram", "Rajiv Ratn Shah" ]
cs.SD
[ "cs.SD", "eess.AS" ]
Measuring the environment of a Cs qubit with dynamical decoupling sequences Artur Widera March 30, 2023 =========================================================================== Recent developments in pre-trained speech representation utilizing self-supervised learning (SSL) have yielded exceptional results on a variety of downstream tasks. One such technique, known as masked predictive coding (MPC), has been employed by some of the most high-performing models. In this study, we investigate the impact of MPC loss on the type of information learnt at various layers in the HuBERT model, using nine probing tasks. Our findings indicate that the amount of content information learned at various layers of the HuBERT model has a positive correlation to the MPC loss. Additionally, it is also observed that any speaker-related information learned at intermediate layers of the model, is an indirect consequence of the learning process, and therefore cannot be controlled using the MPC loss. These findings may serve as inspiration for further research in the speech community, specifically in the development of new pre-training tasks or the exploration of new pre-training criterion's that directly preserves both speaker and content information at various layers of a learnt model. self-supervised learning, masked predictive coding, SUPERB benchmark § INTRODUCTION In recent years, there has been a lot of interest in using the self-supervised learning (SSL) technique to learn high-level representations from speech data <cit.>. SSL methods work by using the input data itself to learn high-level representations that can be used to solve a variety of tasks. The training process typically involves a pre-text task, such as masked predictive coding (MPC) <cit.>, auto-regressive predictive coding i.e., predicting future time steps based on the past <cit.>, or contrastive predictive coding (CPC) <cit.>. The goal is to learn representations that are invariant (to irrelevant factors), disentangled, and hierarchical in nature, meaning that they can be helpful in solving different tasks simultaneously. Later, these SSL models can be used as a starting point to solve multiple speech tasks in two ways: (i) either by fine-tuning the model weights for each task separately, or (ii) using them as a fixed feature extractor for different downstream tasks as in the SUPERB <cit.> benchmark to evaluate how well the model generalizes. Later is preferred for its computation and memory efficiency. Furthermore, the authors of SUPERB benchmark show empirically that taking the weighted sum of features extracted at various layers gives better performance compared to using only the last layer feature. Top performance models in SUPERB benchmark setting are pre-trained with masked predictive coding, using the masked prediction loss (MPL), as the pre-text task. Given the recent success of SSL models in the speech community, it was natural for researchers to investigate what is encoded at different layers. Two most popular approaches are: (i) learning a probing task <cit.> and (ii) analyzing the representations directly <cit.>. <cit.> studies the information encoded by different pre-training techniques as a function of similarity by training several probing classifiers. On the other hand, <cit.> studies the phonetic content in the learned representations in various layers directly. In this paper we analyse the impact of the masked prediction loss on the encoded information. Specifically, our study focuses on investigating the information type (content or speaker) that is learned as a direct result of masked prediction loss during the pre-training step. (i) Our experiments suggest that the MPC loss is positively correlated to the performance increase in content-based tasks, such as automatic speech recognition. In contrast, the WavLM <cit.> paper simply makes an observation on the information type encoded at each layer and does not comment on the cause of it. (ii) While the performance of speaker-based tasks decreases in relation to the increase in the performance of content-based tasks (orthogonal nature of information type). This is an indirect consequence of the learning process and can not controlled using the MPC loss. The authors of WavLM add a data augmentation to make the task harder such that it results in lower layers encoding speaker-related information (task is harder because of speaker separation). Again no correlation with the MPC loss. But an indirect result of the task being harder. A similar observation to ours. § RELATED WORKS As SSL models are becoming mainstream, many researchers have tried to understand what is happening under the hood of these pre-trained models either by learning a probing tasks <cit.> or analyzing the representations directly <cit.> are two most popular approaches. The authors of <cit.> study the WAV2VEC2.0 model <cit.> representations directly rather than training additional classifiers as probes. They show that the pre-trained model follows an auto-encoder style behavior i.e., intermediate layers provide richer information of higher-level classes (phone/word information) than the initial and last layers. This is in line with other studies in the image community <cit.>. Chung et al. <cit.> studies the similarity between the representations of three SSL pre-training techniques i.e., contrastive predictive coding (CPC), auto-regressive predictive coding (APC), and masked predictive coding (MPC). Their findings suggest that it is the learning objective which controls the representation similarity than architectural choices such as building blocks and directionality. Similarly, in a comprehensive review of self-supervised speech representation learning by Mohamed et al. (2022) <cit.>, the authors posited that the choice of training criterion has a greater impact on the performance gains compared to the architecture or the directionality of input. Given pre-training criterion has the highest impact on the model's performance, in this paper we investigate the impact of the masked prediction loss on the encoded information type in various layers of HuBERT model <cit.>. To answer this we use nine probing tasks from the SUPERB benchmark. Specifically, the paper aims to determine if the use of the MPL criterion favors certain category of downstream tasks over others i.e., if the loss enforces the learned representation to be rich in content or semantic or speaker information or a combination of them. § METHOD §.§ Manipulating the impact of the masked prediction loss training criterion on the encoded information at various layers of HuBERT model. HuBERT is one of the top-performing models on the SUPERB benchmark for various downstream speech tasks and is pre-trained using the MPL criterion. In brief, the pre-training process can be separated into two steps: (i) a set of pre-defined number of labels are generated using the k-means algorithm, and (ii) continuous spans of input are masked and fed to the encoder and the loss is calculated over the masked indices only. A more detailed explanation can be found in the original paper <cit.>. Given its exceptional performance on various downstream tasks, we investigate the impact of the masked prediction loss training criterion on the encoded information type at different layers of HuBERT in this study. In order to answer this question, we setup two different, yet similar, pre-training configurations using the masked prediction loss. Both the setups differ in number of loss calculations and the location where the loss is applied. Total loss = ∑_LOC^ MPL. Where MPL is calculated similarly to <cit.> and LOC is the location of it. For example, if there are 10 layers, then LOC={0.4,0.6} means we select the 4th and 6th layer of HuBERT to apply the MPL and sum them to calculate the total loss. In the first setup, similarly to <cit.>, we pre-train HuBERT by applying mask prediction loss on the final layer using 100 labels i.e., LOC is 1. We refer to this setup HuBERT_1 and is largely similar to the original HuBERT paper, with the exception that they used a cluster size of 500. In our second setup, the number and location of MPL changes such that we apply the same loss at three different layer locations using three separate sets of labels (100, 250, 500). Here the LOC has three values and therefore we sum three losses at different locations to get the final sum. In our second setup, the loss with 100 labels is applied to the final layer of HuBERT, with 500 labels is applied closer to the initial layers, and with 250 labels is applied equidistant from the 100 and 500 loss positions. We call this setup HuBERT_3_{LOC^500}. Where LOC^500 refers to the location of loss with 500 labels. The effect of choice of layer on which MPL with 500 labels is applied is discussed in Section <ref>. These two pre-training setup simulates the degree of influence of MPL on the type of information encoded at various layers. §.§ Evaluating the encoded information at different layers using probing tasks. After the pre-training, features are extracted from each layer for evaluating their performance on nine different downstream tasks on the SUPERB benchmark and follow the standard SUPERB procedure for evaluating the two pre-training (upstream model) setups. Briefly, a linearly weighted sum of these features is used as an input to various downstream tasks, meaning different layers are more crucial for different downstream tasks. We also use these weights to draw a comparison on the information type at different layers for the two pre-training setups outlined in Section <ref> i.e., content or speaker related. § EXPERIMENTAL DETAILS Dataset:For pre-training HuBERT (the upstream SSL model), we use the standard Librispeech 960 hours dataset. Nine downstream tasks are chosen from the SUPERB benchmark. These nine downstream tasks are divided into three categories (i) 3 speaker tasks:- Speaker identification (SID), Automatic speaker verification (ASV), and speaker diarization (SD) (ii) 4 content tasks:- Phoneme recognition (PR), Automatic speech recognition (ASR), Keyword spotting (KS), and Query-by-Example (QbE) (iii) 2 Semantic tasks:- Intent classification (IC) and slot filling (SF). For details, refer <cit.>. Pre-training: As explained in Section <ref>, two models are pre-trained using MPL training criterion. In both setups, we pre-train the BASE HuBERT model on 960 hours of Librispeech data using 16 GPUs in total with a batch size of at most 78.12 seconds of audio per GPU for 400k iterations. It took around 18 hours to complete 100 thousand steps for the first setup and 24 hours for the second setup. For reference, in the original HuBERT paper, the authors trained on 32 GPUs with a batch size of at most 87.5 seconds of audio per GPU. Pre-trained models and training configurations can be found on GitHub [GitHub-link]. Downstream tasks: The two pre-training setup are evaluated on nine different downstream tasks taken from SUPERB benchmark. Adhering to the SUPERB benchmark evaluation, features from each layer are linearly weighted and is used as an input for different downstream task. These weights for each task are then plotted as a heatmap, as shown in Figure <ref>. We use the evaluation scripts provided in the official GitHub[https://github.com/s3prl/s3prl] repository of SUPERB benchmark. § RESULTS §.§ Impact of the MPC loss on the type of information learnt at various layers. We analyse the linearly weighted sum of layers for different downstream tasks. This gives us a better understanding of the correlation between the information type at each layer and the masked prediction loss pre-training criterion. The weights show the importance of features extracted from each layer for eight downstream tasks, as shown in Figure <ref>. The first observation is that the aggressive application of masked prediction loss in the HuBERT_3_0.4 setup, increases the participation of each layer in the weighted sum for the content based task such as ASR and PR. In other words, a lot more layers are now active and the weights are more evenly distributed compared to HuBERT_1. This could be a contributing factor for the improvement in performance of ASR and PR. A similar trend is also observed in the semantic-based tasks such as SF and IC. The second observation is that aggressively applying the masked prediction loss, in HuBERT_3_0.4, pushes the participation of layer for speaker-related task towards the few initial layers (up to layer 3). Compared to HuBERT_1 where most of the intermediate layers are active for the ASV and SID task. Combining these two observations, we hypothesize that the amount of content-related information learned at various layers of the HuBERT model is directly proportional to the minimization of the MPL i.e., positive correlation. An increase in the performance of content related tasks would result in a performance drop for the speaker related tasks (orthogonal nature of information type). We observe the same in our experimental analysis, as shown in Table <ref>. To further test our hypothesis, we pre-train two additional models, following the second setup, such that the location of masked prediction loss is now closer to the final layer with location values of 0.6 and 0.8. We observe a similar trend that the content information shifts towards the final layers, which is expected. Which results in performance degradation for ASR and PR tasks and improvements for the speaker-based tasks such as SID and ASV. Our experimental results validate the same, as shown in Table <ref>. These two experiments further supports our initial hypothesis that the masked prediction loss and the content information in the learned representations has a positive correlation. §.§ Quantitative analysis of HuBERT_1 and HuBERT_3_0.4 performance on SUPERB benchmark We evaluate the two pre-training setups across nine different tasks, as shown in Table <ref>. Firstly, we observe that aggressively applying the masked prediction loss at three different layers gives a boost in performance to content-based tasks and a drop in performance for speaker-based tasks and vice-versa. We also observe a similar trend for semantics-based tasks, i.e, HuBERT_3_0.4 either improves the performance or matches HuBERT_1. Based on our experiments of the QbE task, we observe the decrease in performance as we increase the number of labels. In the original HuBERT paper, the authors used 500 labels and achieve a score of 0.0736. Our results show that the performance of QbE task is inversely proportional to the number of labels. §.§ Discussion We also studied the impact of the cluster assignment strategy on the performance of HuBERT_3_0.4. Previously, to generate the labels, k-means was run randomly on a 10% subset of data, each time to create three different clusters of 100, 250, and 500. This cluster assignment setup is referred to as CA1. In contrast, the new cluster assignment setup, referred to as CA2, involves running k-means to obtain 500 cluster points, then using these points as input to k-means again to get 250 cluster points, and repeating the process to obtain 100 cluster points. This setup is similar to the Hierarchical clustering algorithm. The pre-training process explained in Section 3 is conducted again using the labels created with CA2. The results show that the performance gains for ASR and PR tasks are even greater when using labels generated from CA2 compared to CA1. It is suggested that the labels generated with CA2 setup are more stable, meaning the behavior in the middle layer embeddings learned from 500 and 250 labels support/align with the 100 labels learned in the last layer. On all other tasks, there is a slight degradation and severe degradation on ASV and SD tasks. The reason for this behavior is unknown and left for future research. Lastly, we pre-train a deeper model (18 layers) using the CA1 setup and observe that only the ASR and PR performance has increased for the HuBERT_3_0.4 compared to the HuBERT_1. This again proves our hypothesis that the content information encoded in various HuBERT layers and the MPC loss has a positive correlation. § CONCLUSION AND FUTURE WORK In this work, we analyze the effect of MPL pre-training criterion on what is encoded at different layers. We find that minimizing the MPL maximizes the content information in the layers closer to where the loss is calculated. While at the same time forgetting speaker information and pushing them far from the layer where loss is calculated. This is true in general also, i.e., information require to solve the ASR and SID task is orthogonal. Based on our findings we hypothesize that simply applying MPL to learn speech representations is not the way forward for pre-training ONE universal model that can be used for different downstream tasks. § ACKNOWLEDGMENTS Rajiv Ratn Shah was partly supported by the Infosys Center for Artificial Intelligence and the Center of Design and New Media at IIIT Delhi, India. Hemant Yadav is supported by Microsoft Research India PhD Fellowship program. IEEEbib
http://arxiv.org/abs/2303.06945v2
20230313092734
CoGANPPIS: Coevolution-enhanced Global Attention Neural Network for Protein-Protein Interaction Site Prediction
[ "Jiaxing Guo", "Xuening Zhu", "Zixin Hu", "Xiaoxi Hu" ]
q-bio.QM
[ "q-bio.QM", "cs.LG" ]
Context-Aware Selective Label Smoothing for Calibrating Sequence Recognition Model Shuangping Huang^1,2, Yu Luo^1, Zhenzhou Zhuang^1, Jin-Gang Yu^1,2*, Mengchao He^3, Yongpan Wang^4 =========================================================================================================== Protein-protein interactions are of great importance in biochemical processes. Accurate prediction of the protein-protein interaction sites (PPIs) from protein sequences deepens our understanding of biological mechanism and is crucial for new drug design. However, conventional experimental methods for PPIs prediction are costly and time-consuming so that many computational approaches, especially ML-based approaches, have been developed recently. Although these approaches have achieved gratifying results, there are still two limitations: (1) Most existing models have excavated a number of useful input features, but failed to take coevolutionary features into account, which could provide clues for inter-residue relationships and could be helpful for PPIs prediction; (2) The attention-based models only allocate attention weights for neighboring residues, instead of doing it globally, which may limit the model's prediction performance since some residues being far away from the target residues in the protein sequence might also matter. We propose a coevolution-enhanced global attention neural network, a sequence-based deep learning model for PPIs prediction, called CoGANPPIS. Specifically, CoGANPPIS utilizes three layers in parallel for feature extraction: (1) Local-level representation aggregation layer, which aggregates the neighboring residues' features as the local feature representation similar to previous studies; (2) Global-level representation learning layer, which employs a novel coevolution-enhanced global attention mechanism to allocate attention weights to all the residues on the same protein sequences; (3) Coevolutionary information learning layer, which applies CNN & pooling to coevolutionary information to obtain the coevolutionary profile representation. Then, the three outputs are concatenated and passed into several fully connected layers for the final prediction. Extensive experiments on two benchmark datasets have been conducted, demonstrating that our proposed model achieves the state-of-the-art performance. The source code is publicly available at https://github.com/Slam1423/CoGANPPIS_source_codehttps://github.com/Slam1423/CoGANPPIS_source_code. § INTRODUCTION Proteins participate in a variety of biological processes in organisms. They rarely act alone, instead, they usually carry out various functions by interacting with different kinds of molecules, such as DNA, lipids, carbohydrates, and other proteins <cit.>. Such a process of establishing physical contacts of high specificity between two or more protein molecules is known as protein-protein interaction, which plays an important role in many biochemical processes including immune response, muscle contraction, and signal transduction. Considering the high practical and research values of PPIs prediction, many approaches have been proposed so far. There are some conventional experimental methods, such as two-hybrid screening, relationship purification, and intragenic complementation, being commonly applied to identify PPIs <cit.>. However, these experimental methods suffer from being costly and time-consuming so that more accurate and efficient computational predictors for PPIs are of great value for biologists. With the rapid development of computer science, a lot of computational approaches, especially ML-based approaches, have been developed, which take protein sequences or structures as input and be known as sequence-based and structure-based respectively <cit.>. Although Structure-based methods have achieved some promising progress in recent years <cit.>, they may cause problems for biological researchers since the number of proteins with available structures is limited. For example, AlphaFold2 has shown promising performance in protein structure prediction, but its effectiveness on some newly-discovered proteins and some exotic proteins still remains to be tested. At the same time, its requirement for computational resources could be too high for most researchers <cit.>. In contrast, sequence-based methods are more practical since protein sequences are easier to be obtained with the noticeable development of high-throughput techniques. Sequence-based methods could be classified as partner-specific and nonpartner specific sequence-based PPIs prediction <cit.>, and in this paper we focus on the later one. The partner-specific sequence-based PPIs prediction aims to identify the interaction residue pairs of two given proteins, which has not been covered in our present work. Sequence-based methods can be further classified into 2 categories: traditional machine learning approaches and deep learning approaches. The commonly-used traditional machine learning approaches include SVM <cit.>, Naïve Bayes <cit.>, shallow neural network <cit.>, random forest <cit.>, and logistic regression <cit.>. However, these methods cannot capture the relationships among different residues located on the same protein sequences since they treat every residue as an independent sample. In recent years, due to the great success of deep learning in many fields such as computer vision, speech recognition and natural language processing, the models based on deep learning have also been used in PPIs prediction. Among these, DELPHI proposed by Li et al., a fine-tuned ensemble model combining recurrent neural networks and convolutional neural networks, shows significant improvement in PPIs prediction compared with traditional machine learning models <cit.>. Zeng et al. devised DeepPPISP, which is a convolutional neural network-based model and achieves good outcomes by combining both local and global sequence contexts as input and processing them respectively <cit.>. On the basis of DeepPPISP, Lu et al. constructed an attention-based convolutional neural network, which gives different attention weights to the neighboring residues so that it could make a better understanding of the local environment of the target residue <cit.>. Tang et al. used a double-layer attention mechanism prediction model based on graph convolution, which further improves the performance and interpretability of the prediction <cit.>. Besides, Stringer et al. proposed an ensembled model combining several neural net architectures and achieved consistently peak prediction accuracy <cit.>. Conventional sequence-based input features can be roughly classified into 4 categories: raw protein sequences, evolutionary information, residue physiochemical properties, and predicted structural features <cit.>. Raw protein sequence features are obtained by encoding each amino acid on the protein sequences into a 20D one-hot vector since there are 20 different kinds of amino acids. Evolutionary information usually refers to the position-specific scoring matrices (PSSM) as well as other conservative scores of the proteins, which are calculated from multiple sequence alignments (MSA) and very informative for protein-related prediction tasks. Residue physiochemical properties (such as residue's charge and polarity) have been applied in many models in recent years, which can be obtained from databases or some specific predictors. Besides, in the absence of protein structure, the predicted structural features (such as hydrophobicity, secondary structure, disorder) can also be helpful. Recently, another sequence-based feature, coevolutionary information based feature, has been applied to another important protein-related problem, protein contact-map prediction, and brings about significant performance improvement <cit.>. These features are mainly obtained by direct coupling analysis (DCA) and could quantify the inter-residue coevolutionary relationships. Intuitively, for a residue, its properties and behaviours should be more similar to the residues closely related to it, which inspires us to develop a coevolution-enhanced global attention mechanism for a better attention weight allocation among different residues on the protein sequences. To evaluate the performance of our model, we compare it with other seven computational methods (PSIVER, ISIS, SPRINGS, DELPHI, DeepPPISP, ACNN and ensnet_p) on two benchmark datasets Dset422 and Dset448. The experimental results show that our model achieves state-of-the-art performance for PPIs prediction. The main contributions of this paper are as follows: (1) To the best of our knowledge, this is the first time to introduce coevolutionary information as input features into deep learning based PPIs prediction model and we verify its usefulness in PPIs prediction by ablation analysis. (2) We propose a novel coevolution-enhanced global attention mechanism for global-level representation learning, which allocates attention weights based on a better understanding of the whole protein sequences and the coevolutionary relationships among the residues. (3) We conduct extensive experiments on two benchmark datasets, the results of which demonstrate that CoGANPPIS achieves state-of-the-art performance. The rest of this paper is organized as follows: Section 2 introduces the datasets and the input features. Section 3 presents the architecture of our model, the experimental results and experiment analysis. In the end, section 4 summarizes the discussion of this paper. § MATERIALS AND METHODS §.§ Datasets In this study, two benchmark datasets, Dset422 and Dset448, are used in experiments. Dset422 consists of Dset72 <cit.>, Dset186, and Dset164 <cit.>, whose protein sequences were collected from Protein Data Bank <cit.>. The protein sequence homology is less than 25% and if an amino acid has absolute solvent proximity less than 1 Å^2 before and after binding with other proteins, it will be defined as an interaction site <cit.>. Dset448 is sourced from the BioLip database, where residues are defined as interaction sites if the distance between an atom of this residue and an atom of a given protein-partner less than 0.5 Å plus the sum of the Van der Waal's radii of the two atoms <cit.>. First, the protein sequences were mapped into Uniprot databases to collect binding residues across different complexes. Then, they were clustered by Blastclust at 25% similarity, after which one protein was selected from each cluster to ensure that proteins in Dset448 share similarities less than 25%. Besides, a dataset of 4392 protein sequences was constructed in the paper of PIPENN <cit.>. In this paper, we name it Dset4392. The data of Dset4392 is from the BioLip Database, where binding sites are defined similar to Dset448. We utilize it for pretraining. For Dset422 and Dset448, we randomly divided them into training set (about 83% of randomly selected proteins), validation set (about 5% of randomly selected proteins), and test set (the remaining proteins) respectively. Consequently, for Dset422, there are 352 proteins in the training set, 21 proteins in the validation set, and 49 proteins in the test set. And for Dset448, there are 373 proteins in the training set, 22 proteins in the validation set, and 53 proteins in the test set. We count the distribution of sequence lengths of the three datasets. As shown in Table <ref>, only a small proportion of protein sequences in the two datasets are longer than 500. Hence, for the convenience of model training, we preprocess the protein sequences by unifying their lengths to 500, that is, if a protein sequence is longer than 500, we truncate it to 500; if a protein sequence is shorter than 500, we pad their length to 500 with zeros. §.§ Input Features The features commonly used in previous research, including the position-specific scoring matrix, Netsurf-based features, and raw sequence features, are applied in our model. Besides, we also introduce coevolutionary information into our model, which, to the best of our knowledge, is the first time to be used as input features in deep learning based PPIs prediction. These features are described in detail as follows. §.§.§ Position-specific scoring matrix Position-specific scoring matrix (PSSM) contains evolutionary information, which has been shown effective for PPIs prediction <cit.>. We perform the PSI-BLAST algorithm on each input sequence against NCBI's non-redundant sequence database with three iterations and an E-value threshold of 0.001 to obtain its PSSM, where every amino acid residue on the underlying sequence is encoded as a vector with 20 elements. §.§.§ Netsurf-based features NetSurfP-3.0 is a tool for predicting solvent accessibility, secondary structure, structural disorder and backbone dihedral angles for each residue of an amino acid sequence <cit.>. Here we utilize it to predict RSA, ASA, 3-state secondary structure as well as 8-state secondary structure from the sequence. Each amino acid residue is encoded as a vector with 13 elements, which represents the predicted solvent accessibilities and the probabilities of being the corresponding secondary structure state at this position. §.§.§ Raw sequence features In this study, we include two raw features, amino acid type and sequence length into our model. Most proteins consist of 20 different amino acids. Hence, we encode each amino acid residue as a 20D one-hot vector representing the amino acid type at this position. Besides, we utilize an integer to represent the length of the sequence for each residue. §.§.§ Coevolutionary information Coevolutionary relationship between amino acid residues refers to the interdependent changes that occur in pairs of residues on the same protein sequences, which help maintain proteins' stability, function, and folding <cit.>. As mentioned earlier, coevolutionary information based input features brought about great performance improvement in protein-contact map prediction, inspiring us to apply it in this study. Direct-coupling analysis (DCA) is one of the main computational approaches to capture proteins' coevolutionary information. The key idea of DCA is to disentangle direct pairwise couplings of each two amino acid residues on the same protein sequences. For each protein, DCA takes its multiple sequence alignments (MSA) as the input, which is obtained by BLASTP, and returns a N× N matrix, where N refers to the length of this protein sequence. The (i,j) element of this matrix refers to the direct coupling degree of the ith residue and the jth residue on this protein sequence. The larger this value is, the higher the coevolutionary relationship exists between these two residues. In our study of predicting whether an amino acid residue is an interaction site or not, the corresponding column of the target amino acid residue in the DCA matrix has been extracted as its coevolutionary information feature. There are three usual DCA algorithms, mpDCA <cit.>, mfDCA <cit.>, and plmDCA <cit.>. The mpDCA uses a semi-heuristic message-passing approach, and its slow computation speed makes it difficult to be applied to a large-scale dataset. The mfDCA uses a mean-field approach based on the maximum-entropy model, which greatly improves the computational speed. On the basis of mfDCA, the plmDCA applies pseudo-likelihood to the Potts model and achieves higher accuracy than mfDCA. Based on the above comparison, we utilize plmDCA to generate DCA matrices in this study. §.§ Model Architecture Figure <ref> is an overview of the proposed framework. First, we extract the local features, global features, and coevolutionary features of the primary protein sequence with different components respectively, which, in this paper, are referred to as local-level representation aggregation layer, global-level representation learning layer, and coevolutionary information learning layer. Each layer outputs a feature representation vector. Then we concatenate three feature representation vectors as the output of the feature extraction and pass it into the prediction layer consisting of four fully connected layers for the final prediction about whether the target amino acid residue is an interaction site or not. Now we introduce the three layers in feature extraction in detail. §.§.§ Local-level representation aggregation layer For each target residue, a sliding window of length (2n+1) is used to aggregate the features of itself and its neighboring 2n residues. For the ith residue on the protein sequence, we denote its local feature representation as h_i^local. §.§.§ Global-level representation learning layer It has been shown that the global features of protein sequences are critical for PPIs prediction <cit.>. Also, the usage of the coevolutionary information has gained success in some other related protein problems <cit.>. Hence, we consider to utilize a coevolution-enhanced global attention mechanism to distinguish the importance of residues. Assuming that the ith residue is the predicting target, all residues on the same sequence are linearly added according to the attention scores, h_i^p=∑_j=1^Nα_ijh_j, where h_j refers to the PSSM, predicted secondary structure, and raw protein sequence features of residue j and α_ij refers to the attention score, which estimates the importance weight of residue j on target residue i. Intuitively, different residues on the same protein sequence should have different importance for the target residue, and those which match the charateristics of the whole protein and share a close relationship with the target residue should be paid more attention to. Therefore, α_ij is calculated as follows: α_ij= softmax(π(i,j))=exp(π(i,j))/∑_k=1^Nexp(π(i,k)), π(i,j)=q_1^ T LeakyRelu([W_1(p⊙ h_j)‖ W_2(h_i⊙ h_j)]‖ w_ij). Here, we use LeakyRelu as the activation function. ⊙ indicates element-wise product, ‖ indicates concatenation operation, and w_ij∈ℝ^1 refers to the (i,j) element of DCA matrix of the current protein, which provides us some clues for the relationship between the residue i and residue j. W_1∈ℝ^d× d, W_2∈ℝ^d× d and q_1∈ℝ^2d+1 are trainable parameters. p can be seen as the feature representation of the whole protein sequence, which is obtained by mean-pooling on all the residues' features on this protein, p=1/N∑_j=1^Nh_j. Our approach makes the attention weights between the target residue and other residues dependent on not only the whole protein sequence feature representation but also the coevolutionary relationships between them, suggesting that those residues which match the charateristics of the whole protein and are closely related to the target residue will be attached more importance. Then we concatenate the global representation of the target residue h_i^p and its original feature h_i, h_i^global = h_i^p‖ h_i, where h_i^global is the result of the global-level representation learning layer. §.§.§ Coevolutionary information learning layer We have introduced coevolutionary information into the attention mechanism to exploit the relationship among residues as above. Now we further utilize the coevolutionary information on a larger scale, i.e, on the whole protein sequence level. Suppose we are predicting the ith residue on the protein sequence. First, we take its corresponding column in the DCA matrix as its coevolutionary information. Then we pass it into the CNN & pooling layer as shown in Figure <ref>: h_i,k^dca= Relu( conv1d^(k)( BN( DCA[:,i]))), k∈[1,K], h_i^dca=‖_k=1^Kh_i,k^dca, where DCA[:,i] is the ith column of the DCA matrix of the underlying protein. BN refers to the BatchNormalization operation and the 1D convolution operation conv1d extracts the normalized coevolutionary features. We use Relu as the activation. Here we use K different convolution kernels for a better extraction of coevolutionary features. Finally, we obtain the coevolutionary representation h_i^dca by concatenating all K results linearly. §.§.§ Prediction layer To predict whether an amino acid residue is an interaction site or not, first we concatenate three former feature extraction results to obtain the final representation: h_i^pred=h_i^local‖ h_i^global‖ h_i^dca, where h_i^local, h_i^global and h_i^dca are the results of local-level representation aggregation layer, global-level representation learning layer, and coevolutionary information learning layer. h_i^pred is the final representation of the residue, which will be passed into fully connected layers: x^(t)= Relu(W^(t)x^(t-1)+b^(t)), t∈ [1,T], where x^(t) and x^(t-1) refer to the input vector and output vector of the tth fully connected layer, respectively. Here, x^(0)=h_i^pred. W^(t) denotes the weight matrix and b^(t) denotes the bias. Besides, ReLU and dropout are utilized in each layer except the last one. After the last layer, a Sigmoid function is used to generate the final prediction: ŷ=1/1+e^-x^(T), where ŷ denotes the predicted probability of the residue being the interaction site. And 1-ŷ is the predicted probability of the residue being the non-interaction site. §.§ Evaluation Metrics PPIs prediction can be seen as a binary classification problem for identifying whether an amino acid residue is an interaction site or not. Consequently, there could be four types of results based on the residue's true category and predicted category, i.e., true positives (TP), true negatives (TN), false positives (FP), and false negatives (FN). Here, TP and TN refer to the correctly predicted interaction sites and non-interaction sites respectively; FP and FN refer to the incorrectly predicted interaction sites and non-interaction sites respectively. We select six evaluation metrics to comprehensively evaluate the predictive performance, including area under the precision-recall curve (AUPRC), accuracy (ACC), recall, precision, F-measure (F_1), and Matthews correlation coefficient (MCC). Considering that our dataset is imbalanced with more non-interaction sites than interaction sites, F_1 and MCC indices deserve more attention. The formulas for calculating these metrics are as follows: ACC=TP+TN/TP+TN+FP+FN, Recall=TP/TP+FN, Precision=TP/TP+FP, F_1=2× Precision× Recall/Precision+Recall, MCC=TP× TN - FP× FN/√((TP+FP)(TP+FN)(TN+FP)(TN+FN)). § RESULTS AND DISCUSSION §.§ Implementation In the feature extraction part, the sliding window length in the local-level representation aggregation layer is set as 7. We use three convolution kernels in the CNN & pooling layer and the sizes are set as 3, 5 and 7, respectively. In the classification part, we conduct four fully connected layers with 1024, 256, 8, 1 nodes respectively with a dropout ratio of 0.1. We use weighted cross-entropy loss as the loss function: L=-1/m∑_i=1^m(wy_ilog(ŷ_i)+(1-y_i)log(1-ŷ_i)), where m is the number of training samples. w refers to the weight and is set to 4. Interaction site is labeled as 1 (y_i=1) and non-interaction site is labeled as 0 (y_i=0). ŷ_i is the predicted probability of being interaction site of the sample i. Besides, we utilize Adaptive Momentum (Adam) as the optimizer with a learning rate of 0.0001. The batch size is set to 256. The model is implemented by PyTorch and trained on NVIDIA GTX 1080 Ti. Fine tuning is used in this model. Before training on Dset422 and Dset448, we first trained our model on Dset4392. After achieving the best performance on Dset4392, the parameters of the model are saved to files. When training on Dset422 and Dset448, the feature extraction part loaded the saved weights from the file and freeze the weights so that during the process of training, the parameters in feature extraction stayed unchanged. Training and validation data are used again only to train the fully connected layers in the prediction layer. §.§ Comparison with competing methods To evaluate the predictive performance of our model (CoGANPPIS), we compare it with seven popular sequence-based competing methods (PSIVER, ISIS, SPRINGS, DELPHI, DeepPPISP, ACNN and ensnet_p). Specifically, PSIVER <cit.> utilizes Naïve Bayes Classifier and kernel density estimation method to predict PPIs based on sequence features. ISIS <cit.> combines predicted structural features with evolutionary information to predict PPIs based on shallow neural networks. SPRINGS utilizes an artificial neural network to generate PPIs predictions <cit.>. DELPHI <cit.> employs a fine-tuned ensemble model by combining several recurrent neural networks and convolutional neural networks. DeepPPISP <cit.> considers both local contextual and global information and applies a convolutional neural network to predict PPIs. ACNN <cit.> employs a local attention mechanism to make PPIs prediction. And ensnet_p is an ensembled model combining different neural net models <cit.>. In words, all these traditional approaches do not apply coevolutionary information or global attention mechanism. Table <ref> presents the experimental results of seven sequence-based competitive PPIs prediction models and our proposed model. It can be observed that CoGANPPIS achieves the best performance across both two datasets in terms of all six metrics consistently, which ascertains its effectiveness. The ROC and PR curves of CoGANPPIS and other competing methods on Dset422 and Dset448 are shown in Figure <ref>. It demonstrates that AUPRC and AUC of CoGANPPIS are higher than that of other competing methods. §.§ Ablation analysis In this part, we test the usefulness of introducing coevolutionary information into PPIs prediction. First, we evaluate the performance of the model with coevolutionary information included. Then we remove coevolutionary information from the model and train the model again to measure the comparing performance. The model without coevolutionary information is named as CoGANPPIS^⊖. Table <ref> demonstrates the performance of CoGANPPIS and CoGANPPIS^⊖. We can find that CoGANPPIS outperforms CoGANPPIS^⊖ on both two datasets, which indicates that introducing coevolutionary information could help improve predictive accuracy and thus validates its effectiveness in PPIs prediction. §.§ Model performance on proteins of different lengths Considering that protein sequence length varies greatly from each other, it could be necessary to study the predictive performance on proteins of different length. To answer this question, we plot the experimental results of CoGANPPIS, CoGANPPIS^⊖ as well as ensnet_p in terms of F_1 and MCC under proteins of different lengths on the two datasets in Figure <ref>. Through the results, we have the following observations: First, we can observe that with the protein sequence length increasing, the performance of three models on two datasets all show an overall downward trend. This can be explained as the protein structure and function become more complex with the increase of length, making PPIs more difficult to be predicted. Second, it is interesting that the performance improvement of CoGANPPIS and CoGANPPIS^⊖ compared with ensnet_p increases as the increase of the protein sequence length. Take the F_1 on Dset422 in Figure <ref> as an example, when the length is less than 100, the F_1 of CoGANPPIS and CoGANPPIS^⊖ are 0.450 and 0.443 respectively, which are only 0.023 and 0.016 higher than that of ensnet_p (0.427). When the protein length is between 200 and 300, the improvements increase to 0.029 and 0.019 (0.414 vs 0.385 and 0.404 vs 0.385). When the protein length is greater than 500, the gaps further increase to 0.31 and 0.20 (0.402 vs 0.372 and 0.392 vs 0.372). This clearly shows that the longer the protein sequence is, the more PPIs prediction relies on global information extraction, which can be better captured by our global attention mechanism (even without coevolutionary information). Third, we pay attention to the comparison between CoGANPPIS and CoGANPPIS^⊖. The two metrics F_1 and MCC of CoGANPPIS on both two datasets are better than the ones of CoGANPPIS^⊖, which also verifies the effectiveness of coevolutionary information in PPIs prediction and confirms the conclusion that we obtained in ablation analysis. §.§ Impact of coevolution-enhanced global attention mechanism We have verified the effectiveness of coevolutionary information and global attention mechanism. Now let's further study how the coevolution-enhanced global attention mechanism works. First, for each pair of residues, we examine the relationships between its direct coupling degree and labels. As shown in Figure <ref>, the larger the direct coupling degree, the higher the probability that the pairs of residues have the same label. Further, let's take protein Q2T3W4 in Dset448 as an example. We first extract the attention weights of the first residue on Q2T3W4 in the training process. Then we plot a scatter diagram and fit a trend line of the points with attention weights larger than 0.001 as shown in Figure <ref>. We find that the slope of the trend line is positive, which implies that in general, the larger the direct coupling degrees, the higher the attention weights. Hence, the target residue could be paid more attention to the residues with high correlation during training process, which is an noticeable advantage of this attention mechanism. §.§ Visualization As mentioned above, the attention weights between two residues show a positive correlation with their direct coupling degrees. It prompts us to explore to which extent our attention mechanism enhances compared with allocating weights purely according to DCA. For a protein sequence with N amino acid residues, we sort residue pairs according to their attention weights and direct coupling degrees respectively, and keep the 5N, 10N as well as 20N highest-ranking pairs. Figure <ref> shows an example of the protein 7cei_A from Dset422. The three rows refer to the 5N, 10N and 20N situations in turn (Only the corresponding number of selected residue pairs are colored). The pairs with same labels are indicated in red and the pairs with different labels are shown in green. It is evident that our attention mechanism works consistently better than pure DCA because of the obviously higher proportion of red points in all three situations. To become more quantitative, we have binned the predicted pairs according to their separation along the protein sequence as shown in the third column in Figure <ref>. We observe that our attention mechanism captures the residues with same labels more accurately than pure DCA. Also, our attention mechanism could attach more attention weights to distant residues, whereas pure DCA tends to pay more attention to neighboring aggregated residues, which could be attributed to the consideration of the whole protein feature representation of our attention mechanism. § CONCLUSION The aim of this paper is to improve the PPIs prediction performance solely based on protein sequences, which is important for understanding the biological mechanism of proteins both experimentally and theoretically. A dozen of sequence-based PPIs predictors have been developed in recent years. However, most of these works just utilize some commonly used features without considering coevolutionary information which provides rich clues for inter-residue relationships. Also, they are not good at predicting PPIs of long-length proteins. Here, we propose a coevolution-enhanced global attention neural network (CoGANPPIS). Specifically, we employ a coevolution-enhanced global attention mechanism both for better inter-residue relationship capture and for better prediction of long-length proteins. We further aggregate the local residue features and apply a CNN & pooling layer to the coevolutionary information features as a supplement. Then we utilize several fully connected layers to generate the final prediction. Extensive experiments of CoGANPPIS and other seven popular methods on two standardized datasets show that our proposed model CoGANPPIS achieves the state-of-the-art performance. Further experimental analysis shows that: (1) Coevolutionary information can improve the performance of PPIs prediction. (2) CoGANPPIS can bring more performance improvement compared with previous methods as the protein sequence becomes longer, implying that CoGANPPIS has a better understanding of the whole protein sequences. (3) Compared with allocating attention weights according to pure DCA, the proposed coevolution-enhanced global attention mechanism pays more attention to the residues with same labels and shows a more evenly distributed attention weights instead of local aggregated attention weights. Although CoGANPPIS shows advantages over previous methods, it has some limitations: First, CoGANPPIS takes a lot of computation time due to its usage of multiple sequence alignments and direct coupling analysis to generate coevolutionary information. In addition, its predictive accuracy depends on the number of homologs since the direct coupling analysis becomes inaccuract if the number is smaller than 1,000. In the future, we would be commited to find useful, practical and time-saving features to make prediction faster and more accurate. § FUNDING This study was supported by funding from the National Natural Science Foundation of China (72222009, 71991472 to X.Z), the National Natural Science Foundation of China (3210040426 to Z.H.), the Shanghai Rising-Star Program (21QB1400900 to Z.H.), and was also partly supported by a grant from the major project of Study on Pathogenesis and Epidemic Prevention Technology System (2021YFC2302500) by the Ministry of Science and Technology of China.
http://arxiv.org/abs/2303.14101v1
20230312145535
Compton-Getting effect due to terrestrial orbital motion observed on cosmic ray flow from Mexico-city Neutron Monitor
[ "Carlos Navia", "Marcel de Oliveira", "Andre Nepomuceno" ]
astro-ph.HE
[ "astro-ph.HE", "astro-ph.EP", "physics.space-ph" ]
Instituto de Física, Universidade Federal Fluminense, 24210-346, Niterói, RJ, Brazil C.E. Navia carlos_navia@id.uff.br Instituto de Física, Universidade Federal Fluminense, 24210-346, Niterói, RJ, Brazil Departamento de Ciências da Natureza, Universidade Federal Fluminense, 28890-000, Rio das Ostras, RJ, Brazil We look for a diurnal anisotropy in the cosmic ray flow, using the Mexico-City Neutron Monitor (NM) detector, due to the Earth's orbital motion and predicted by Compton-Getting (C-G) in 1935, as a first-order relativistic effect. The Mexico-City NM's geographic latitude is not very high (19.33^∘N), and it has a high cutoff geomagnetic rigidity (8.2 GV) and mountain altitude (2274 m asl) favoring the observation of the C-G effect. Furthermore, during the solar cycle minima, the galactic cosmic ray flux is maxima, and the solar magnetic field gets weakened, with a dipolar pattern. Its influence on cosmic rays reaching Earth is the smallest. Analysis of the combined counting rate during two solar minima, 2008 and 2019, from Mexico-city NM's data yields the C-G effect with an amplitude variation of (0.043± 0.019)%, and phase of (6.15± 1.71) LT. The expected amplitude variation is 0.044%, and the phase of 6.00 LT. § INTRODUCTION The observed particle distributions in two frames of reference in relative motion are different. For instance, if the particle distribution is isotropic in a given reference frame, it must have an anisotropy in a reference frame in relative motion to the previous one in the direction of movement. That effect is known as the Compton-Getting (C-G) effect <cit.>. Thus, considering that galactic cosmic rays have an almost isotropic distribution into the heliosphere (as is expected during the solar cycle minima), it is expected an anisotropy in the daily distribution of cosmic ray intensity at Earth due to the Earth's orbital motion around the Sun. The cosmic ray intensity should be higher, coming from the direction the Earth is moving, i.e., around 06:00 LT <cit.>. However, as Earth's orbital velocity is relatively small, having an average value of 29.78 km/s, observation of the C-G effect requires high-energy cosmic particles to minimize distortions due to interplanetary magnetic field, the solar wind, and the Earth's magnetic field. The Earth's orbital motion is measured using underground muon flux because underground muons come from galactic cosmic rays with high geomagnetic rigidity cutoff (above 1000 GV). Indeed, it is reporting an anisotropy due to the C-G effect, with an amplitude of about 0.025%. The parent particles were galactic cosmic rays with a stiffness of around 1.5 TeV/c during an observation period of 5.4 years <cit.>. Other measurements indicate that the amplitude of the anisotropy in the secondary cosmic ray flux due to the C-G effect is no higher than 0.1% <cit.>. On the other hand, measurements of the C-G effect in spacecraft, through the hydrogen flux in the keV energy range, indicates that the C-G effect distorts the hydrogen flux. Monte Carlo simulations show that in the ram frame where the spacecraft is toward the emission source, the C-G effect forces the hydrogen flux to the ecliptic plane, while the opposite occurs in the anti-ram frame <cit.>. The energy spectrum of galactic cosmic rays follows a power law, from energies around ∼ 8.0 GeV to ultra-high energies. Also, the energy spectrum decreases as energy increases. In detectors whose location has a geomagnetic rigidity cutoff above 9.0 GV, 80% of secondary particles at ground level come from galactic cosmic rays (mainly protons) of up to 2 TeV <cit.>. Places with a high cutoff in geomagnetic rigidity and located at small geographic latitudes are more effective for observing the C-G effect. However, there is a side effect, the greater the rigidity cutoff, the smaller the cosmic ray flux. Thus the observation of the C-G effect requires long periods of observation. However, we show that some NMs, especially those located at low latitudes and with a high geomagnetic rigidity cutoff and altitude, such as the Mexico-City NM, can observe the C-G effect. Neutron monitors detect a large variety of secondary particles, mainly nucleons produced mainly by the galactic cosmic rays which reach the Earth's atmosphere <cit.>. The organization of paper is as follows: In Section 2, we present the data analysis with a brief description of Mexico City, including a theoretical aspect on the prediction of the C-G effect, followed by data analysis during two solar minima (2008-2019) and considering the two years together. We present in Section 3 a preliminary analysis of the seasonality of the C-G effect. The correlation between the phases of the C-G effect and the E-W asymmetry is analyzed in section 4. Finally, in section 5, we present a summary and conclusions of the article. § ANALYSIS §.§ Mexico-City NM data The Neutron Monitor Database (NMDB) (<http://www.nmdb.eu>) provides cosmic ray data from at least 18 neutron monitors distributed around the world, and operated in real-time. From these, the Mexico-City NM is among those located at not very high geographic latitudes (19.33^∘ N). In addition, it has a relatively high geomagnetic rigidity cutoff (8.2 GV) and a mountain altitude (2274 m asl) <cit.>. These characteristics are favorable to observing the C-G effect. The Mexico-city NM is in continuous operation since 1990. Fig. <ref> shows the pressure & efficiency corrected cosmic ray time profiles from these three decades. The left (red) scale is associated with the counting rate. While the scale at right (blue) is associated with the monthly sunspot number. The well-known inverse correlation between the cosmic ray counting rate and the sunspot number is evident. As already indicated, data from the Mexico City NM is available from NMDB. Despite data were corrected for pressure and efficiency, they still show some fluctuations in the counting rate During the minimums of the solar cycles, the Sun's magnetic field pattern is like a dipole structure. Its strength weakens and provides less shielding to the galactic cosmic rays, arriving in the Earth's environment almost with an isotropic distribution. This behavior is responsible for the inverse relationship between the galactic cosmic ray intensity and the sunspot number. So, during the minimums of the solar cycles, the galactic cosmic ray intensity at Earth is higher. These characteristics are essential to observe the small anisotropy due to the terrestrial motion. In more than 30 years of continuous operation, Mexico-City NM has recorded three solar minima. The start (minimum) of solar cycles 23, 24, and 25 was in August 1996, December 2008, and December 2019, respectively <cit.>. The maxima cosmic ray counting rate during the minima of cycles 24 and 25 was around 5% higher than the maximum counting rate from cycle 23. Fig. <ref> summarizes the situation. §.§ Compton-Getting effect prediction Assuming that an isotropic galactic cosmic rays flow reach the Earth with a power-law energy spectrum, such as E^-γ, with γ = 2.7, a ground-level detector would see an increase in the count rate when its field of view looks along the direction of Earth's orbital motion, predicted as <cit.> Δ f/f=(γ+2) v/ccosλ, where v is the mean speed of Earth's orbital motion (29.78 km/s). Here, we assume that the galactic cosmic rays speed is close to c (the speed of light in a vacuum). This approximation is valid for cosmic rays with energies greater than GeV, and λ is the angle between the direction of the detector's sensitivity and Earth's velocity vector. For non-directional (large field of view) detectors such as NMs, λ is close to the geographic latitude angle where the detector is located. The C-G effect amplitude variation predicted to the Mexico-City NM is 0.044% and a phase at 06:00 LT. §.§ Cosmic ray anisotropies at Earth In the region of energies below ∼50 TeV, the observed anisotropies of galactic cosmic rays mean that their propagation in the inner heliosphere (interplanetary space) is not isotropic. There are gradients parallel and perpendicular to the ecliptic plane. They are responsible for diurnal solar anisotropy and North-South anisotropy, among other smaller ones. Cosmic ray count rate at ground level provides valuable insight into the processes described above <cit.>. The large anisotropy observed at ground level is the diurnal solar anisotropy. Galactic cosmic ray propagation (with hardness below ∼50 GV) in the plane of the ecliptic corotates with the interplanetary magnetic field (IMF) <cit.>. When the flux reaches Earth, it produces the diurnal solar anisotropy, approximately perpendicular to the Sun-Earth line, with a phase about 15:00 LT (under positive solar cycle polarity qA>0) and about 18:00 LT (under negative solar cycle polarity qA<0) <cit.>. Like the C-G effect, the diurnal anisotropy depends on geographic latitude λ as cosλ <cit.>. Thus, the greater the latitude of the place, the smaller the amplitude of diurnal solar anisotropy, and it disappears in the polar regions. Here we highlight an anisotropy due to the Earth's orbital motion, the so-called C-G effect, through analysing the daily counting rates at Mexico City NM. We select three years, 1996, 2008, and 2019, during the solar minima when the galactic cosmic ray flux reaching Earth is maximum. In these years, the Sun's magnetic field is weakened. It is like a well-behaved magnetic dipole. Consequently, the Sun's magnetic effects on cosmic rays are smaller. However, 1996 data from Mexico-NM are not available at NMDB at 1 h or fewer time intervals, which impossibilities the analysis. So, 1996 NM data were not include. The analysis is restricted only to 2008 and 2019 years. Let's start with the 2008 data (minimum start of cycle 24). Fig. <ref> (top panel) shows the monthly counting rate time profiles (averathing 10 min) from Mexico-City NM data. Already Fig. <ref> (bottom panel) shows the mean count daily rates for the full year 2008. The two curves are two Gaussian fits around the first and second peaks. The first peak is identified as due to the C-G effect, originating by the terrestrial motion, and the second one as the diurnal solar variation due to solar wind corotating structure reaching the Earth. Table <ref> indicates the amplitude variation in percentage relative to the daily mean counting rate in 2008 due to the C-G effect and diurnal solar variations, respectively. Table <ref> also indicates the phase in LT for these two peaks. Note that in 2008 the amplitude variation due to daily variation is around 18% greater than the amplitude variation due to the C-G effect. Fig. <ref> shows the same type of analysis for the 2019 data (minimum start of cycle 25). Also, Table <ref> indicates the amplitude variation in percentage relative to the daily mean counting rate and the phase in LT due to the C-G effect and diurnal solar variations, respectively. In most cases, the daily solar variation amplitude is higher than the C-G effect amplitude. However, note that in 2019, there is an anomaly. The amplitude variation due to the C-G effect is around 57.5% greater than the amplitude variation due to diurnal solar variation. Finally, Fig. <ref> represents a combined analysis including data from the 2008 and 2019 values. Again the Table <ref> shows the values found for the amplitude variations due to the C-G effect and diurnal solar variation, respectively, as well as their phases. We would point out that the amplitude variation and phase for the C-G effect obtained in the combined data analysis (2008-2019) agree with expected values. § SEASONALITY OF THE C-G EFFECT Despite low statistics, we also examine the cosmic-ray diurnal variation from Mexico-City NM data over 2019, according to the seasons. Dates regarding season here used are Winter (01 January to 20 March); Spring (20 March to 21 June); Summer (21 June to 23 September); Autumn (23 September to 31 December). We see a significant variation, as shown in Fig. <ref>, showing the hourly (averaging 30 min) counting rate per second during the 12 (seasonably) months of 2019. From Fig. <ref>, we also can see that the count rate during winter is the one that most contributes to the C-G effect observation. We also can observe that the counting rate during autumn does not contribute to the C-G effect observation but contributes significantly to diurnal solar variation. Fluctuation on the interplanetary magnetic filed and the E-W asymmetry of the cosmic ray flow (see next section) are responsible for the phase fluctuations of the Compton-Getting effect and of the diurnal solar variation around values, in most cases, earlier than expected. The details of this mechanism are the subject of the next section. § C-G EFFECT AND THE WEST-EAST ASYMMETRY From the 1930s onwards, it's known that the flow of cosmic rays reaching Earth from the West is higher than from the East; and is known as the East-West (E-W) effect <cit.>. This effect is due to the de deflection of the cosmic ray-charged particles by the Earth's magnetic field. The count excess from the West direction means that primary cosmic rays are predominantly positively charged particles. The observation of muons data detected by underground telescopes, allows to obtain the E-W asymmetry of their parent particles, galactic cosmic rays with high magnetic rigidity (above 1000 GV) <cit.>. So, cosmic ray directional telescopes can obtain the phase from the E-W asymmetry, and from it obtain the phase of the C-G effect adding (clockwise) a right angle (=+6 hr) to E-W asymmetry phase: Phase(C-G) = Phase(E-W) + 6 hr. The E-W asymmetry is responsible for changing the phase of the C-G effect to times earlier than expected. Fig. <ref> details this mechanism. The E-W asymmetry can also explain the shift of the phase of the diurnal solar variation for early times than expected. In the case of 2019 (beginning of solar cycle 25) with the solar cycle's polarity conditions (qA>0), the expected phase for the diurnal solar variation is 15 hr LT, as shown by the right arrow at the top of Fig. <ref> where shift values of up to 3 hr relative to the expected value is observed, while the average value in the (averaging 10 m) data is 12.90± 1.97 LT (see Table <ref>). § DISCUSSIONS AND CONCLUSIONS We present a study on the daily variation of count rate at the Mexico City NM detector located at low geographic latitude (19.33^∘N) and a high geomagnetic rigidity cutoff (8.2 GV). We highlight the study of anisotropy due to the terrestrial orbital movement known as the C-G effect. To optimize the cosmic ray detection at ground level (2274 m asl), we used the 2008 and 2019 data, which coincides with the last two solar minima, when the flow of galactic cosmic rays reaching Earth is higher, and the Sun's magnetic field is weakened, with a dipolar pattern, and their influence on galactic cosmic rays is lowest. Two modulations in the cosmic ray flux still survive in the Mexico-NM detector, even after corrections for variations in barometric pressure and efficiency. The first is in the early hours of the day (expect 6:00 hr LT), consistent with a modulation due to the Earth's orbital motion, i.e., the C-G effect. predicted by <cit.> as a first-order relativistic effect. The second one is the known diurnal solar variation, in the early hours of the afternoon (expected between 15:00 and 18:00 LT), The cosmic ray diffusion theory <cit.>, including other factors, such as the scattering effect due to irregularities in the solar magnetic field <cit.> and latitude effects <cit.>, can describe the diurnal solar variation. Table <ref> summarizes the results, including the counting rate variation and the phase of both anisotropies, the C-G effect, and diurnal solar variation, respectively. Both the counting rate variation and phase for the C-G effect, obtained from combined data (2008-2019) from Mexico City NM, agree with those predicted. We have also looked for the seasonality of the C-G effect, with the seasons during 2019. We observe a significant variation. The same is true for the solar diurnal variation. However, due to the low statistics, the results on the seasonality of the two anisotropies are preliminary. Even so, the data obtained during the winter are the ones that contribute the most to the C-G effect. The data collected in autumn has no contribution to the C-G effect but significantly contributes to diurnal solar variation. Fig. <ref> summarizes the results. Finally, we show that in addition to fluctuations in the interplanetary magnetic field, the E-W effect on the cosmic ray flow reaching Earth is also responsible for dispersion, observed in the phases of both anisotropies. In most cases, the E-W effect is responsible for bringing the phases forward, sometimes several hours ahead of the expected ones. In this study, this effect is more pronounced in diurnal solar variation. We highlight a correlation between the phases of the E-W and C-G effects (see Eq. /refphases)<cit.>. In the present case, the C-G effect phase for the combined data (2008-2019) is 06.15 LT. Consequently, the E-W phase will be close to 0.15 LT. This result is a prediction for the E-W phase at the Mexico City location. § ACKNOWLEDGMENTS We acknowledge the NMDB database (www.nmdb.eu), founded under the European Union's FP7 programme (contract no. 213007) for providing data. Mexico City neutron monitor data were kindly provided by the Cosmic Ray Group, Geophysical Institute, National Autonomous University of Mexico (UNAM), Mexico. This work is supported by Fundacao de amparo a Pesquisa do Estado do Rio de Janeiro (FAPERJ) under Grant E-26/010.101128/2018. aasjournal
http://arxiv.org/abs/2303.07367v1
20230313180003
Lorentzian quantum gravity via Pachner moves: one-loop evaluation
[ "Johanna N. Borissova", "Bianca Dittrich" ]
hep-th
[ "hep-th", "gr-qc" ]
[1] #1 #1 = theoremTheorem[section] lemmaLemma[section] definitionDefinition[section] =9000 jborissova@perimeterinstitute.caPerimeter Institute, 31 Caroline Street North, Waterloo, ON, N2L 2Y5, CanadaDepartment of Physics and Astronomy, University of Waterloo, 200 University Avenue West, Waterloo, ON, N2L 3G1, Canadabdittrich@perimeterinstitute.caPerimeter Institute, 31 Caroline Street North, Waterloo, ON, N2L 2Y5, Canada Lorentzian quantum gravity is believed to cure the pathologies encountered in Euclidean quantum gravity, such as the conformal factor problem. We show that this is the case for the Lorentzian Regge path integral expanded around a flat background. We illustrate how a subset of local changes of the triangulation, so-called Pachner moves, allow to isolate the indefinite nature of the gravitational action at the discrete level. The latter can be accounted for by oppositely chosen deformed contours of integration. Moreover, we construct a discretization-invariant local path integral measure for 3D Lorentzian Regge calculus and point out obstructions in defining such a measure in 4D. We see the work presented here as a first step towards establishing the existence of the non-perturbative Lorentzian path integral for Regge calculus and related frameworks such as spin foams. An extensive appendix provides an overview of Lorentzian Regge calculus, using the recently introduced concept of the complexified Regge action, and derives useful geometric formulae and identities needed in the main text. Lorentzian quantum gravity via Pachner moves: one-loop evaluation Bianca Dittrich March 30, 2023 ================================================================= § INTRODUCTION Path integrals for quantum gravity aim to define quantum transition amplitudes by formally summing over all spacetime histories satisfying suitable boundary conditions and weighted by the exponential of times the action in units of Planck's constant ħ. Prominent path integral approaches for quantum gravity are spin foams <cit.>, quantum Regge gravity <cit.>, group field theories <cit.>, or (causal) dynamical triangulations <cit.>, and as such they depend on a variety of choices. These choices include the type of histories to sum over, for instance defining the set of spacetime geometries, specifying configuration variables to parametrize this set, and imposing additional regularity conditions on these. The other essential ingredients for gravitational path integrals are the choice of action dictating the dynamics and the measure over the space of geometries, i.e. equivalence classes of metrics modulo diffeomorphisms. Path integrals with oscillatory weights exp( S) are challenging as the integrations are typically over unbounded domains, leading to integrals which are not absolutely converging, and for which there are only few effective tools for their evaluation available <cit.>. This is one of the main motivations for turning to Euclidean quantum gravity approaches <cit.>. These are based on the argument that a formal Wick rotation changes Lorentzian metrics into Euclidean ones and changes the Lorentzian weight exp( S_L) into the Euclidean non-oscillatory weight exp(-S_E). This allows to apply e.g. Monte-Carlo simulations. But Euclidean quantum gravity approaches suffer from two crucial drawbacks: firstly the fact that the gravitational action is not bounded from below, and can be made arbitrarily negative by maximizing the kinetic term for the conformal factor <cit.>. To obtain a convergent Euclidean path integral it is argued that the conformal mode needs to be Wick rotated in the opposite direction from the other modes <cit.>. In praxis it is necessary to flip the sign in front of the conformal mode, but the latter is hard to identify in non-perturbative approaches. Secondly, the space of Lorentzian geometries is very different from the space of Euclidean geometries, a one-to-one mapping does not exist <cit.>. This motivates facing the Lorentzian path integral <cit.>. We here consider the Lorentzian path integral for Regge calculus <cit.>. Regge calculus provides a discretization for the Einstein-Hilbert action and thus a regularization for the gravitational path integral. The main questions we will analyze here are: (a) Can we expect a convergent Lorentzian path integral, so that the conformal factor problem is cured? Additionally, can we establish a relation between the deformation of the integration contour in the Lorentzian case and Euclidean quantum gravity? In other words, can we justify the procedure of Euclidean quantum gravity? (b) Another set of questions we will consider are related to fixing the measure in the path integral by demanding invariance under a change of (bulk) discretization of the path integral and thus a regularization-independent path integral. This has been successfully implemented for three-dimensional Euclidean gravity in <cit.>, and has allowed interesting applications, e.g. the computation of one-loop partition functions and confirmation of a holographic duality in three-dimensional quantum gravity (without a cosmological constant) <cit.>. On the other hand, it has been shown in <cit.>, that four-dimensional Regge gravity does not admit a local discretization-independent measure. More specifically, there does not even exist a local measure, which is invariant under a specific class of changes of triangulation, which leave the action invariant. These results reflect the topological nature of three-dimensional gravity on the one hand, and the fact that four-dimensional gravity has local propagating degrees of freedom on the other hand. For the latter we have to expect that discretizations break diffeomorphism symmetry <cit.>, which implies also a dependence of the path integral on the discretization and thus regulator <cit.>. We expect to find similar results in the Lorentzian case. Indeed, we will succeed in constructing an invariant measure for the three-dimensional Lorentzian path integral, and the Lorentzian case will add an interesting twist to the Euclidean discussion, related to how the conformal factor is treated in Euclidean quantum gravity. The Regge action constitutes a complicated non-polynomial function in the edge lengths, which are taken as fundamental variables in Regge calculus. Additionally one has to implement generalized triangle inequalities. One can therefore not hope for an exact analytical evaluation of the path integral. We will therefore consider a perturbative approach and evaluate the path integral to one-loop order, on a flat background. We will see, that this allows us to be, on the one hand, most general, and on the other hand still derive explicit (and quite simple) expressions for the path integral. To achieve these simple expressions, we will break down the general discrete path integral into a sequence of so-called Pachner moves. Similar to applying a coarse gaining framework, this allows to perform the path integral in terms of smaller steps. We will see that these steps always involve only a one-dimensional integration (and for a certain class of Pachner moves, a gauge fixing). The main technical task is then to derive an expression for the Hessian of the Regge action for the various Pachner move configurations. We will do so starting from some identities for a measure over flat-space geometries <cit.>, which previously have been applied to the construction of a triangulation-invariant partition function <cit.> for topological BFCG theory <cit.>. These techniques were adjusted and applied to the computation of the Pachner move Hessians in Euclidean Regge gravity in <cit.>. The paper <cit.> streamlined this derivation by introducing a Caley-Menger determinant associated to the Pachner move configurations. We will pick up this technique and apply a further simplification, which will allow us to derive a simple expression for the Lorentzian Regge Hessian for all Pachner moves in general dimensions (larger than two). Using this new simplification we will in particular be able to determine the various signs appearing in the Pachner moves, which will be important to determine the deformations of the integration contour in the Lorentzian path integral, and thus the relation between Lorentzian and Euclidean path integrals.   Our paper is structured as follows. In Section <ref> we review the definition of complex dihedral angles and deficit angles needed to define the Lorentzian Regge action and Lorentzian Regge path integral. Section <ref> discusses Pachner moves in general dimensions with primary focus on 3D and 4D, as well as on the properties of a Caley-Menger determinant associated to Pachner moves. In Section <ref> we expand the Lorentzian Regge action around a flat background and derive a simple form for the Hessians for all Pachner moves, which will show that these Hessians factorize. Section <ref> defines the path integral for Lorentzian Regge calculus in a flat background expansion to second order, for a given Pachner move, and collects identities on one-dimensional and multi-dimensional Gaussian integrals with imaginary exponent. In Sections <ref> and <ref> we analyze the path integral for the 3-2 and 4-1 moves in 3D, as well as for the 5-1 and 4-2 moves in 4D, and discuss the relation between Lorentzian and Euclidean path integral. As expected, we will manage to construct a discretization-invariant local measure in 3D, and illustrate that such a measure in 4D does not exist. We finish with a discussion and outlook in Section <ref>. Our paper is supplemented by an extended appendix providing an in-depth overview on the geometry of Lorentzian and Euclidean simplices. The reason for doing so is that such an cohesive overview, in particular with regard to Lorentzian simplices, seems to be missing from the literature, and a large number of geometrical identities will be needed to follow the discussion the main text. Our overview includes Caley-Menger determinants, generalized triangle inequalitites and length Gram matrices, as well as dual or angle Gram matrices. The appendix reviews the steps towards defining and computing complex dihedral angles. This includes a discussion on how to project out a hinge and the definition of angles in Euclidean and Minkowskian planes. This allows us to construct the complex Regge action which unifies the Euclidean and Lorentzian action into one compact form. Finally, we derive the Schläfli identity for Euclidean and Lorentzian triangulations and an extremely useful formula for the derivatives of dihedral angles, needed in the main text. § LORENTZIAN (QUANTUM) REGGE CALCULUS Regge calculus <cit.> provides a coordinate-free formulation of general relativity on a piecewise flat discretization of the spacetime manifold. The basic building blocks in a piecewise flat[Formulations with homogeneously curved building blocks also exist <cit.>.] discretization of a d-dimensional spacetime are d-simplices glued along shared (d-1)-subsimplices. The framework has been originally defined for Euclidean spacetimes, a formulation for Lorentzian spacetimes has been provided by Sorkin <cit.>. Recent work <cit.> extended Regge calculus to a complexified configuration space, which allows a unified framework for Euclidean and Lorentzian geometries. In particular, <cit.> finds a relationship between the violation of causality conditions and the branch cut structure of the action. In (length) Regge calculus the metric tensor which serves as the fundamental variable in the continuum metric formulation of gravity, is replaced by geometric degrees of freedom associated to the edges e of the simplicial building blocks.[There exist also other variants of Regge caculus, which are important for spin foam gravity <cit.>. On the one hand, there is area Regge calculus in four dimensions <cit.>, whose discrete equations of motion differ from length Regge calculs, but whose perturbative construction of the continuum limit agrees with the one of length Regge calculus <cit.>. On the other hand, there is area angle Regge calculus <cit.>, which, through adjusting constraints, can interpolate between a discretization of a topological field theory and the equation of motion for length Regge calculus. Area and length Regge calculus are also available in a first-order formulation <cit.>.] On a Lorentzian triangulation these can be taken as the set of signed squared edge lengths s_e ≡e⃗·e⃗, defined by the norms of the edge vectors with respect to the Minkowski metric η = diag(-1,+1,+1,+1). Thus s_e >0 for a space-like edge, s_e<0 for a time-like edge and s_e=0 for a null edge. We will call these quantities s_e signed length squares. The geometry of a flat d-simplex σ is completely characterized by the geometric data {s_e|e ⊂σ}. Curvature in a simplicial complex is concentrated at codimension two subsimplices h ⊂σ, so-called “hinges", and parametrized by deficit angles ϵ_h. The latter provide a measure for the angular gap between the d-simplices σ meeting at a given hinge h which would arise after flattening the d-simplices to d-dimensional Minkowski space. The deficit angles can be deduced from successive projections of adjacent d-simplices onto planes orthogonal to the hinges, whereby the resulting solid angles correspond to the d-dimensional dihedral angles θ_σ,h at h⊂σ. We provide in Appendix <ref> an overview how to define and compute the dihedral and deficit angles for Lorentzian (and also Euclidean) triangulations, using the formalism of complex angles in <cit.>. There are two versions θ^±_σ,h for the complex angles, in the following we will use θ^+_σ,h, but drop the superscript +. This complex dihedral angle can be defined in terms of the signed length squares as θ^+_σ,h = -log_- (d^2/𝕍_h∂𝕍_σ/∂ s_h̅ - √(__+ 𝕍_ρ_a/𝕍_h𝕍_ρ_b/𝕍_h -( d^2/𝕍_h∂𝕍_σ/∂ s_h̅ )^2 )/√(__+ 𝕍_ρ_a/𝕍_h)√(__+ 𝕍_ρ_b/𝕍_h) ) . Here we indicate with ρ_a and ρ_b the two (d-1)-subsimplices which share the hinge h and s_h̅ denotes the signed length square of the edge opposite to h in the d-simplex σ. The signed volume square 𝕍_X of a simplex X can be computed from its associated Caley-Menger determinant and gives the positive (negative) square of the volume if X is spacelike (timelike), see Appendix <ref>. For z ∈ℂ with (z) ∈ (-π,π) we adopt the principal branch for the logarithm log_-(z) and the square root √(__+ z). But, along the branch cut when z is a negative real number -r<0, we use log_-(-r)=log(r)-π and √(__+ -r)=√(r). Later, we will only deal with the derivatives of the dihedral angle. Here we have dlog_-(z)= dz/z and d√(__+ z)= dz/(2 √(__+ z)). Thus we are only left with √(__+ z ), and as the square root adopts the principal value for the branch cut, we will henceforth omit the subscript +. The (complex) deficit and boundary curvature angles are then given as ϵ^(bulk)_h =2π + ∑_σ⊃ hθ_σ,h , ϵ^(bdry)_h = π k + ∑_σ⊃ hθ_σ,h . The sum in (<ref>) runs over all d-simplices σ in the d-dimensional triangulation ^(d), which contain the hinge h. The parameter k for the boundary curvature angle depends on the number of pieces glued together at this boundary, e.g. k=1 if two pieces are glued together. As detailed in Appendix <ref>, the Lorentzian Regge action for a triangulation ^(d) of d-dimensional spacetime with vanishing cosmological constant can be written as <cit.> S_Regge = ∑_h⊂^(d)√(𝕍_h) ϵ_h , where we again use √(z)=√(__+ z ). Note that S_Regge is real, if (a) the generalized Lorentzian triangle inequalities are satisfied, see Appendix <ref> and if, (b), the triangulation has no light cone irregularities, see <cit.>. Small perturbations around a triangulation of flat space will be light cone regular.   The Lorentzian path integral for Regge gravity can then be defined as Z = ∫_s_e| e ⊂bdry∏_e⊂bulks_eμ(s_e)exp S_Regge . Here μ(s_e) denotes a suitable measure factor depending on the configuration variables which are taken to be the signed squared edge lengths s_e. As boundary conditions we assume fixed signed length squares for the edges in the boundary of the triangulation. In all expressions natural units and therefore ħ=1 is implied. The configurations included in the integral (<ref>) are required to satisfy the Lorentzian generalized triangle inequalities which guarantee the “realizability" of a given set of edge data as edge data of a triangulation, where each d-simplex can be embedded into d-dimensional Minkowskian spacetime, see Appendix <ref>. Note that the Lorentzian generalized triangle inequalities and the Euclidean generalized triangle inequalities specify disjoint data sets, if we demand also non-degenerate simplices. In this way (<ref>) gives times the Lorentzian Regge action for Lorentzian data. But it gives minus the Euclidean action for Euclidean data <cit.>, see also Appendix <ref>. One can thus easily adjust the results for the Hessian of the Regge action developed in the main text to Euclidean space times. Apart from the generalized triangle inequalities one also needs to specify how to deal with Lorentzian data that feature light cone irregular structures. E.g. one can have vertices, where more or less than two light cones meet. A certain class of light cone irregular structures lead to branch cuts for the Regge action. Thus, of one decides to integrate over these structures one has also to specify the side of the branch cut. Note that (<ref>) implements a certain choice of branch cut, which, however does not need to be adopted for the path integral. See <cit.> for explicit examples and a more in-depth discussion. The dihedral angles (<ref>) are complicated functions of the signed squared edge lengths. Additionally one has to satisfy the generalized triangle inequalities and possibly implement (rather involved) conditions for a regular light cone structure. Thus one can in general not compute the path integral (<ref>) analytically.[The two-dimensional case might be an exception, as the Regge action is a topological invariant. Therefore there is only the measure term. In the following we will consider a perturbative expansion of the Regge action and therefore restrict to dimensions d≥ 3.] Even a symmetry reduction of the degrees of freedom to a Regge model describing cosmology and featuring only one integration variable still requires numerical integration techniques <cit.>. In the following, we therefore consider Lorentzian Regge calculus linearized around a flat background solution, which is assumed to satisfy the generalized inequalities. Only perturbations around the classical background, viewed as quantum fluctuations, will be integrated over in the path integral. § PACHNER MOVES AND THEIR PROPERTIES Pachner moves <cit.> describe local changes of the bulk triangulation which keep the boundary triangulation and thus the extrinsic geometry fixed. Any two triangulations of a piecewise linear manifold can be related by a finite sequence of such Pachner moves <cit.>. An n_ i-n_ f Pachner move, with n_ i+n_ f=d+2, changes an initial complex of n_ id-simplices into a final complex of n_ fd-simplices. In d dimensions there are d+1 different types of moves denoted by (d+1)-(1), (d)-(2),⋯,(1)-(d+1). One way to visualize an n_ i-n_ f Pachner move in a d-dimensional triangulation is as follows, e.g. <cit.>: The initial sub-complex C_ i of n_ id-simplices involved in the Pachner move has to be identifiable with a corresponding sub-complex C' of n_ id-simplices in a (d+1)-simplex σ^d+1. The Pachner move can be visualized as a gluing of σ^d+1 onto the d-dimensional triangulation, such that C_ i is identified with the corresponding sub-complex of the (d+1)-simplex. In effect, one replaces C_ i, the sub-complex of n_ id-simplices, with C_ f= σ^(d+1)/ C', i.e. the sub-complex obtained by removing the n_ id-simplices in C' from σ^(d+1). Here, we will consider the initial and final Pachner move configuration itself as d-dimensional triangulations with boundary. We start with a complex C_ i of n_ id-simplices and replace it with the complex C_ f=σ^(d+1)/ C_ i, which contains n_ fd-simplices. Now, for 1≤ n ≤ (d+1), consider a sub-complex of nd-simplices in a (d+1)-simplex as a d-dimensional triangulation with boundary. This d-dimensional triangulation has a unique lowest dimensional bulk sub-simplex. Its dimension is given by (d+1-n). E.g. for n=(d+1) the lowest dimensional bulk sub-simplex is a vertex, and for n=d it is an edge. For n=1 the bulk is given by one d-simplex. Thus, we can also characterize a Pachner move by the lowest dimensional bulk simplex in either the initial or the final configuration. E.g. a (d+1)-(1) Pachner move has a bulk vertex in the initial configuration and the lowest dimensional bulk simplex in the final configuration is the final d-simplex itself. The bulk vertex in the initial configuration is connected to (d+1) bulk edges. A (d)-(2) Pachner move has a bulk edge but no bulk vertex in the initial configuration, and the lowest dimensional sub-simplex in the final configuration is a (d-1)-simplex. Pachner moves with n_ i<d do not have bulk edges in their initial configuration. Later, we will be interested in particular in those Pachner moves which involve in their initial configuration bulk edges, but not in their final configuration. We can integrate out the length variables associated to the bulk edges from the initial configuration and in this way interpret the Pachner moves as coarse graining moves <cit.>. We see, that for d≥ 3 such coarse graining Pachner moves (for length Regge calculus) only include the (d+1)-(1) and (d)-(2) moves. We will also need information about the boundary and bulk hinges, that is the boundary and bulk (d-2)- simplices, in the initial Pachner move configuration C_ i and in the final Pachner move configuration C_ f=σ^(d+1)/ C_ i. Firstly, not that C_ i and σ^(d+1)/ C_ i, seen as d-dimensional triangulation with boundary, have by construction, the same boundary complex. Thus, the set of boundary hinges in the initial configuration agrees with the set of boundary hinges in the final configuration. Also by construction, we have that the set of bulk hinges in the initial configuration C_i is disjoint from the set of bulk hinges in the final configuration C_ f=σ^(d+1)/ C_i.   In this work we will deal with initial and final Pachner move configurations, which can be embedded into flat (Minkowski) space. The reason is that we will consider a perturbative evaluation of the path integral, and use the flatly embeddable configurations as backgrounds around which we allow quantum fluctuations (which can include curvature fluctuations). Such flatly embeddable Pachner moves can be constructed as follows: Start with a set of (d+2) vertices 0,1,…,d+1 embedded into d-dimensional Minkowski space, such that they form a degenerate (d+1)-simplex. Assume that all the (d+1)d-simplices, which are sub-simplices of the degenerate (d+1)-simplex, are non-degenerate. For an n_ i-n_ f Pachner move one identifies n_ i of the (d+1)d-simplices as initial configuration and n_ f of the (d+1)d-simplices as final configuration.[To lighten notation we will however assume that all d-simplices in the initial and final configuration have positive orientation. (See <cit.> for how to allow positive and negative orientation.) Given a configuration of (d+2) vertices this requirement constrains which d-simplices one can choose as initial and which as final.] In the following we denote with σ_i the d-simplex obtained by removing the vertex i, and all adjacent simplices, from the complex. We will assume, without loss of generality, that the initial complex includes the d-simplices σ_n_ f, …, σ_d+1 and the final complex includes the d-simplices σ_0, …, σ_n_ f-1. Below we will give a short description of Pachner moves in three and four dimensions. §.§ 3D In three dimensions we can construct the flatly embedded Pachner moves from a set of vertices {0,1,2,3,4} embedded into flat space. The 3-simplices (or tetrahedra) in the initial complex C_ i and final complex C_ f are given by 3-2: C_ i⊃{σ_2̅,σ_3̅,σ_4̅} , C_ f⊃{σ_0̅,σ_1̅} , 4-1: C_ i⊃{σ_1̅,σ_2̅,σ_3̅,σ_4̅} , C_ f⊃{σ_0̅} . The 3-2 move is depicted in Fig. <ref>. The bulk edge (01) shared by the three tetrahedra in the initial triangulation and is removed, and a bulk triangle in the final triangulation is 'inserted', leading to two tetrahedra. The 4-1 move is depicted in Fig. <ref>. Here the bulk vertex 0 and all adjacent simplices are removed from the initial configuration, including the bulk edges (0k), for k≥ 1. This leads to the final tetrahedron σ_0̅. §.§ 4D In four dimensions we consider the 3-3, the 4-2 and the 5-1 Pachner move. The Pachner moves involve the vertex set {0,1,…,5} and feature the following set of 4-simplices in their initial and final complexes 3-3: C_ i⊃{σ_3̅,σ_4̅,σ_5̅} , C_ f⊃{σ_0̅,σ_1̅,σ_2̅} , 4-2: C_ i⊃{σ_2̅,σ_3̅,σ_4̅,σ_5̅} , C_ f⊃{σ_0̅,σ_1̅} , 5-1: C_ i⊃{σ_1̅,σ_2̅,σ_3̅,σ_4̅,σ_5̅} , C_ f⊃{σ_0̅} . The lowest-dimensional bulk simplex in the initial configuration of the 3-3 move, depicted in Fig. <ref> is the triangle (012), shared by all three initial 4-simplices. The lowest-dimensional bulk simplex in the final configuration is the triangle (345), which is shared by all three final 4-simplices. In the 4-2 move, depicted in Fig. <ref> the bulk edge (01), shared by the initial 4-simplices, is removed from the configuration and a (bulk) tetrahedron (2345), shared by the two final 4-simplices, is inserted. For the 5-1 move, depicted in Fig. <ref>, the bulk vertex 0 and all adjacent simplices are removed from the initial configuration. This leaves the final 4-simplex (12345). §.§ Degenerate Caley-Menger matrices In Sec. <ref> we discussed that flatly embeddable Pachner moves in d dimensions can be constructed by embedding (d+2) vertices into d-dimensional flat space. These (d+2) vertices therefore form a degenerate (d+1)-simplex, i.e. the signed (d+1)-volume square 𝕍^d+1 of the vertex configuration has to vanish. The latter is given by 𝕍^d+1 = - (-1)^d+1/ 2^(d+1) ((d+1)!)^2(C) where C is the so-called Caley-Menger matrix C = ( 0 1 1 1 ⋯ 1 1 0 s_01 s_02 ⋯ s_0(d+1) 1 s_01 0 s_12 ⋯ s_1(d+1) ⋮ ⋮ ⋮ ⋮ ⋱ ⋮ 1 s_0(d+1) s_1(d+1) s_2(d+1) ⋯ 0 ) . Here s_ij denotes the signed squared length of the vector connecting vertices i and j with i,j=0,1,…,d+1. Thus the requirement that the (d+2) vertices form a degenerate (d+1)-simplex is satisfied if the Caley-Menger determinant vanishes. This means that the matrix C has a null vector. As the d-simplices contained in the (d+2) vertex configuration are required to be non-degenerate, C has exactly one null vector whose form has been derived in <cit.>. In the next subsection we provide a summary of this derivation. Using this form of C will allow us to derive an explicit and simple form for the Regge action Hessians associated to the Pachner moves, and in particular show that these Hessians factorize. §.§.§ Null vector Denote by c_ab the (a,b)-th minor of C defined by the determinant of the submatrix of C obtained by removing the a-th row and b-th column, with a,b=1,…,d+3. Note that from (<ref>), c_(i+2)(i+2) for i∈{0,…,d+1} is proportional to the signed d-volume square of the simplex obtained by removing vertex i from the initial configuration, c_(i+2)(i+2) = -(-1)^d2^d(d!)^2 𝕍_i. Any such simplex describes a non-degenerate d-simplex embedded in d-dimensional Minkowski space and thus has negative signed volume square, 𝕍_i<0. Consequently the signs of the minors c_(i+2)(i+2) are fixed by the global Lorentzian signature to sign(c_(i+2)(i+2)) = (-1)^d. The minors of C satisfy the relation <cit.> c_aa c_bb - c_ab c_ba∝(C) = 0 . Moreover, due to the symmetry of the Cayley-Menger matrix, c_ab= c_ba. Note also that c_ab∈ℝ, as these are polynomials in the real entries of C. We can thus conclude that c_ab = (-1)^sign(a,b)√(c_aa)√(c_bb) . Here the signs sign(a,b)=0,1 depend a priori on the pair (i,j). For the determinant of C we use the Laplace formula and expand around an arbitrary row i, (C) = ∑_b=1^d+3(-1)^a+bc_ab C_ab = ∑_b=1^d+3(-1)^a+b(-1)^sign(a,b)√(c_aa)√(c_bb) C_ab = 0 . The coefficients multiplying C_ab in the sum (<ref>) can be understood as the components of a null vector. That a unique null vector exists follows from the previous discussions. We can thus conclude that sign(a,b) factorizes in its dependence on a and b. The single null vector of C can be derived by expanding the determinant of C with respect to different rows and takes the form <cit.>v⃗_C = ((-1)^s√(c_11), (-1)^s_0√(𝕍_0),…,(-1)^s_d+1√(𝕍_d+1)) , where we made use of (<ref>). In the following subsection we will discuss the signs s, s_0,…,s_d+1 as these will be central for determining the components of the Hessian of the Regge action expanded around a flat background. As we can multiply the null vector with an arbitrary factor we can only fix the relative signs, e.g. (s_0+s) and (s_0+s_i). §.§.§ Signs The relative signs (s_0+s) and (s_0+s_i) characterizing the null vector (<ref>) of the Caley-Menger matrix can be determined by acting with the matrix on v⃗_C. The condition from the first row and the conditions from the remaining rows give respectively <cit.>∑_i=0^d+1(-1)^s_i√(𝕍_i) = 0 , ∀ j≥ 0: (-1)^s √(c_11) + ∑_i=0^d+1(-1)^s_i 2^d/2d! s_ij√(𝕍_i) = 0 . The first condition fixes the relative signs (s_0+s_i), so that for fixed (positive) orientation these are fully specified by the given type of Pachner move.[Here we assume that all simplices have positive orientation. It is possible to extend the discussion to allow for positive and negative orientation <cit.>. The signs will then depend on these orientations.] For an n_ i-n_ f Pachner move, we have s_0 + s_i = 0 mod 2, i=1, …, n_ f-1, 1 mod 2, i=n_ f,…, d+1, where we remind the reader that 𝕍_0, …, 𝕍_n_ f-1 are the signed volume squares of the d-simplices after the move, and 𝕍_n_ f, …, 𝕍_d+1 are the signed volume squares of the d-simplices before the move. Note that the signs (s_0+s_i) do not depend on the spacetime signature as only the (positive) volumes of the d-simplices enter the first condition. By contrast, the sign (s_0+s) depends on the choice of Euclidean/Lorentzian signature, and, in general, on the geometric configuration under consideration. In fact, after fixing the signs (s_0+s_i), the second condition in (<ref>) can be used for any j to determine the remaining relative sign (s_0+s) via (-1)^s_0+s√(c_11) = - ∑_i=0^d+1(-1)^s_0+s_i 2^d/2d! s_ij√(𝕍_i) . As the signed squared edge lengths can be positive or negative in Lorentzian signature, s will generally depend on the spacelike/timelike nature of the edges, see Sec. <ref>. Note also, that the sum on the right hand side of (<ref>) actually does not depend on the choice of j. §.§.§ Variation of the determinant To compute the Hessian of the Regge action expanded around a flat background, we will need the variation of the determinant of the Caley-Menger matrix with respect to the signed squared edge lengths evaluated on the flat hypersurface {(C)=0}. Introducing the adjugate matrix Adj(C) defined as the transpose of the matrix of cofactors Cof(C)_ab≡ (-1)^a+bc_ab of C, Jacobi's formula allows us to express the derivative of the determinant of C as (C)s_ij=(Adj(C)Cs_ij) . Using the property Adj(C)C = CAdj(C) = (C)𝕀, it follows from (C)=0 that the components of the adjugate matrix are determined by the single null vector of C in the form Adj(C)_ab∝ v_C^a v_C^b. Using in this form for the adjugate matrix the expression (<ref>) for v⃗_C leads to (C)s_ij_(C) = 0 = N (-1)^s_i (-1)^s_j√(𝕍_i̅)√(𝕍_j̅) , where N is a global factor, which for now will be left unspecified. § LINEARIZED REGGE CALCULUS §.§ Flat background expansion In the following we assume a classical background solution {s^(0)_e} satisfying the generalized triangle inequalities and Regge equations of motion S_Regges_e_s^(0)_e = 0 . Moreover, we assume that the background solution is locally flat and therefore the associated bulk deficit angles vanish, ϵ^(bulk)_h_s^(0)_e = 0 . Now we expand the signed squared edge lengths as s_e = s^(0)_e + λ_e , where {λ_e} represent small perturbations around the classical background. Then the Regge action (<ref>) to second order in the fluctuations takes the form S_Regge = S_Regge_s^(0)_e + S_Regges_e_s^(0)_eλ_e + /2[2]S_Regges_es_e'_s^(0)_eλ_e λ_e' + … . Here the zeroth order term represents the Regge action evaluated on the flat background, whereas the first-order term vanishes for bulk edges due to the equation of motion (<ref>). The second-order term defines the Hessian of second derivatives of the Regge action with respect to the signed squared edge lengths, H_ee'≡[2]S_Regges_e's_e_s^(0)_e . We assume a background configuration around which the Regge action is real, S_Regge∈ℝ, and thereby exclude light cone irregularities <cit.>. Using moreover the exchange symmetry of partial derivatives it then follows that the Hessian matrix is real and symmetric. Inserting the definition of the Regge action (<ref>) leads to H_ee' = 1/[2]s_e's_e_s^(0)_e∑_h√(𝕍_h)ϵ_h = 1/s_e'_s^(0)_e∑_h(√(𝕍_h)s_eϵ_h + √(𝕍_h)ϵ_hs_e) = 1/∑_h( [2]√(𝕍_h)s_e's_eϵ_h + √(𝕍_h)s_eϵ_hs_e')_s^(0)_e . In the second line the last term was dropped using the Schläfli identity for Lorentzian triangulations, ∑_h √(𝕍_h)θ_h=0. See Appendix <ref> for a proof. When evaluating (<ref>) on a flat background, terms with ϵ_h, where h⊂bulk, vanish due to (<ref>). Moreover, terms with ϵ_h, where h⊂boundary, will not be affected during Pachner moves as these keep the extrinsic geometry fixed. §.§ Hessian for Pachner moves In the following we associate an action to a given n_ i-n_ f Pachner move[We assume that the Pachner move describes a change from an initial configuration with n_ id-simplices to a final configuration with n_ fd-simplices, where n_ i≥ n_ f.] defined by the difference of the actions for the initial and final complex, S_Regge^Pachner =S_Regge^( i)- S_Regge^( f) . The actions on the right hand side of (<ref>) for the initial and final configurations of the Pachner move are defined in (<ref>). The action associated to the Pachner move is of the same form as in (<ref>), S_Regge^Pachner = ∑_h√(𝕍_h)ϵ̃_h . To define ϵ̃_h we remind the reader, that the initial and final simplicial complexes have the same boundary, and hence the same set of boundary hinges h^ bdry, and that the set of initial bulk hinges h^ iblk and final bulk hinges h^ fblk is distinct, see Section <ref>. We therefore have ϵ̃_h^ iblk = 2π + ∑_σ^ i⊃ h^ iblkθ_σ^ i,h^ iblk, ϵ̃_h^ fblk = -2π - ∑_σ^ f⊃ h^ fblkθ_σ^ f,h^ fblk, ϵ̃_h^ bdry = (π k + ∑_σ^ i⊃ h^ bdryθ_σ^ i, h^ bdry^(i)) - (π k + ∑_σ^ f⊃ h^ bdryθ_σ^ f, h^ bdry) . With these definitions we obtain ϵ̃_h_s^(0)_e = 0 for all (bulk and boundary) hinges on a flat background. Repeating the steps (<ref>)-(<ref>) leads to the Hessian associated to the given Pachner move, H_ee'^Pachner = 1/∑_h√(𝕍_h)s_eϵ̃_hs_e'_s^(0)_e . Now recall that a Pachner move in d dimensions is characterized by a set of (d+2) vertices embedded into flat d-dimensional spacetime such that the involved d-simplices are non-degenerate. The condition of embedability in d-dimensional spacetime implies that the determinant of the Caley-Menger matrix vanishes, (C)=0, whereas the requirement that the d-simplices are non-degenerate implies that there exists exactly one null vector given by (<ref>). Moreover, demanding flatness for the bulk geometry while keeping the extrinsic geometry at the boundary fixed leads to ϵ̃_h=0 for all hinges in a flat background expansion. Thus, variations of the deficit angles and the Caley-Menger determinant are related and can be parametrized by associating an implicit function f_h for each hinge, ϵ̃_h = f_h (C) . As a consequence, on the {(C)=0} surface and in a flat background expansion, the variation of the deficit angle at a hinge can be expressed as δϵ̃_h_s^(0)_e = f_h δ((C))_s^(0)_e = f̃_h ∑_i<j (-1)^s_i (-1)^s_j√(𝕍_i̅)√(𝕍_j̅) δ s_ij =: f̃_h ∑_e g(e) δ s_e where we used (<ref>) and reabsorbed the N appearing there into f̃_h=N f_h. As the full dependence of the deficit angles on data from the hinge is now encoded in the function f̃_h, we can express the Hessian (<ref>) as H_ee'^Pachner = 1/ g(e') ∑_h√(𝕍_h)s_ef̃_h _s^(0)_e . The variation of the Caley-Menger determinant with respect to the signed squared edge length s_mn of an edge e'=(mn) was derived in Sec. <ref> and is given by the signed product of the volumes of the two d-simplices obtained by removing the vertices m and n, cf. (<ref>). Using the fact that the Hessian is symmetric under the exchange of edges e=(ij) and e'=(mn), we arrive at the first main result for the Hessian associated to a Pachner move in arbitrary spacetime dimensions, H_(ij)(mn)^Pachner = N^Pachner (-1)^s_i+s_j+s_m+s_n√(𝕍_i̅)√(𝕍_j̅)√(𝕍_m̅)√(𝕍_n̅) . Here the signs s_k have to satisfy (<ref>). Thus it remains to determine the factor N^Pachner. Finally, note that the Hessian matrix for an arbitrary Pachner move has a factorizing structure of the form H_(ij)(mn)^Pachner∝ h_(ij)h_(mn) . §.§ Global factor The global factor in the Hessian (<ref>) can be derived by computing H_ee'^Pachner explicitly via equation (<ref>) for a selected pair of edges. To that end, we first note that the derivative of the dihedral angle at a hinge h with respect to an edge e=h̅ opposite of this hinge, has remarkably simple form θ_σ,hs_h̅ = - 1/21/d(d-1)√(𝕍_h)/√(𝕍_σ) , see Appendix <ref>. To continue, we first discuss the global factor for Pachner moves in three dimensions and then for Pachner moves in four and higher dimensions. To that end, we remind the reader that we consider n_ i-n_ f Pachner moves with n_ i≥ n_ f and n_ i+n_ f=d+2. Thus, we have in three dimensions the 3-2 and the 4-1 Pachner moves and in four dimensions the 4-2, 5-1 and 3-3 move. §.§.§ 3D We detailed the 3D Pachner moves in Sec. <ref>. With the notation from this section we will consider the derivative of ϵ̃_h with hinge edge h=(01) with respect to the edge e=(34) ϵ̃_(01)s_34 = - (-1)^s_0+s_2θ_2̅,(01) s_34 = (-1)^s_0+s_21/12√(𝕍_(01))/√(𝕍_2̅) , where, for the first equation, we used the solution (<ref>) for the relative signs, to express the factor (-1) as (-1)^s_0+s_2 and equation (<ref>), which defines ϵ̃. For the second equation we utilized (<ref>). Therefore H_(01)(34)^Pachner = 1/√(𝕍_(01))s_01ϵ̃_(01)s_34_s^(0)_e = 1/24 (-1)^s_0+s_21/√(𝕍_2̅) = - 1/24 (-1)^s_0+s_21/√(𝕍_2̅) . In the second line, we used that with our conventions √(-1)= and that 𝕍_2̅ is always negative. On the other hand, we have according to (<ref>) H_(01)(34)^Pachner = N^Pachner (-1)^s_0+s_1+s_3+s_4√(𝕍_0)√(𝕍_1)√(𝕍_3)√(𝕍_4) . With the solution (<ref>) for the relative signs, we have that for our three-dimensional Pachner moves N^Pachner = 1/24 (-1)^s_Pachner1/∏_l√(𝕍_l̅) with (-1)^s_Pachner = +1 for the 3-2 move -1 for the 4-1 move . We therefore obtain for the general Hessian matrix element H_(ij)(mn)^Pachner = 1/24 (-1)^s_Pachner (-1)^s_i+s_j+s_m+s_n√(𝕍_i̅)√(𝕍_j̅)√(𝕍_m̅)√(𝕍_n̅)/∏_l√(𝕍_l̅) . §.§.§ 4D We described the 4D Pachner moves in Sec. <ref>. To determine the global pre-factor for the Hessian we will apply a slightly different strategy from the three-dimensional case. To make use (only) of the simpler case (<ref>) for the derivative of the dihedral angle at an hinge h with respect to the signed length squared of an opposite edge, we will first determine the factors f̃_h in (<ref>). To this end, we consider the derivative of ϵ̃_h with hinge triangle h=(ijk) with respect to the signed length squared of edge e=(mn), were (ijkmnp) is an arbitrary permutation of (012345). Note that only the d-simplex σ_p̅ includes the vertices i,j,k and m,n. Thus ϵ̃_(ijk)s_mn = - (-1)^s_0+s_pθ_p̅,(ijk) s_mn = (-1)^s_0+s_p1/24√(𝕍_(ijk))/√(𝕍_p̅) = (-1)^s_0+s_p1/24√(𝕍_(ijk))/√(| 𝕍_p̅|) . Here we again referred to (<ref>) and the solution (<ref>) for the relative signs, which states that (-1)^s_0+s_p=+1 if σ_p̅ is in the final configuration and (-1)^s_0+s_p=-1 if σ_p̅ is in the initial configuration. In the last equation we used the fact, that σ_p̅ is a Lorentzian d-simplex and has negative signed volume square. We compare this case with equation (<ref>), which yields ϵ̃_(ijk)s_mn_s^(0)_e = f̃_(ijk) (-1)^s_m+s_n√(𝕍_m̅)√(𝕍_n̅) . Thus f̃_(ijk) = (-1)^s_0/24𝕍_(ijk) (-1)^s_i+s_j+s_k√(𝕍_i̅)√(𝕍_j̅)√(𝕍_k̅)/∏_l (-1)^s_l√(𝕍_l̅) . Now, according to (<ref>) we have H_ee'^Pachner = 1/ g(e') ∑_h√(𝕍_h)s_ef̃_h _s^(0)_e with g((mn))= (-1)^s_m+s_n√(𝕍_m̅)√(𝕍_n̅) . Hence we have for a general choice of i≠ j and m≠ n H_(ij)(mn)^Pachner = (-1)^s_Pachner/48 (-1)^s_i+s_j+s_m+s_n√(𝕍_i̅)√(𝕍_j̅)√(𝕍_m̅)√(𝕍_n̅)/∏_l√(𝕍_l̅)∑_k ≠ i,j𝕍_(ijk) s_ij (-1)^s_k+s_0√(𝕍_k̅) , with (-1)^s_Pachner=(-1)∏_l (-1)^s_l. Our choice for distributing the sign factors illustrates more obviously that the over-all result does not depend on the choice for s_0: all exponents x in (-1)^x involve an even number of s_i. We can determine (-1)^s_Pachner for the various Pachner moves listed in (<ref>) using the solutions for the relative signs in (<ref>): (-1)^s_Pachner = +1 for the 3-3 move -1 for the 4-2 move +1 for the 5-1 move . Comparing the Hessian in (<ref>) with the one in (<ref>) we see that the factor D_ij= ∑_k ≠ i,j𝕍_(ijk) s_ij (-1)^s_k+s_0√(𝕍_k̅) =: D cannot depend on (ij). This can be shown explicitly <cit.>: Using (<ref>) for the signed area square of a triangle, 𝕍_(ijk)=𝔸_(ijk), we compute D = ∑_k ≠ i,j𝕍_(ijk)s_ij (-1)^s_k+s_0√(𝕍_k̅) = (-1)^s_0/8∑_k ≠ i,j (-1)^s_k(s_ik+s_jk-s_ij) √(𝕍_k̅) = (-1)^s_0/8∑_k (-1)^s_k(s_ik+s_jk) √(𝕍_k̅) - (-1)^s_0/8((-1)^s_js_ij√(𝕍_j̅) + (-1)^s_is_ij√(𝕍_i̅)) - (-1)^s_0/8∑_k≠ i,j(-1)^s_ks_ij√(𝕍_k̅) = (-1)^s_0/8∑_k (-1)^s_k(s_ik+s_jk) √(𝕍_k̅) - (-1)^s_0/8s_ij∑_k (-1)^s_k√(𝕍_k̅) . Using the first condition in (<ref>), the last term vanishes. For the first expression we can use the second condition in (<ref>) to relate the sum to the minor √(c_11). This leads to D = 1/4∑_k (-1)^s_0+s_k s_ik√(𝕍_k̅) = -(-1)^s+s_0/4× 2^d/2d!√(c_11) , where the first equation holds for an arbitrary choice of i=0,…,d+1. The sign of D (and therefore (-1)^s+s_0) depends on the Pachner move under consideration and on the specifics of the configuration. Consider, for example, the 5-1 Pachner move and two special cases, namely that the edges involved in this move are (a) all space-like and (b) all time-like.[To construct such examples, take any configuration of six vertices embedded into four-dimensional Minkowski space, and assume that none of the vectors connecting the vertices has vanishing time coordinate or vanishing spatial coordinates. To produce a configuration where all edges are space-like, multiply the spatial coordinates of these vertices with a sufficiently large constant. For a configuration where all edges are time-like, multiply the time coordinates of these vertices with a sufficiently large constant.] Using the solutions (<ref>) for the relative sign, and (<ref>) for i=0, we see that D is negative in case (a), and positive in case (b): D^(5-1) = -1/4∑_k= 1^5 s_0k√(𝕍_k̅) . For the 4-2 Pachner move, we can write D as (see second line in (<ref>)) D^(4-2) = -1/8∑_k= 2^5 (s_0k+s_1k-s_01) √(𝕍_k̅) . Thus the sign of D^(4-2) depends on the geometric configuration. We can again consider special cases, e.g. (a) all edges (0k) and (1k) with k≥ 2 are space-like, whereas (01) is time-like.[To construct such a configuration, start with a space-like tetrahedron (2345), which is in the plane orthogonal to the time axis and has its barycentre at the origin of the coordinate system. Choose the edge (01) to lie along the time axis with its barycentre also at the origin of the coordinate system. Now scale the tetrahedron (2345) with a sufficiently large factor, so that all edges (0k) and (1k), with k≥ 2 are space-like.] In this case D^(4-2) is negative. This extends to the case (a'), in which all triangles (01k) with k≥ 2 are time-like and have only time-like edges. In this case the triangle inequalities demand that one edge has greater time-like length (or proper time) then the sum of the other two edges. Assume that this `longest' edge is (01) for all triangles (01k). This ensures that (s_0k+s_1k-s_01) is positive, and D^(4-2) negative. On the other hand, consider the case (b), in which all edges (0k) and (1k) with k≥ 2 are time-like, whereas (01) is space-like.[ Choose the vertices 0 and 1 to lie in the t=0 plane and vertices k with k≥ 2, such that the absolute value of their time coordinates is sufficiently large.] This yields a positive D^(4-2). This extends to the case (b'), in which all triangles (01k) with k≥ 2 are time-like but have only space-like edges, and where (01) is the longest edge for all such triangles. §.§.§ Higher dimensions The calculation for the four-dimensional case can be straightforwardly generalized to higher dimensions: in d≥ 4 dimensions we start by considering the derivative of ϵ̃_h with h=(ijk_1⋯ k_d-3) with respect to the signed length squared of edge e=(mn), where (ijk_1 ⋯ k_d-3 mnp) is an arbitrary permutation of (012⋯ (d+1)). The general matrix element of the Hessian is thereby found as H_(ij)(mn)^Pachner = (-1)^s_Pachner/4 d(d-1) (-1)^s_i+s_j+s_m+s_n√(𝕍_i̅)√(𝕍_j̅)√(𝕍_m̅)√(𝕍_n̅)/∏_l√(𝕍_l̅)× ∑_k_1<⋯ <k_d-3: k_α≠ i,j𝕍_(ijk_1 ⋯ k_d-3) s_ij (-1)^s_0+s_k_1+⋯ + s_k_d-3√(𝕍_k_1)⋯√(𝕍_k_d-3) , with (-1)^s_Pachner=(-1)∏_l (-1)^s_l. From the symmetry of the Hessian we can again conclude that the factor in the second line does not depend on (ij). We have furthermore for even space-time dimensions d (-1)^s_Pachner = +1 if n_ i,n_ f are odd -1 if n_ i,n_ f are even , and for odd space-time dimensions d (-1)^s_0(-1)^s_Pachner = -1 if n_ i is even +1 if n_ i is odd . § PATH INTEGRAL In the following we investigate the path integral (<ref>) for a d-dimensional triangulation with fixed boundary edge lengths. Specifically, we will examine the path integral for Pachner moves, which can be interpreted as coarse graining moves. As we discussed in Sec. <ref>, this includes only the (d+1)-(1) and (d)-(2) moves. The path integral for Regge calculus can in general not be computed analytically since the dihedral angles in the Regge action are complicated functions of the squared length variables and moreover the configuration to be summed over have to satisfy the generalized triangle inequalities. To circumvent these difficulties we expanded the Regge action around a flat classical background solution {s_e^(0)} and only quantize (i.e. integrate over) the perturbations {λ_e} around the classical background. Now, the zeroth and first order terms in the expansion of the Regge action (<ref>) on a flat background are the same before and after the Pachner move and only involve boundary variables. We remind the reader that we defined S_Regge^Pachner =S_Regge^( i)- S_Regge^( f). For the perturbative evaluation of the path integral we use the second-order expansion of the action ^(2)S_Regge, which leads to Z^Pachner =exp( ^(2)S_Regge^( f) ) ∫∏_ẽ⊂bulkλ_ẽμ^Pachnerexp(∑_e,e'1/2H_ee'^Pachnerλ_e λ_e') . Here μ^Pachner(s_e^(0)) denotes a measure factor assumed to depend only on the background variables. To compute integrals of the type (<ref>) we first collect some general results on Gaussian integrals with imaginary argument in the exponential function. §.§ Gaussian integrals with imaginary exponent and factorizing Hessians Consider the one-dimensional Gaussian integral ∫_ℝ dλ e^/2 h λ^2 over the real axis, where h∈ℝ∖{0} is a constant. (<ref>) is not well-defined as a Lebesgue integral. Nevertheless, the integral can be computed by deforming the integration contour in the complex plane and taking the path of steepest descent at the origin, as shown in Fig. <ref>, see e.g. <cit.>. Positive h>0 produce a factor of e^π/4, whereas negative h<0 produce a factor of e^-π/4. Altogether, applying the steepest descent method to compute (<ref>) for h≠ 0 leads to ∫_ℝ dλ e^/2 h λ^2 = e^-π/4√(-2π/h) , h < 0 e^π/4√(2π/h) , h > 0 = e^π/4sign(h)√(2 π/h) = √(2π/h) . The last equality holds if the complex square root function is defined by its principal value on the first Riemann sheet. The result can be generalized to multidimensional Gaussian integrals with purely imaginary argument of the exponent, ∫_ℝ^nλ⃗ e^/2λ⃗^T Hλ⃗ = √(2π/h_1)⋯√(2π/h_n) . where H is assumed to be a regular real symmetric n× n matrix and h_i,i=1,…, n are its eigenvalues. If only r<n of the variables λ⃗=(λ_1,…,λ_r,λ_r+1,…,λ_n)≡ (λ⃗_(r), λ⃗_(n-r)) are integrated over, we can split the matrix H into submatrices H = ( H_r× r ℍ ℍ^T H_(n-r)× (n-r)) and compute ∫_ℝ^rλ⃗_(r) e^/2λ⃗^T H λ⃗ = √(2π/h_1)⋯√(2π/h_r) e^/2λ⃗_(n-r)^TH̃λ⃗_(n-r) , H̃ ≡ H_(n-r)× (n-r) - ℍ^T H_r× r^-1ℍ , where h_i, i=1,…,r are the eigenvalues of H_r× r. Note that here it is sufficient to demand only that H_r× r is regular. Integrals of this type will be needed to compute partition functions for the (d+1)-(1) and the (d)-(2) Pachner moves. Let us start with the (d)-(2) Pachner moves. Here we have only one bulk edge, thus we have in (<ref>) r=1. Furthermore, we know from (<ref>) that the Hessians for the Pachner moves are factorizing H^ Pachner _ee'∝ h_e h_e'. A straightforward computation shows that this implies for H̃^ Pachner _ee' in (<ref>) H̃^ Pachner _ee'=0 . Thus, integrating out the bulk edge in the (d)-(2) Pachner moves changes the action only from the Regge action for the initial configuration S^( i)_ Pachner to the Regge action for the final configuration S^( f)_ Pachner, see (<ref>), without any additional terms. Therefore integrating out the bulk edges in the (d)-(2) Pachner move configuration leaves the Regge action form-invariant. For the (d+1)-(1) moves we have (d+1) bulk edges. But the factorizing form of the Pachner move Hessian implies that it has only one non-vanishing eigenvalue, and thus (d+2)(d+1)/2-1 null vectors. In particular, there are d null vectors, which restrict to the (d+1) bulk edges, and describe therefore gauge degrees of freedom. These correspond to a discrete remnant of diffeomorphism symmetry <cit.>, which exist on flat Regge backgrounds <cit.>. Indeed, on a flat background, where all the (bulk) deficit angles are vanishing, we can displace the bulk vertex 0 in the embedding flat space, and in this way induce a change in the length squares of the bulk edges, without changing the bulk deficit angles and without changing the extrinsic curvature angles of the initial configuration, and thus without changing the value of the Regge action. We will deal with these gauge symmetries by only integrating out one of the bulk edges, say (01) (we therefore assume H_(01)(01)≠ 0), and by absorbing the remaining integrals into a measure over the gauge orbit. We thus apply again (<ref>) with r=1. The factorizing form of the Hessian implies again, that H̃^ Pachner _ee'=0. This also shows, that the resulting action term does not depend on any of the variables we did not integrate over. In summary, both types of coarse graining Pachner moves, the (d+1)-(1) move and the (d)-(2) move, leave the Regge action form-invariant. The intuitive reason for this form invariance is that, given a set of boundary length squares satisfying the generalized triangle inequalities, a d-simplex and a neighboring pair of d-simplices can always be embedded into d-dimensional flat space. The initial configurations for the (d+1)-(1) moves and (d)-(2) moves result from inserting (d+1) edges and one edge into the (flatly embeddable) d-simplex and the glued pair of d-simplices, respectively. There exist therefore flat solutions for the length squares of the bulk edges.[For special configurations there might exist also configuration with curvature, but these have to be considered as discretization artifacts, and are therefore expected to be situated outside a neighbourhood around the flat solutions. Here we are considering perturbations around flat solutions, such curved solutions are therefore not relevant. ] In the process of removing these bulk edges we insert these flat solutions into the initial Regge action. This yields the Regge action for the final Pachner move configuration. To furthermore study the form invariance of the measure, we will consider the various Pachner moves in more detail. Here we will restrict to three and four dimensions. Already in four dimensions we will see, that we cannot find a form-invariant measure. Additionally, there is the 3-3 move, which does not leave the action form-invariant. In higher dimensions there are more and more Pachner moves, for which this applies. § 3D PACHNER MOVES In three dimensions we have the 3-2 and 4-1 Pachner moves, which are of coarse graining type, and their respective inverses, the 2-3 and 1-4 moves. We discussed above that the (linearized) action is form-invariant for the coarse graining moves. That is solving for the bulk lengths and inserting these solutions into the action, we find the Regge action for the final configurations of the move. Since in three dimensions the Regge equation of motion impose flatness, form invariance of the action applies also to the full action. The statement of form invariance can be extended to the inverses of these coarse graining moves: here we just add to the action of the initial configuration the terms that arise from having new bulk hinges. Two triangulations with the same boundary can be connected via a finite sequence of Pachner moves. This form invariance of the action implies that the Hamilton-Jacobi function, defined as the action evaluated on the solution, will not depend on the choice of bulk triangulation, and also not on the choice of the (flat) background values for the bulk lengths. The Hamilton-Jacobi function only depends on the choice of boundary and boundary data. In the following we will study whether this statement extends to the path integral. §.§ 3-2 For the path integral associated to the 3-2 Pachner move we have Z^(3-2) = exp( ^(2)S_Regge^( f) ) ∫λ_01μ^(3-2)exp(∑_e,e'1/2H_ee'^(3-2)λ_e λ_e') , where we only integrate over the perturbation variable λ_(01) associated to the one bulk edge (01). As we discussed in the previous section, due to the factorizing form of the Pachner move Hessian, we have H̃_ee'^(3-2)=0 for the exponential factor resulting from the Gaussian integral. The Gaussian integral leads furthermore to the factor √(2π/H^(3-2)_(01)(01)) =e^π/4√(48π)𝕍_2𝕍_3𝕍_4/𝕍_0𝕍_1^1/4 =e^π/4√(48π)√(V_2 V_3V_4/V_0V_1) , where V_i denotes the positive volume of tetrahedron τ_i̅. Note that H^(3-2)_(01)(01)>0 (see <ref>), and we therefore need to choose the integration contour 𝒞_+ in Fig. <ref> for the Gaussian integral. Form invariance of the partition function can thus be achieved by choosing the measure factor as μ^(3-2) =1/∏_e⊂bdry√(√(48π))1/∏_e⊂bulk√(48π)∏_τ e^-π/4/∏_τ√(V_τ) . Here we wrote the measure factor in a form which allows generalization to arbitrary triangulations with boundary, and is consistent under gluing. We also made a choice in associating the e^-π/4 factors to the tetrahedra. We will later discuss that such a phase factor also appears for the Lorentzian Ponzano-Regge model. An alternative choice, which gives also form invariance for the 3-2 move, is to associated the phase factors to the edges of the triangulation. §.§ 4-1 The path integral for the 4-1 move takes the form Z^(4-1) = exp( ^(2)S_Regge^( f) ) ∫∏_i∈{1,2,3,4}λ_0iμ^(4-1)exp(∑_e,e'1/2H_ee'^(4-1)λ_e λ_e') . As described in Sec. <ref>, we have three gauge degrees of freedom, and we therefore only integrate explicitly over one variable, which without loss of generality, we choose as λ_01. We have again, that due to the factorizing form of the Pachner move Hessian, H̃_ee'^(4-1)=0. The Gaussian integral over λ_01 leads to a factor √(2π/H^(4-1)_(01)(01)) =e^-π/4√(48π)𝕍_2𝕍_3𝕍_4/𝕍_0𝕍_1^1/4 =e^-π/4√(48π)√(V_2 V_3V_4/V_0V_1) . Note that here H^(4-1)_(01)(01)<0 (see <ref>), that is we have the opposite sign as compared to the (3-2)-move. We therefore need to choose the integration contour 𝒞_- in Fig. <ref> for the Gaussian integral. Now, let us choose the measure μ^(4-1) to be of the same form[Again, one can also decide to associate the e^-π/4 to the edges.] as the measure for the 3-2 move (<ref>), i.e., μ^(4-1) =1/∏_e⊂bdry√(√(48π))1/∏_e⊂bulk√(48π)∏_τ e^-π/4/∏_τ√(V_τ) . Performing the integral over λ_01 we are left with an integral Z^(4-1) = exp( ^(2)S_Regge^( f) ) 1/∏_e⊂bdry√(√(48π))e^-π/4/√(V_0̅)∫∏_i=2,3,4λ_0i1/√(48π)(-1)/48π V_1̅ . We aim to identify the last factor as an integral over the gauge orbit. This gauge freedom results from the symmetry of the action under displacements of the vertex 0 in the initial Pachner move configuration. It can be understood as a discrete remnant of the diffeomorphism symmetry in the continuum <cit.>. Given a simplex σ with vertices (0,1,…,d), embedded into d-dimensional Euclidean or Minkowskian spacetime, we have shown in Appendix <ref>, that we have the following identity between integration measures ∑_orientation of σ∏_a=1^d s_0a/2^d d! V_σ = ∏_α=1^d v_0^α , where v_0^α are the coordinates of the vertex 0. We can therefore interpret the integration over λ_0i,i=1,2,3 as an integration over a gauge orbit. For our three-dimensional case, we obtain invariance of the path integral by setting ∫∏_i=2,3,4λ_0i1/√(48π)(-1)/48π V_1̅ → 1 . One can also include in the measure a factor of (-1) for each vertex. We can then remove the (-1) from the gauge contribution (<ref>). We mentioned that for the 3-2 move, one can also associate the e^-π/4 factor to the edges. This is also possible for the 4-1 move, but one has then to set a complex factor equal to 1: e^-π/4∫∏_i=2,3,4λ_0i1/√(48π)(-1)/48π V_1̅ → 1 . Alternatively, these phase factors can be again associated to the vertices of the triangulation. §.§ Summary for 3D Pachner moves We see that we can provide a measure for the three-dimensional path integral, which leads to form invariance at the one-loop level. Thus the (perturbative) path integral will, to one-loop order, not depend on the choice of bulk triangulation, but only on the boundary triangulation and data. This triangulation invariance is a reflection of diffeomorphism symmetry <cit.>. The Ponzano-Regge model <cit.> constitutes a non-perturbative model of three-dimensional quantum gravity and is available in Euclidean signature (but implements exp( S_E) amplitudes and not the exp(-S_E) amplitudes of Euclidean quantum gravity) and Lorentzian signature <cit.>. The Ponzano-Regge model leads (with appropriate gauge fixing) also to triangulation-invariant amplitudes. This is the reason why the results we found here mirror closely the semi-classical limit of the amplitude associated to one tetrahedron, which is given by <cit.>1/√(V_τ)cos( ∑_e∈τ |l_e| ψ̃_e ±π4) . Here ψ̃_e is the Euclidean or Lorentzian exterior dihedral angle at e⊂τ, and the ± sign is equal to +1 for the Euclidean case and equal to -1 for the Lorentzian case. The cosine results from a sum over orientations of the tetrahedra, and the fact that the action associated to oppositely oriented tetrahedra differs by a global sign. The π4 contribution can again be understood[To determine the semi-classical limit one does apply a saddle point approximation <cit.>.] to arise from a Gaussian integration with imaginary exponent, and the fact that the two saddle points come with Hessians of opposite sign. In short, the π4 contribution to the phase in the semi-classical limit of the Ponzano-Regge amplitude arises because of the sum over orientations. It speaks to the power of our method that we also find this π4 contribution, but via a very different mechanism. Here we do not sum over orientations. Rather, we associated the π4 phase to the tetrahedra because the signs for the Hessian matrix element in the 3-2 and 4-1 move are (a) independent from the specific configuration and (b) opposite to each other. Such a phase factor does not arise for Euclidean Regge calculus <cit.> with exp(-S_E) amplitudes, because these signs are enforced to be the same for the 3-2 and 4-1 move: One identifies the non-gauge degree of freedom in the 4-1 move as conformal mode, as the Hessian element has negative sign, and the path integral is a priori divergent. Therefore this sign is changed by hand, as suggested for the conformal mode in Euclidean (perturbative) quantum gravity <cit.>. Working with exp( S_L) amplitudes we `solve' the conformal factor problem, as we (a) work with an oscillatory amplitude and (b) the integration contour is deformed according to the sign of the Hessian matrix element. The conformal factor problem is a main obstacle for non-perturbative lattice approaches to Euclidean quantum gravity, which often rely on Monte-Carlo simulations <cit.>. These simulations tend to drive the systems to configurations which minimize the action, but due to the conformal mode problem the action is unbounded from below. For Regge calculus such configurations are so-called spikes <cit.>. E.g. in the 4-1 move we obtain a spike configuration by choosing all bulk edge lengths to be very large. From this we can take away a lesson for (non-perturbative) Lorentzian Regge calculus: in evaluating the path integral we have to make sure to pick a deformation of the integration contour, which leads to a convergent result, e.g. by using Picard-Lefschetz techniques <cit.> or more implicit methods <cit.>. § 4D PACHNER MOVES The set of coarse graining Pachner moves in four dimensions includes the 4-2 and 5-1 move. As discussed in Section <ref> the linearized action is form invariant under these moves. In the same way as discussed for the 3D Pachner moves, this can be extended to the 2-4 and 1-5 moves. The full action is also form invariant, under the condition that one takes only the flat solution (which always exist) into account, and not curved solutions, which might arise as discretization artifacts. In a 3-3 move no edges are integrated out. This move only features one bulk hinge whose (linearized) deficit angle is completely determined by the boundary data, and is in general not vanishing. The Hessian H^Pachner_ee' in (<ref>) gives therefore directly the difference of the linearized Regge action before and after the move. The action is therefore in general[The initial action is equal the final action if the linearized deficit angle induced by the boundary data vanishes. This implies that the factor D in (<ref>) vanishes.] not form-invariant under 3-3 moves. This implies that the Hamilton-Jacobi function will in general depend on the choice of bulk triangulation. This is one feature of discretizations with broken diffeomorphism symmetry <cit.>. One can still ask, whether one can find a measure such that the path integral is form-invariant (to one-loop order) under 5-1 or 4-2 moves. In this context <cit.> found already for Euclidean Regge calculus, that such a local[There are non-local constructions for such measures, see <cit.>.] measure does not exist. Thus we do not expect to find such a measure in the Lorentzian case. Nevertheless, we will examine the path integral in order to understand the similarities and differences to the Euclidean case. §.§ 4-2 For the path integral associated to the 4-2 Pachner move we have Z^(4-2) = exp( ^(2)S_Regge^( f) ) ∫λ_01μ^(4-2)exp(∑_e,e'1/2H_ee'^(4-2)λ_e λ_e') , where we only integrate over the perturbation variable λ_(01) associated to the one bulk edge (01). Due to the factorizing form of the Pachner move Hessian, we have H̃_ee'^(4-2)=0 for the exponential factor resulting from the Gaussian integral. The Gaussian integral results in the factor √(2π/H^(4-2)_(01)(01)) = √(96π)e^-sign(D)π/41/√(|D|)𝕍_2𝕍_3𝕍_4𝕍_5/𝕍_0𝕍_1^1/4 = √(96π)e^-sign(D)π/41/√(|D|)√(V_2 V_3V_4V_5/V_0V_1) . Choosing the measure μ^(4-2) =1/∏_e⊂bdry√(√(96π))1/∏_e⊂bulk√(96π)1 /∏_σ√(V_σ) , we do not obtain full invariance, but rather remain with Z^(4-2) = exp( ^(2)S_Regge^( f) ) /∏_e⊂bdry√(√(96π))√(V_0̅)√(V_1̅) × e^-sign(D)π/4/√(|D|) . If there was only the first factor on the right hand side of (<ref>), we would have form invariance, but we also have a factor 1/√( D). It has been shown in <cit.>, that D does not factorize over the simplices, and that therefore it is not possile not define a local measure (that is a measure which factorizes over simplices and sub-simplices) leading to form invariance. We also discussed in Section <ref>, that the sign of D is configuration-dependent. Different from the three-dimensional case we can therefore not absorb the phase e^-sign(D)π/4 into terms which only depend on the number of simplices and possibly sub-simplices. §.§ 5-1 For the 5-1 move the path integral is given by Z^(5-1) = exp( ^(2)S_Regge^( f) ) ∫∏_i∈{1,2,3,4,5}λ_0iμ^(5-1)exp(∑_e,e'1/2H_ee'^(5-1)λ_e λ_e') . Due to the factorizing Hessian four of the five variables in the integral correspond to gauge degrees of freedom. Thus, we integrate only over λ_01, which leads to a factor √(2π/H^(5-1)_(01)(01)) = √(96π)e^sign(D)π/41/√(|D|)𝕍_2𝕍_3𝕍_4𝕍_5/𝕍_0𝕍_1^1/4 = √(96π)e^sign(D)π/41/√(|D|)√(V_2 V_3V_4V_5/V_0V_1) . Choosing the measure μ^(5-1) =1/∏_e⊂bdry√(√(96π))1/∏_e⊂bulk√(96π)1 /∏_σ√(V_σ) , we remain with Z^(5-1) = exp( ^(2)S_Regge^( f) ) /∏_e⊂bdry√(√(96π))√(V_0̅)√(V_1̅) × e^sign(D)π/4/√(|D|)∫∏_i=2,3,4,5λ_0i1/(96π)^21/V_1̅ . With the same argument as for the 4-1 moves we can associate ∫∏_i=2,3,4,5λ_0i1/(96π)^21/V_1̅→ 1 to an integral over a gauge orbit and set it to one. We still do not obtain form invariance, as we obtained an additional factor of √(/D). §.§ Summary for 4D Pachner moves As expected, we find that the path integrals for the four-dimensional Pachner moves have much less invariance properties than for the three-dimensional Pachner moves. This starts at the classical level: whereas the action is form-invariant under 4-2 and 5-1 Pachner moves, it is not invariant under 3-3 moves. Restricting the path integral to the 4-2 and 5-1 Pachner moves we cannot find a local measure that would lead to form invariance. This is because of the factor D appearing in the Hessian, which does not factorize over simplices. This issue already exist for Euclidean Regge calculus <cit.>. In the Lorentzian case we additionally encounter the phase e^-sign(D)π/4 for the (4-2) move and the phase e^sign(D)π/4 for the 5-1 move. We saw in Section <ref>, that the sign of D can depend on the type of the Pachner move and also on the configuration, and we can therefore not absorb these phase factors into contributions that only depend on the number of simplices or sub-simplices. As we discussed already for the Pachner moves in three dimensions, in the Euclidean case configurations for which the Hessian matrix element has negative sign are interpreted as conformal mode degrees of freedom, and the sign is changed by hand. E.g. one can show that the sign for the 5-1 move in Euclidean gravity is always negative <cit.>. The Lorentzian path integral has the advantage that such sign rotations by hand are not necessary. It would be indeed quite problematic as the sign of D appears to be much more configuration dependent for the Lorentzian case. We find that the different signs lead to different deformations of the integration contour and that one can always make the integral convergent and thus avoid the conformal factor problem. A similar mechanism was found for the non-perturbative Regge path integral applied to cosmology <cit.>. In this case, the deformation of the contour was defined via Picard-Lefschetz theory <cit.>, and different boundary data led to different deformations of the contour. But if one isolates the behaviour of the action for large bulk edge lengths, the contours fell only into two classes, and emulated either a left-handed or right-handed Wick rotation, depending on whether the conformal factor dominated in the action or not. This mechanism of resolving the conformal factor problem is therefore the same as we encountered here for the Pachner moves. We saw that in the three-dimensional Lorentzian case, the signs of the Hessian matrix elements only dependent on the type of Pachner move, and not on the other specifics of the configuration. This holds also for three-dimensional Euclidean Regge gravity <cit.>. Thus in this case one can argue for a relation between Euclidean and Lorentzian gravity via Wick rotation: the different types of Pachner moves separate the cases with positive and negative sign for the Hessian element respectively. These come with separate deformations of the integration contour, and confirm the description of `rotating by hand' the sign for the conformal factor (in the 4-1 move) for three-dimensional Euclidean quantum gravity <cit.>. As discussed in Section <ref>, there is a π/4 phase factor that is missed by this description, but it can be easily reconstructed. In contrast, in the four-dimensional Lorentzian case, the signs of the Hessian matrix elements does not only depend on the type of Pachner move, but also on the further specifics of the configuration. Different configurations for e.g. the 5-1 Pachner move might therefore require different deformations of the integration contour. But the sign for the (bulk) diagonal Hessian elements in the 5-1 move is in the Euclidean case always the same, namely negative. We can therefore not match the deformations of the Lorentzian contour with the sign rotations for the conformal factor in the Euclidean case. § DISCUSSION AND OUTLOOK In this work we considered the path integral for Lorentzian Regge calculus, to one-loop order. We split this path integral into smaller steps defined by Pachner moves. The advantage of doing so is that we only have to consider one-dimensional integrals for each Pachner move, and that we can derive an explicit and factorizing form for the Hessian of the action associated to such moves. We then analyzed the path integral for the three-dimensional and four-dimensional case in more depth. We found considerable differences between these two cases. For the three-dimensional case, we can define a path integral measure that leads to form invariance (to one-loop order) of the Lorentzian path integral, and therefore to discretization independence. This will allow to evaluate path integrals for three-dimensional Lorentzian Regge gravity, by choosing the coarsest bulk triangulation. This has been utilized for Euclidean quantum gravity in <cit.>, in order to compute partition functions for the solid torus and to extend holographic dualitities to finite boundary <cit.>. Such strategies can now also be applied to Lorentzian gravity. We have also seen that in the three-dimensional case the different types of Pachner moves separate the conformal mode from the remaining modes. That is the 4-1 and 3-2 Pachner move Hessians have opposite signs in the Lorentzian and in the Euclidean case. The non-gauge degree of freedom in the 4-1 move can be identified as the conformal mode. The opposite signs for the Hessian require different deformations of the integration contour for the Lorentzian path integral, corresponding to Wick rotations in opposite directions. This justifies a posteriori the change of sign for the conformal mode in Euclidean, three-dimensional, quantum gravity <cit.>. On the other hand we do find an additional (complex) contribution to the measure in the Lorentzian case, as compared to the Euclidean case <cit.>. This additional contribution can be absorbed into a shift by π/4 for the phase of the amplitude associated to the tetrahedra. Interestingly, such a phase shift is also found for the asymptotics of the Lorentzian Ponzano-Regge model <cit.>. This illustrates the power of the method applied here, that is to construct invariant path integral measures by demanding invariance under changes of the discretization, see also <cit.>. In the four-dimensional case we cannot find a local path integral measure, that would lead to form invariance of the path integral. This holds even for Pachner moves for which the classical action is form invariant. This does not mean that one cannot achieve discretization or regularization invariance. One way out is to construct so-called perfect actions or discretizations <cit.> that are typically non-local <cit.>. E.g. <cit.> constructs an invariant measure (to one-loop measure) for a particular family of discretizations of Euclidean four-dimensional quantum gravity, based on Regge gravity. This can now be extended to the Lorentzian case. Another way out is to abandon the notion of fundamental building blocks (and therefore locality) and use the consistent boundary formalism <cit.>. This framework suggests to start with a discrete approximation to the path integral, e.g. Regge gravity, and provides iterative methods to achieve results, which depend less and less on the choice of discretization. In the four-dimensional case we also do not find such a straightforward relation between the deformation of the integration contour for the Lorentzian path integral and the change of sign for the conformal mode in the Euclidean path integral, as for three-dimensional gravity. The sign for the (bulk) Hessian matrix elements depends in the Lorentzian case not only on the type of the Pachner move, but also on the specifics of the configuration. E.g. we find that the sign for the 5-1 Pachner move can be positive or negative for the Lorentzian bulk Hessian matrix element. In contrast, one finds that the Euclidean bulk Hessian matrix element for the 5-1 move has negative sign and therefore requires a change of sign. Thus, we have to apply in the Lorentzian case deformations of the integration contour, which depend on the configuration. But we have to always change the sign for the Euclidean Hessian for the 5-1 move. Luckily, in the Lorentzian case we do not need to apply a `change of sign by hand' for the conformal mode. The deformation of the integration contour is rather determined by the convergence properties of the integrand, and leads for our quadratic actions always to a convergent path integral. We can thus take as a lesson for the non-perturbative path integral, that one either needs to have a well-defined procedure to establish the correct deformation contour, e.g. Picard-Lefschetz theory <cit.>, which has already been applied in <cit.> to Lorentzian Regge cosmology. Or it is necessary to find evaluation methods for the Lorentzian path integral that are independent of such a contour deformations <cit.>. This brings us to possible extensions and further applications of the results presented in this work. We considered here the path integral to one-loop order. It would be interesting to see how much can be said about the non-perturbative path integral. We cannot hope for an exact analytical evaluation. But, we can hope to establish the asymptotic behaviour of the complex action for the various coarse graining Pachner moves. Indeed, we have seen that these Pachner moves (with gauge fixing) always lead to just a one-dimensional integration. We can therefore hope that the asymptotic behaviour for large edge lengths will be sufficient to determine the required deformation of the integration contour, and to establish an integration measure such that the path integral (with gauge fixing) converges. This could help to establish the existence of the Lorentzian non-perturbative path integral for (Regge) gravity. Knowing the (approximate) behaviour of this path integral under coarse graining Pachner moves would help to understand crucial properties of Lorentzian renormalization. See <cit.> for a related strategy in the context of spin foams. The strategy presented in this work can also be generalized to other forms of Regge gravity, e.g. for homogeneously curved simplices <cit.>, as well as to effective spin foams <cit.>. In Area Regge gravity (defined for four-dimensional triangulations) one uses areas instead of length as fundamental degrees of freedom <cit.>. One thus avoids the factor D in the Hessian, whose appearance in length Regge calculus hinders the definition of a local path integral measure. On the other hand, the action includse the inverse of the Jacobian associated to the change of variables from length to areas. Effective spin foams <cit.> are based on the Area Regge action, a perturbative path integral evaluation could therefore rely on similar techniques as presented here. Non-perturbative evaluations of the effective spin foam path integral have been already achieved for the 3-3 move configuration <cit.> and also for triangulations with a bulk edge <cit.>. These in particular show that effective spin foams implement discrete gravitational equations of motion. For the EPRL spin foam model <cit.> one can evaluate 3-3 Pachner move configurations numerically <cit.> and configurations with internal edges via a saddle point approximations <cit.>. The classical aspects of this class of models can be described by the Area-Angle Regge action <cit.>. This action can also turned to describe a topological model, namely SU(2) BF theory. A Pachner move analysis of this action, along the lines presented here, might therefore allow to construct a path integral measure with enhanced invariance properties. § GEOMETRY OF LORENTZIAN AND EUCLIDEAN SIMPLICES The following is an overview on the geometry of Lorentzian and Euclidean simplices. We will largely follow the conventions of <cit.>, but will also provide extended material not covered in <cit.>. We will include the definition of Euclidean and Lorentzian Regge actions (and thus of Euclidean and Lorentzian dihedral and deficit angles), but utilize for this the notion of complex angles and complex Regge action from <cit.>. Additionally, we provide here a proof for the Euclidean and Lorentzian Schläfli identity (using the conventions employed in this paper), and a formula for the derivatives of dihedral angles, which are needed in the main text. To this end we will prove a number of geometrical identities for Lorentzian and Eucludian simplices. This work will pay off once we come to the proof of the Schläfli identity and to the formula detailing the derivative of the dihedral angle.   In the following we consider a d-simplex σ embedded in either Minkowskian or Euclidean spacetime equipped with a Cartesian coordinate system. We denote the coordinates of the simplex vertices with v_i^α where i=0,1,…, d and α=1,…,d. Below we will choose v_0 as reference vertex and consider the set of edge vectors originating from v_0, that is x_a^α =v_a^α -v_0^α , a=1,…, d . These edge vectors form a basis of the Minkowskian or Euclidean spacetime. We can encode these edge vectors into a quadratic matrix X with elements X_aα = x_a^α . We assume that we have a non-degenerate simplex, and that the basis {x_a}_a=1^d is positively oriented. The (absolute) volume is then given by V = 1/d! X . Denoting by η_αβ either the Minkowskian or Euclidean spacetime the signed length squared of the edges are given by s_ij = ∑_α,β (v_i^α -v_j^α)η_αβ (v_i^β -v_j^β) =:⟨ v_i -v_j | v_i -v_j⟩ . §.§ Caley-Menger determinants and generalized triangle inequalities The signed volume square of a d-simplex can be also computed via a Caley-Menger determinant, see e.g. <cit.>. This gives the signed volume square directly in terms of the signed length squares: 𝕍^d = - (-1)^d/ 2^d (d!)^2( 0 1 1 1 ⋯ 1 1 0 s_01 s_02 ⋯ s_0d 1 s_01 0 s_12 ⋯ s_1d ⋮ ⋮ ⋮ ⋮ ⋱ ⋮ 1 s_0d s_1d s_2d ⋯ 0 ) . For example, we have for the signed area square of a triangle 𝔸_ijk = -1/16(s_ij^2+s_ik^2+s_jk^2 - 2(s_ijs_ik+s_ijs_jk+s_iks_jk)) . Given the signed squared edge lengths of a d-simplex σ, we say it is either realizable as a Euclidean simplex or a Lorentzian simplex, if there exist a geometry-preserving embedding of this simplex in either Euclidean or Minkowskian spacetime, respectively. A Euclidean simplex is realizable (and non-degenerate) if its signed volume square and the signed volume squares of all its sub-simplices are strictly positive. A Lorentzian simplex σ is realizable (and non-degenerate) if its signed volume square is strictly negative and if the following requirement for all its sub-simplices is satisfied <cit.>, ρ⊂σ, 𝕍_ρ≤ 0 ⟹ ∀ρ' ⊃ρ: 𝕍_ρ'≤ 0 . Note that we set the signed volume square associated to any vertex equal to 1. The condition (<ref>) ensures that if a given sub-simplex ρ is time-like or null, then all the sub-simplices containing this sub-simplex ρ are also time-like or null. §.§ Gram matrix of edge vectors and Gram matrix of normals Above we defined the edge vectors x_a, where a=1,…, d, which start from the vertex v_0, and form a basis for ℝ^d. The metric tensor can be expressed in this basis as G_ab = ⟨ x_a | x_b⟩ = 12 ( s_a0 + s_b0 -s_ab) . The latter equation follows from inverting the relations s_ab = ⟨ x_a-x_b | x_a-x_b⟩ = G_aa-2G_ab+G_bb , s_a0 = ⟨ x_a | x_a⟩ = G_aa . Note that G coincides with the Gram matrix of the set of edge vectors {x_a}_a=1^d. Thus we can write G also as G = X ·η· X^T , where we understand (η)_αβ=η_αβ as matrix.   The adjugate Adj(X) to a matrix X satisfies X·Adj(X) = Adj(X)· X = (X) 𝕀 = d! V 𝕀 . Thus, the columns of Adj(X) are the normal one-forms[The corresponding normal vectors are inward pointing.], which satisfy ∑_α n_a α x_b^α = d! V δ_abwhere n_aα =Adj(X)_α a . To determine the normalization of the normal one-forms we split x_a into a part parallel to the normal vector and a part orthogonal to it: x_a^α = ∑_β h_a 1/|n_a| n_aβη^αβ + y^αwith∑_α n_aαy^α=0 , where η^αβ denotes the inverse (Minkowskian or Euclidean) metric and |n_a|=√( |∑_α,β n_aαη^αβn_aβ|). The coefficient h_a defines the height of the d-simplex σ with respect to the sub-simplex σ_a̅, which is obtained from σ by removing the vertex v_a and all its adjacent sub-simplices. Using (<ref>) we have ∑_αβ n_a αη^αβ n_a β = h_a sign(n_a) |n_a| = d! V . The height h_a in a d-simplex can also be defined by h_a= d!/(d-1)!V/V_a̅ , where V_a̅ is the (absolute) volume of the sub-simplex σ_a̅. Thus |n_a|=(d-1)! V_a̅. With this normalization the closure relation for the normals associated to the faces of a simplex holds. That is, we can define the normal to the face σ_0̅ as n_0 =- ∑_a=1^d n_a ⇒∑^d_i=0 n_i = 0 .   Let us now consider the Gram matrix G̃ associated to the set of normals {n_a}_a=1^d, that is G̃_ab = ∑_αβ n_aαη^αβ n_bβorG̃ = Adj(X)^T ·η^-1·Adj(X) . Using (<ref>) we can conclude G ·G̃ = G̃· G = ( X)^2 𝕀 As G=( X)^2 η we have G̃ = (η^-1) Adj(G) . Later we will need the matrix elements of Adj(G). We remind the reader that the adjugate of G can be also defined from the matrix of minors Mr(G) of G. The matrix element (Mr(G))_ab is defined as determinant of the matrix G^a̅b̅, which is obtained from G by removing the a-th row and b-th column. The adjugate of G is then given by ( Adj(G))_ba=(-1)^a+b (Mr(G))_ab . In the following we will denote with 𝕍 the signed volume square of σ and with 𝕍_a the signed volume square of the sub-simplex σ_a̅. The matrix elements of the adjugate of G can then be expressed as ( Adj(G))_ab= ((d-1)!)^2 𝕍_a for a = b -(d!)^2 ∂𝕍/∂ s_ab for a ≠ b . To see this, notice that in the case a=b we have Mr(G)_aa=Adj(G)_aa and Mr(G)_aa is given by the determinant of the (edge vector) Gram matrix associated to the sub-simplex σ_a̅. Adj(G)_aa gives therefore ((n-1)!)^2 𝕍_a̅. In the case i≠ j we can use Jacobi's formula for the variation of the determinant of a square matrix: ∂det G/∂ s_ab =tr( Adj(G) ∂ G/∂ s_ab) for b>a. The result follows by using that det G=(d!)^2 𝕍 and that the matrix elements of G are given in terms of edge lengths by (<ref>).   §.§ Projecting out a hinge The hinge σ_ab is a (d-2)-simplex obtained from the d-simplex σ by removing the vertices v_a and v_b, as well as all adjacent sub-simplices. The dihedral angle θ_ab at a hinge σ_ab is the angle between the hyper-planes defined by the sub-simplices σ_a̅ and σ_b̅, which intersect in σ_ab. To find this dihedral angle, we need to project the simplex metric onto the plane orthogonal to the hinge. To do so, we assume without loss of generality, that the hinge is σ_(d-1)(d). The Gram matrix G for the d-simplex can then be written as G = [ H B; B^T H̅ ] = [ H B_d-1 B_d; B^T_d-1 H̅_(d-1)(d-1) H̅_(d-1)(d); B^T_n H̅_(d-1)(d) H̅_(d)(d) ] , where H contains the metric components of the hinge and H̅ is the 2× 2 metric associated to the triangle defined by {v_0,v_(n-1),v_n}. To find the metric orthogonal to the hinge we project out from x_c=v_c-v_0 with c=(d-1) or c=d all parts parallel to the remaining vectors x_a with a=1,…,(d-2). These projections are given by x^proj_c = x_c - ∑_a,b=1^d-2⟨ x_c | x_a⟩ (H^-1)_ab x_b . It is then straightforward to compute the contractions between the {x^proj_(d-1), x^proj_d}, which can be encoded in the Gram matrix P = [ P_(d-1)(d-1) P_(n-1)(n); P_(n-1)(n) P_(n)(n) ] = H̅ - B^T ( H^-1 ) B . We now consider the minors (Mr(G))_cc' of G with c=(d-1),(d) and c'=(d-1),(d). Using the form (<ref>) for G these minors are given by ( Mr(G))_cc' = [ H B_c; B^T_c' H̅_cc' ] = H ( H̅_cc' - B^T_c' H^-1 B_c ) = H P_cc' , where in the second equation we used an identity for the determinant of block matrices[M = (A) (D-CA^-1B) for a matrix M=[ A B; C D ].], and in the third equation we used the form of P in (<ref>). The matrix H is the metric associated to the hinge and hence we have H = ((n-2)!)^2 𝕍_(d-1)(d). Thus, using the explicit form for the adjugate in (<ref>) and its relation to the minors in (<ref>), we obtain for the metric of the projected triangle P = (d-1)^2/𝕍_(d-1)(d)[ 𝕍_(d-1) d^2 ∂𝕍/∂ s_(d-1)(d); d^2 ∂𝕍/∂ s_(d-1)(d) 𝕍_(d) ]. The elements of P give us the inner product between the vectors p_d-1 and p_d, which are obtained by projecting σ_(d-1) and σ_(d) onto the plane orthogonal to the hinge σ_(d-1)(d). We can however generalize this conclusion for the vertex pair (v_(d-1),v_(d)) to any vertex pair (v_i,v_j) in σ, and conclude that the inner product between the corresponding vectors p_i,p_j is given by ⟨ p_i | p_i⟩ =(d-1)^2 𝕍_i̅/𝕍_ij , ⟨ p_j | p_j⟩ =(d-1)^2 𝕍_j̅/𝕍_ij , ⟨ p_i | p_j⟩ = d^2(d-1)^2/𝕍_ij∂𝕍/∂ s_ij . To close this subjection we derive an identity which will allow us to express the derivative of the volume in terms of products of volumina. To this end note that (<ref>) and (<ref>), together with the identity for the determinant of block matrices in Footnote <ref>, implies G = H P ⇒ (d!)^2 𝕍 = ((d-2)!)^2 𝕍_ij(d-1)^4/𝕍_ij^2( 𝕍_i̅𝕍_j̅-d^4 ( ∂𝕍/∂ s_ij)^2) and thus ( ∂𝕍/∂ s_ij)^2 = 1/d^4𝕍_i̅𝕍_j̅ -1/ d^2 (d-1)^2𝕍𝕍_ij . §.§ Defining angles in Euclidean and Minkowskian planes Next we will discuss how to define angles of a (convex) wedge spanned by two vectors a,b in the Euclidean or Minkowskian plane. In the Euclidean case the angle ψ_E∈ [0,π] is defined by ψ_E = cos^-1( ⟨â | b̂⟩) , where â=a/|a| and |a|=√(⟨â | â⟩). It can be understood to measure the distance between two points on a unit circle, which goes through the end points of â and b̂ and is centred at the source point of these vectors. In the case of the Minkowskian plane the unit circle is replaced with four disconnected hyperbolae branches, see Fig. <ref>. To characterize the distance between points of different branches one allows the angles to be complex <cit.>. The imaginary part comes in multiples of ∓π/2 and counts how many light rays are included in the wedge spanned by the vectors a and b. Here the sign appears as a choice of convention and leads to two different angles denoted by ψ_L±. We will see, that these two angles arise from different choices of paths for the analytical continuation of the Euclidean angle to Lorentzian data. The two different choices lead to the same Lorentzian Regge action for data which have a light cone regular structure. A two-dimensional triangulation with a light cone regular structure has always four light rays (or two light cones) meeting at a vertex <cit.>. Complexifying the configuration space of length (square) variables the Regge action has branch cuts along data describing light cone irregular triangulations <cit.>. In this case the two choices mentioned above give the values for the Regge action at the two opposite sides of the branch cut. This also means that the two choices reproduce equivalent analytical continuations of the (complexified) Regge action <cit.>. To start with we specify the angles ψ_L± case by case (as done in <cit.>), depending on which quadrant the two vectors a and b are positioned in, see Figure <ref>.[ Here we will work with non-oriented angles. That is the angle for a wedge spanned by two vectors a and b is the same for clock-wise or anti-clockwise ordering of the vectors. We will furthermore assume that the wedge is convex, the angle can in this case be uniquely specified by the vectors a and b. The definition of angles can be extended to non-convex wedges, by demanding that the angles are additive <cit.>. We will exclude the case that one or both of the vectors is null, see <cit.> for an extensive discussion of this case. ] Let us denote a normalized vector by â=a/|a| where |a|=√(|a· a|). The Lorentzian angles can then be defined as ψ_L± = cosh^-1 ( ⟨â | b̂⟩ )if a in quadrant I & b in quadrant I ψ_L± = sinh^-1 (⟨â | b̂⟩ ) ∓π2if a in quadrant I & b in quadrant II ψ_L± = -cosh^-1 (-⟨â | b̂⟩ ) ∓π if a in quadrant I & b in quadrant III ψ_L± = -cosh^-1 (-⟨â | b̂⟩ ) if a in quadrant II & b in quadrant II ψ_L± = cosh^-1 (⟨â | b̂⟩ ) ∓π if a in quadrant II & b in quadrant IV . Here we define cosh^-1(x) ∈ℝ_+ with x ≥ 1. The Euclidean and Lorentzian angle arise as special cases from the following definition of complex angles <cit.>θ^± = -log_∓⟨ a | b⟩∓√(__± ⟨ a | a⟩⟨ b | b⟩ - ⟨ a | b⟩^2 )/√(__± ⟨ a | a⟩)√(__± ⟨ b | b⟩) . Here √(__±z) and log_± z are defined via their principal branch values for z=re^ϕ and r>0 and ϕ∈ (-π,π). For the branch cut along the real negative axis, we define for r>0log_± (-r) = log(r) ±π ,√(__±-r) = ±√(r) . With these choices the complex angles reproduce the Euclidean and Minkowskian angles as follows <cit.>: θ^±_Eucl. = ∓ψ_E ,θ^±_Mink. = -ψ_L± . For Euclidean data ⟨ a | a⟩⟨ b | b⟩ - ⟨ a | b⟩^2 is positive and ⟨ a | a⟩, ⟨ b | b⟩ are positive. Thus, for generic[The cases that a and b are parallel or anti-parallel can also be reproduced correctly, see <cit.>.] Euclidean data, we do not encounter the branch cuts and the result (<ref>) follows. For Minkowskian data ⟨ a | a⟩⟨ b | b⟩ - ⟨ a | b⟩^2 is negative and thus the numerator in (<ref>) is the same for θ^+ and θ^- and is real. If a is time-like and b is space-like, the denominator in (<ref>) will be imaginary and have opposite signs for θ^±. Thus one avoids the branch cut for the logarithm, but the argument in the logarithm is imaginary and has opposite signs for θ^±, leading to θ^±=ψ_L±. If a and b are both space-like or both time-like, one can show that the argument of the logarithm is positive real if a and b are from the same quadrant, and is negative real if a and b are from opposite quadrants. Thus, for the case that a and b are from opposite quadrants we encounter the branch cut of the logarithm, and the values for θ^±=ψ_L± differ. For the case that a and b are from the same quadrant, the values for θ^±=ψ_L± agree. See <cit.> for a more explicit analysis of all these cases. Now, the dihedral angle θ_σ,h^± in a d-simplex σ, at a hinge h, is given by the angle between the vectors which result by projecting the (d-1)-dimensional sub-simplices ρ_a and ρ_b, which share h, onto the plane orthogonal to h. We computed the inner product between these vectors (for h given by σ_ij) in (<ref>). We thus obtain θ_σ,h^± = -log_∓(d^2/𝕍_h∂𝕍_σ/∂ s_h̅∓ √(__± 𝕍_ρ_a/𝕍_h𝕍_ρ_b/𝕍_h-( d^2/𝕍_h∂𝕍_σ/∂ s_h̅ )^2 )/√(__± 𝕍_ρ_a/𝕍_h)√(__± 𝕍_ρ_b/𝕍_h) ) . Here s_h is the signed length squared of the edge in σ, which is opposite form the hinge h. Note that (<ref>) gives the dihedral angle in the form θ=-log( x/y ∓ (√(y^2-x^2))/y). We can thus conclude, that cos(θ_σ,h^±) = d^2 1/𝕍_h√(__± 𝕍_ρ_a/𝕍_h)√(__± 𝕍_ρ_b/𝕍_h)∂𝕍_σ/∂ s_h̅ . Using the fact, that if 𝕍_h is negative, so are (according to the generalized triangle inequalities) 𝕍_ρ_a and 𝕍_ρ_b we can write this expression as cos(θ_σ,h^±) = d^2 1/√(__± 𝕍_ρ_a)√(__± 𝕍_ρ_b)∂𝕍_σ/∂ s_h̅ . Applying (<ref>) to the argument of the square root in the numerator of (<ref>), we also obtain sin(θ_σ,h^±) = ∓d/(d-1)√(__± 𝕍_h)√(__± 𝕍_σ)/√(__± 𝕍_ρ_a)√(__± 𝕍_ρ_b) , where we made again use of the fact, that 𝕍_h<0 implies that all other signed volume squares appearing in the equation above are negative. We regain equation (<ref>), by plugging (<ref>) and (<ref>) into the relation cos^2(θ)+sin^2(θ)=1. §.§ The Regge action Given the notion of complex dihedral angle θ_σ,h^± in (<ref>) we define the notion of complex deficit angle at a hinge h as the difference between the sum of the dihedral angles attached to h and the flat space value. The latter is given by ∓ 2π. Thus, we define the bulk deficit angles ϵ^±(bulk)_h =2π±∑_σ⊃ hθ^±_σ,h and the boundary curvature angles ϵ^±(bdry)_h =π k ±∑_σ⊃ hθ^±_σ,h , where the choice of k depends on how many boundary pieces one glues together at h. The complex Regge action is then given by S^±_Regge = ∑_h⊂^(d)√(__± 𝕍_h) ϵ^±_h , where ^(d) denotes the d-dimensional triangulation. Note that the Euclidean and Lorentzian Regge actions are defined as <cit.> S_ E = -∑_h |V_h| (ϵ_ E)_h , S_L± = ∑_h: t-like |V_h| (ϵ_E)_h + ∑_h: s-like |V_h| (ϵ_L±)_h , where (ϵ_E)_h = π k - ∑_σ⊃ hψ_E^σ,h, (ϵ_L±)_h = ∓π k - ∑_σ⊃ hψ_L±^σ,h, and k=2 for a bulk hinge, and appropriately chosen for a boundary hinge. Using (<ref>) we can conclude that S^±_Regge_Eucl. data = - S_E , S^±_Regge_Lor. data = ± S_L± . The reason for the appearance of the global sign can be understood as follows: The complex Regge action (<ref>), with the dihedral angles defined in (<ref>), is analytic around generic Euclidean data. In contrast to the Euclidean case, we might encounter the branch cuts of the square roots and logarithms, if we consider Lorentzian data. The different signs appear because we approach these branch cuts from opposite sides. Consider for instance a triangulation for which we can introduce a global Wick rotation (see <cit.> for an example). Let the Wick rotation angle ϕ=0 represent Euclidean data and ϕ=±π Lorentzian data. For Euclidean data, that is for ϕ=0, we have S^+_Regge=S^-_Regge. Thus S^+_Regge and S^-_Regge determine the same analytical continuation. S^+_Regge evaluated at Lorentzian data represents the analytical continuation by increasing ϕ from ϕ=0 to ϕ=+π. Similarly, S^-_Regge evaluated at Lorentzian data represents the analytical continuation by decreasing ϕ from ϕ=0 to ϕ=-π. In fact, the full analytical continuation leads at least to a double cover for ϕ, that is ϕ can be extended to (-2π,2π], with ϕ=2π representing another copy of Euclidean data. Here, if the Lorentzian data have a light cone regular structure, the analytically continued complex Regge action evaluates to +S_E. Light cone irregular Lorentzian data can lead to branch cuts and thus to an even more involved structure of the Riemann surface. We refer to <cit.> for a more detailed analysis and explicit examples. §.§ Schläfli identity for Euclidean and Lorentzian simplices The Schläfli identity for an Euclidean or Lorentzian d-simplex σ states that ∑_i<j√(__± 𝕍_ij) θ^±_ij =0 , for variations of the simplex geometry. A basis of such variations is given by s_kl. Here i,j run from 0 to d and denote the vertices of σ. 𝕍_ij is the signed volume square of the hinge σ_ij, which is obtained by removing from σ the vertices i and j and all adjacent sub-simplices. θ^±_ij is the complex dihedral angle at σ_ij. Note that with (<ref>) holding for d-simplices, we will have for a more general triangulation ∑_h⊂^(d)√(__± 𝕍_h) ∑_σ⊃ hθ^±_h,σ=0 . This identity can be regarded as the discrete analog of the term containing the variation of the Ricci tensor in the variation of the continuum Einstein-Hilbert action. The latter produces only a vanishing total divergence and thereby guarantees that the resulting field equations are of second order. To prove (<ref>) we will make use of many formulae derived in this appendix. We start with (<ref>), which states that G̃_ab gives the inner product between the normal one forms n_a associated to the faces σ_a. As we choose v_0 as reference vertex, we defined a to run from 1 to d. But we can also include the normal n_0 into the Gram matrix, and thus work with G̃_ij. Using (<ref>), (<ref>) and (<ref>), we can conclude that (as the form of the following equation is invariant under a relabeling of the vertices) G̃_ij = (η^-1) ((d-1)!)^2 𝕍_i̅ for i = j -(d!)^2 ∂𝕍/∂ s_ij for i ≠ j = - ((d-1)!)^2 (η^-1) cos(θ_ij^±) √(__± 𝕍_i̅)√(__± 𝕍_j̅) . Here we defined cosθ^±_ii=-1 (and accordingly sinθ^±_ii=0). Now, starting from the closure relation for the normals results in ∑_i=0^d n_i = 0 ⇒∑_i=0^d G̃_ij= 0 ⇒∑_i=0^d cos(θ_ij^±) √(__± 𝕍_i̅) = 0 for j=0, …,d . Applying d to the last equation in (<ref>) we obtain -∑_i=0^d √(__± 𝕍_i̅) sin(θ_ij^±) θ_ij^± + ∑_i=0^d cos(θ_ij^±) √(__± 𝕍_i̅) = 0 . We multiply (<ref>) with √(__± 𝕍_j̅) and sum over j. This summation annihilates the second term in (<ref>). We are therefore left with ∑_i,j=0^d √(__± 𝕍_i̅)√(__± 𝕍_j̅) sin(θ_ij^±) θ_ij^± = 0 (<ref>)⟹∑_i,j=0^d √(__± 𝕍_ij) θ_ij^± = 0 . As θ_ii^± =0 the last equation implies the Schläfli identity (<ref>). §.§ Derivatives of the dihedral angle In (<ref>) used the derivative of the dihedral angle θ_ij at a hinge σ_ij in a simplex σ, with respect to the signed length squared s_ij of the edge opposite to this hinge. To prove this formula we will use again (<ref>) and (<ref>). We take the derivative of equation (<ref>), which defines sinθ^±_ij and utilize that ∂𝕍_i̅/∂ s_ij=∂𝕍_j̅/∂ s_ij=0 and ∂𝕍_ij/∂ s_ij=0. We obtain cos(θ_ij^±) θ^±_ijs_ij = ∓d/2(d-1)√(__± 𝕍_ij)/√(__± 𝕍_i̅)√(__± 𝕍_j̅)√(__± 𝕍)𝕍s_ij (<ref>)= ∓1/2(d-1)d√(__± 𝕍_ij)/√(__± 𝕍) cos(θ_ij^±) . Thus θ^±_ijs_ij = ∓1/2(d-1)d√(__± 𝕍_ij)/√(__± 𝕍) . As θ^± reproduces ∓ψ_E for Euclidean data, we also reproduce the formula for the derivative of the Euclidean dihedral angle in <cit.>. Using (<ref>) and (<ref>) we can also obtain a formula for the derivative of the dihedral angle with respect to the other signed length squared variables cos(θ_ij^±) θ^±_ijs_kl = ∓d/2(d-1)√(__± 𝕍_ij)√(__± 𝕍)/√(__± 𝕍_i̅)√(__± 𝕍_j̅)( 1/𝕍𝕍 s_kl+ 1/𝕍_ij𝕍_ij s_kl - 1/𝕍_i𝕍_i s_kl - 1/𝕍_j𝕍_j s_kl) , which allows us to conclude θ^±_ijs_kl = 1/2sin(θ_ij^±)/cos(θ_ij^±)( 1/𝕍𝕍 s_kl+ 1/𝕍_ij𝕍_ij s_kl - 1/𝕍_i𝕍_i s_kl - 1/𝕍_j𝕍_j s_kl) . § INTEGRATION MEASURE FOR GAUGE ORBITS Here we derive an identity between an integration measure in terms of the signed length squares of an (embedded) d-simplex and a measure in terms of the coordinates of one of its vertices <cit.>. We consider a d-simplex σ embedded into flat Minkowskian or Euclidean space and vertex coordinates v_0^α, v_1^α, …, v_d^α. The signed length squares for the edges (0a), with a=1,…,d are given by s_0a = ∑_α,β (v_0^α-v_a^α)η_αβ(v_0^β-v_a^β). We can express the integration measure as ∏_a=1^d s_0a = ∏_α=1^d v_0^α| ( s_0av^β_0) | . The determinant of the Jacobian gives | ( s_0av^β_0) | = 2^d |(η)| |(v_0^γ-v_a^γ)| (<ref>)= 2^d d! V , where V is the absolute volume of the simplex. One can then write ∑_orientation of σ∏_a=1^d s_0a/2^d d! V = ∏_α=1^d v_0^α . The sum over the two orientations of σ appears because of the following: Given the vertex v_0 we assume that it is not in the hyper-plane defined by the vertices v_1,…, v_d (which is the case if σ is not degenerate). Constructing the mirror image of v_0 with respect to this hyper-plane we obtain a d-simplex, which has the same edge lengths as before but opposite orientation. As we consider a perturbative evaluation, we do however not include a sum over orientations in our path integral. In the main text, we therefore ignore this sum over orientations, but nevertheless associate the integral over the s_0a to an integral over the gauge orbit, resulting from displacements of the vertex v_0. In fact, if one does not include the sum over orientations into the action, the action is only invariant under such displacements as long as the vertex is inside the coarser simplex. We thank Dongxue Qu for collaboration during the initial phase of the project and Seth Asante and José Padua-Argüelles for helpful discussions. JNB is supported by an NSERC grant awarded to BD. Research at Perimeter Institute is supported in part by the Government of Canada through the Department of Innovation, Science and Economic Development Canada and by the Province of Ontario through the Ministry of Colleges and Universities. 98PerezLR A. Perez, “The Spin Foam Approach to Quantum Gravity,” Living Rev. Rel. 16 (2013) 3 [arXiv: 1205.2019]. WilliamsReview T. Regge and R. M. Williams, “Discrete structures in gravity,” J. Math. Phys. 41 (2000), 3964-3984 [arXiv:gr-qc/0012035 [gr-qc]]. Oriti:2006se D. Oriti, “The Group field theory approach to quantum gravity,” [arXiv:gr-qc/0607032 [gr-qc]]. Loll:2019rdj R. Loll, “Quantum Gravity from Causal Dynamical Triangulations: A Review,” Class. Quant. Grav. 37 (2020) no.1, 013002 [arXiv:1905.08669 [hep-th]]. Visser K. Tate and M. Visser, “Fixed-Topology Lorentzian Triangulations: Quantum Regge Calculus in the Lorentzian Domain,” JHEP 11 (2011), 072 [arXiv:1108.4965 [gr-qc]]. Dittrich:2014mxa B. Dittrich, S. Mizera and S. Steinhaus, “Decorated tensor network renormalization for lattice gauge theories and spin foam models,” New J. Phys. 18 (2016) no.5, 053009 [arXiv:1409.2407 [gr-qc]]. Delcamp:2016dqo C. Delcamp and B. Dittrich, “Towards a phase diagram for spin foams,” Class. Quant. Grav. 34 (2017) no.22, 225006 [arXiv:1612.04506 [gr-qc]]. Turok J. Feldbrugge, J. L. Lehners and N. Turok, “Lorentzian Quantum Cosmology,” Phys. Rev. D 95 (2017) no.10, 103508 [arXiv:1703.02076 [hep-th]]. Ding D. Jia, “Complex, Lorentzian, and Euclidean simplicial quantum gravity: numerical methods and physical prospects,” Class. Quant. Grav. 39 (2022) no.6, 065002 [arXiv:2110.05953 [gr-qc]]. ADP21 S. K. Asante, B. Dittrich and J. Padua-Argüelles, “Complex actions and causality violations: Applications to Lorentzian quantum cosmology,” [arXiv:2112.15387 [gr-qc]]. toappear B. Dittrich, J. Padua-Arguelles, “Quantum cosmology with effective spin foams," to appearLollLR R. Loll, “Discrete approaches to quantum gravity in four-dimensions,” Living Rev. Rel. 1 (1998), 13 [arXiv:gr-qc/9805049 [gr-qc]]. ConformalFactor G. W. Gibbons, S. W. Hawking and M. J. Perry, “Path Integrals and the Indefiniteness of the Gravitational Action,” Nucl. Phys. B 138 (1978), 141-150. CDT1 J. Ambjorn and R. Loll, “Nonperturbative Lorentzian quantum gravity, causality and topology change,” Nucl. Phys. B 536 (1998), 407-434 [arXiv:hep-th/9805108 [hep-th]]. CDT2 J. Ambjorn, J. Jurkiewicz and R. Loll, “A Nonperturbative Lorentzian path integral for gravity,” Phys. Rev. Lett. 85 (2000), 924-927 [arXiv:hep-th/0002050 [hep-th]]. deBoer:2022zka J. de Boer, B. Dittrich, A. Eichhorn, S. B. Giddings, S. Gielen, S. Liberati, E. R. Livine, D. Oriti, K. Papadodimas and A. D. Pereira, et al.“Frontiers of Quantum Gravity: shared challenges, converging directions,” [arXiv:2207.10618 [hep-th]]. Regge T. Regge, “General relativity without coordinates,” Nuovo Cim. 19 (1961), 558-571 Dittrich:2011vz B. Dittrich and S. Steinhaus, “Path integral measure and triangulation independence in discrete gravity,” Phys. Rev. D 85 (2012), 044032 [arXiv:1110.6866 [gr-qc]]. Bonzom:2015ans V. Bonzom and B. Dittrich, “3D holography: from discretum to continuum,” JHEP 03 (2016), 208 [arXiv:1511.05441 [hep-th]]. Dittrich:2017hnl B. Dittrich, C. Goeller, E. Livine and A. Riello, “Quasi-local holographic dualities in non-perturbative 3d quantum gravity I – Convergence of multiple approaches and examples of Ponzano–Regge statistical duals,” Nucl. Phys. B 938 (2019), 807-877 [arXiv:1710.04202 [hep-th]]. Dittrich:2014rha B. Dittrich, W. Kamiński and S. Steinhaus, “Discretization independence implies non-locality in 4D discrete quantum gravity,” Class. Quant. Grav. 31 (2014) no.24, 245009 [arXiv:1404.5288 [gr-qc]]. Dittrich:2008pw B. Dittrich, “Diffeomorphism symmetry in quantum gravity models,” Adv. Sci. Lett. 2, 151 [arXiv:0810.3594 [gr-qc]]. Bahr:2009ku B. Bahr and B. Dittrich, “(Broken) Gauge Symmetries and Constraints in Regge Calculus,” Class. Quant. Grav. 26 (2009), 225011 [arXiv:0905.1670 [gr-qc]]. Dittrich:2011ien B. Dittrich, “How to construct diffeomorphism symmetry on the lattice,” PoS QGQGS2011 (2011), 012 [arXiv:1201.3840 [gr-qc]]. DittrichBook14 B. Dittrich, “The continuum limit of loop quantum gravity - a framework for solving the theory,” [arXiv:1409.1450 [gr-qc]]. Asante:2022dnj S. K. Asante, B. Dittrich and S. Steinhaus, “Spin foams, Refinement limit and Renormalization,” [arXiv:2211.09578 [gr-qc]]. Korepanov:2000jp I. G. Korepanov, “Multidimensional analogues of the geometric s – t duality,” Theor. Math. Phys. 124 (2000), 999-1005 Korepanov:2000aj I. G. Korepanov, “Invariants of PL manifolds from metrized simplicial complexes: Three-dimensional case,” J. Nonlin. Math. Phys. 8 (2001), 196-210 [arXiv:math/0009225 [math.GT]]. Baratin:2006yu A. Baratin and L. Freidel, “Hidden Quantum Gravity in 3-D Feynman diagrams,” Class. Quant. Grav. 24 (2007), 1993-2026 Baratin:2006gy A. Baratin and L. Freidel, “Hidden Quantum Gravity in 4-D Feynman diagrams: Emergence of spin foams,” Class. Quant. Grav. 24 (2007), 2027-2060 [arXiv:hep-th/0611042 [hep-th]]. Baratin:2014era A. Baratin and L. Freidel, “A 2-categorical state sum model,” J. Math. Phys. 56 (2015) no.1, 011705 [arXiv:1409.3526 [math.QA]]. Girelli F. Girelli, H. Pfeiffer and E. M. Popescu, “Topological Higher Gauge Theory - from BF to BFCG theory,” J. Math. Phys. 49 (2008), 032503 [arXiv:0708.3051 [hep-th]]. Asante:2019lki S. K. Asante, B. Dittrich, F. Girelli, A. Riello and P. Tsimiklis, “Quantum geometry from higher gauge theory,” Class. Quant. Grav. 37 (2020) no.20, 205001 [arXiv:1908.05970 [gr-qc]]. Bahr:2009qc B. Bahr and B. Dittrich, “Improved and Perfect Actions in Discrete Gravity,” Phys. Rev. D 80 (2009), 124030 [arXiv:0907.4323 [gr-qc]]. NewRegge B. Bahr and B. Dittrich, “Regge calculus from a new angle,” New J. Phys. 12 (2010), 033010 [arXiv:0907.4325 [gr-qc]]. Sorkin1974 R. Sorkin, “Time Evolution Problem in Regge Calculus,” Phys. Rev. D 12 (1975), 385-396 [erratum: Phys. Rev. D 23 (1981), 565-565] Sorkin2019 R. D. Sorkin, “Lorentzian angles and trigonometry including lightlike vectors,” [arXiv:1908.10022 [gr-qc]]. EffSF1 S. K. Asante, B. Dittrich and H. M. Haggard, “Effective Spin Foam Models for Four-Dimensional Quantum Gravity,” Phys. Rev. Lett. 125 (2020) no.23, 231301 [arXiv:2004.07013 [gr-qc]]. Barrettetal J. W. Barrett, M. Rocek and R. M. Williams, “A Note on area variables in Regge calculus,” Class. Quant. Grav. 16 (1999), 1373-1376 [arXiv:gr-qc/9710056 [gr-qc]]. ADHAreaR S. K. Asante, B. Dittrich and H. M. Haggard, “The Degrees of Freedom of Area Regge Calculus: Dynamics, Non-metricity, and Broken Diffeomorphisms,” Class. Quant. Grav. 35 (2018) no.13, 135009 [arXiv:1802.09551 [gr-qc]]. HC1 B. Dittrich, “Modified Graviton Dynamics From Spin Foams: The Area Regge Action,” [arXiv:2105.10808 [gr-qc]]. HC2 B. Dittrich and A. Kogios, “From spin foams to area metric dynamics to gravitons,” [arXiv:2203.02409 [gr-qc]]. DittrichSpeziale B. Dittrich and S. Speziale, “Area-angle variables for general relativity,” New J. Phys. 10 (2008), 083006 [arXiv:0802.0864 [gr-qc]]. BarrettFO J. W. Barrett, “First order Regge calculus,” Class. Quant. Grav. 11 (1994), 2723-2730 [arXiv:hep-th/9404124 [hep-th]]. DGS B. Dittrich, S. Gielen and S. Schander, “Lorentzian quantum cosmology goes simplicial,” Class. Quant. Grav. 39 (2022) no.3, 035012 [arXiv:2109.00875 [gr-qc]]. Pachner:1991 U. Pachner, “P.L. Homeomorphic Manifolds are Equivalent by Elementary Shellings," Europ. J. Combinatorics 12 (1991), 129-145 DittrichHoehnCanSimp B. Dittrich and P. A. Hohn, “Canonical simplicial gravity,” Class. Quant. Grav. 29 (2012), 115009 [arXiv:1108.1974 [gr-qc]]. TimeEvol B. Dittrich and S. Steinhaus, “Time evolution as refining, coarse graining and entangling,” New J. Phys. 16 (2014), 123041 [arXiv:1311.7565 [gr-qc]]. Kokkendorff:2007 S. L. Kokkendorff, “Polar duality and the generalized law of sines,” Journal of Geometry 86 no. 1-2, (2007) 140–149 Baldazzi:2019kim A. Baldazzi, R. Percacci and V. Skrinjar, “Quantum fields without Wick rotation,” Symmetry 11 (2019) no.3, 373 [arXiv:1901.01891 [gr-qc]]. Rocek:1981ama M. Rocek and R. M. Williams, “Quantum Regge Calculus,” Phys. Lett. B 104 (1981), 31 Bahr:2011uj B. Bahr, B. Dittrich and S. Steinhaus, “Perfect discretization of reparametrization invariant path integrals,” Phys. Rev. D 83 (2011), 105026 [arXiv:1101.4775 [gr-qc]]. Davids S. Davids, “A State sum model for (2+1) Lorentzian quantum gravity,” [arXiv:gr-qc/0110114 [gr-qc]]. Freidel L. Freidel, “A Ponzano-Regge model of Lorentzian 3-dimensional gravity,” Nucl. Phys. B Proc. Suppl. 88 (2000), 237-240 [arXiv:gr-qc/0102098 [gr-qc]]. Ponzano:1969 G. P. Ponzano and T. E. Regge, “Semiclassical limit of Racah Coefficients,” in F Bloch (Ed.), Spectroscopic and Group Theoretical Methods in Physics, pp. 1-58. North-Holland Publ. Co., Amsterdam, Netherlands, 1968. Roberts:1998zka J. Roberts, “Classical 6j-symbols and the tetrahedron,” Geom. Topol. 3 (1999) no.1, 21-66 [arXiv:math-ph/9812013 [math-ph]]. Davids:1998bp S. Davids, “Semiclassical limits of extended Racah coefficients,” J. Math. Phys. 41 (2000), 924-943 [arXiv:gr-qc/9807061 [gr-qc]]. AmbjornSpikes J. Ambjorn, J. L. Nielsen, J. Rolf and G. K. Savvidy, “Spikes in quantum Regge calculus,” Class. Quant. Grav. 14 (1997), 3225-3241 [arXiv:gr-qc/9704079 [gr-qc]]. PL E. Witten, “A New Look At The Path Integral Of Quantum Mechanics,” [arXiv:1009.6032 [hep-th]]. Asante:2021blx S. K. Asante and B. Dittrich, “Perfect discretizations as a gateway to one-loop partition functions for 4D gravity,” JHEP 05 (2022), 172 [arXiv:2112.03307 [gr-qc]]. Asante:2019ndj S. K. Asante, B. Dittrich and F. Hopfmueller, “Holographic formulation of 3D metric gravity with finite boundaries,” Universe 5 (2019) no.8, 181 [arXiv:1905.10931 [gr-qc]]. Bahr:2010cq B. Bahr, B. Dittrich and S. He, “Coarse graining free theories with gauge symmetries: the linearized case,” New J. Phys. 13 (2011), 045009 [arXiv:1011.3667 [gr-qc]]. Asante:2018kfo S. K. Asante, B. Dittrich and H. M. Haggard, “Holographic description of boundary gravitons in (3+1) dimensions,” JHEP 01 (2019), 144 [arXiv:1811.11744 [hep-th]]. Dittrich:2012jq B. Dittrich, “From the discrete to the continuous: Towards a cylindrically consistent dynamics,” New J. Phys. 14 (2012), 123004 [arXiv:1205.6127 [gr-qc]]. Bonzom:2013ofa V. Bonzom and B. Dittrich, “Bubble divergences and gauge symmetries in spin foams,” Phys. Rev. D 88 (2013), 124021 [arXiv:1304.6632 [gr-qc]]. Riello A. Riello, “Self-energy of the Lorentzian Engle-Pereira-Rovelli-Livine and Freidel-Krasnov model of quantum gravity,” Phys. Rev. D 88 (2013) no.2, 024011 doi:10.1103/PhysRevD.88.024011 [arXiv:1302.1781 [gr-qc]]. Banburski:2014cwa A. Banburski, L. Q. Chen, L. Freidel and J. Hnybida, “Pachner moves in a 4d Riemannian holomorphic Spin Foam model,” Phys. Rev. D 92 (2015) no.12, 124014 [arXiv:1412.8247 [gr-qc]]. Dona:2023myv P. Donà and P. Frisoni, “Summing bulk quantum numbers with Monte Carlo in spin foam theories,” [arXiv:2302.00072 [gr-qc]]. EffSF3 S. K. Asante, B. Dittrich and J. Padua-Arguelles, “Effective spin foam models for Lorentzian quantum gravity,” Class. Quant. Grav. 38 (2021) no.19, 195002 [arXiv:2104.00485 [gr-qc]]. EffSF2 S. K. Asante, B. Dittrich and H. M. Haggard, “Discrete gravity dynamics from effective spin foams,” Class. Quant. Grav. 38 (2021) no.14, 145023 [arXiv:2011.14468 [gr-qc]].7 EPRL J. Engle, E. Livine, R. Pereira and C. Rovelli, “LQG vertex with finite Immirzi parameter,” Nucl. Phys. B 799 (2008), 136-149 [arXiv:0711.0146 [gr-qc]]. Gozzini F. Gozzini, “A high-performance code for EPRL spin foam amplitudes,” Class. Quant. Grav. 38 (2021) no.22, 225010 [arXiv:2107.13952 [gr-qc]]. Dona:2022yyn P. Dona, M. Han and H. Liu, “Spinfoams and high performance computing,” [arXiv:2212.14396 [gr-qc]]. Qu1 M. Han, Z. Huang, H. Liu and D. Qu, “Complex critical points and curved geometries in four-dimensional Lorentzian spinfoam quantum gravity,” Phys. Rev. D 106 (2022) no.4, 044005 [arXiv:2110.10670 [gr-qc]]. Qu2 M. Han, H. Liu and D. Qu, “Complex critical points in Lorentzian spinfoam quantum gravity: 4-simplex amplitude and effective dynamics on double-Δ_3 complex,” [arXiv:2301.02930 [gr-qc]]. Visser2 K. Tate and M. Visser, “Realizability of the Lorentzian (n,1)-Simplex,” JHEP 01 (2012), 028 [arXiv:1110.5694 [gr-qc]]. Hartle J. B. Hartle, “Simplicial minisuperspace I. General discussion,” J. Math. Phys. 26 (1985), 804-814. Dittrich:2007wm B. Dittrich, L. Freidel and S. Speziale, “Linearized dynamics from the 4-simplex Regge action,” Phys. Rev. D 76 (2007), 104020 [arXiv:0707.4513 [gr-qc]].
http://arxiv.org/abs/2303.07162v1
20230313143723
Fractional diffusion for Fokker-Planck equation with heavy tail equilibrium: an à la Koch spectral method in any dimension
[ "Dahmane Dechicha", "Marjolaine Puel" ]
math.AP
[ "math.AP" ]
16 true cm 24 true cm -1cm -1.5cm theoremTheorem[section] lemma[theorem]Lemma ass[theorem]Assumption proposition[theorem]Proposition corollary[theorem]Corollary definition[theorem]Definition remark[theorem]Remark equationsection figuresection Complementary lemma[theorem]Complementary lemma
http://arxiv.org/abs/2303.06937v1
20230313091154
Addressing Catastrophic Forgetting in Federated Class-Continual Learning
[ "Jie Zhang", "Chen Chen", "Weiming Zhuang", "Lingjuan Lv" ]
cs.LG
[ "cs.LG", "cs.AI" ]
Addressing Catastrophic Forgetting in Federated Class-Continual Learning Jie Zhang^1 Chen Chen^2 Weiming Zhuang^2 Lingjuan Lv^2 ^1Zhejiang University ^2Sony AI March 30, 2023 ==================================================================================================== empty This paper focuses on an under-explored yet important problem: Federated Class-Continual Learning (FCCL), where new classes are dynamically added in federated learning. Existing FCCL works suffer from various limitations, such as requiring additional datasets or storing the private data from previous tasks. In response, we first demonstrate that non-IID data exacerbates catastrophic forgetting issue in FL. Then we propose a novel method called TARGET (federatTed clAss-continual leaRninG via Exemplar-free disTillation), which alleviates catastrophic forgetting in FCCL while preserving client data privacy. Our proposed method leverages the previously trained global model to transfer knowledge of old tasks to the current task at the model level. Moreover, a generator is trained to produce synthetic data to simulate the global distribution of data on each client at the data level. Compared to previous FCCL methods, TARGET does not require any additional datasets or storing real data from previous tasks, which makes it ideal for data-sensitive scenarios. § INTRODUCTION Federated Learning (FL) is a privacy-aware learning paradigm that facilitates collaborations among multiple entities (e.g., edge devices or organizations)  <cit.>. Each entity or client in FL retains data locally and transfers only training updates to the central server for aggregation. Conventional FL studies assume that the data classes and domains are static, but the new classes could emerge and data domains could change over time in reality  <cit.>. For example, multiple health institutions could use FL to collaborate and train models to identify COVID-19 <cit.> strains; new COVID-19 strains, however, continue to emerge due to high mutation rate of virus. An intuitive solution to this issue of continuously emerging data classes is training new models from scratch, but this is impractical as it would require significant extra computation cost. Another method is transfer learning from the previously trained model, but this method suffers from catastrophic forgetting <cit.>, degrading performance on the previous classes. To address these issues, recent research <cit.> has introduced the concept of Continual Learning (CL) <cit.> within the FL framework. These methods, collectively referred to as Federated Continual Learning (FCL), aim to mitigate the problems of catastrophic forgetting in FL. In most FCL scenarios, new classes are dynamically added, which we call Federated Class-Continual Learning (FCCL). FCCL allows local clients to continuously collect new data, and new classes can be added at any time. Unfortunately, existing FCCL works suffer from various limitations. For example, Ma et al. <cit.> utilize an unlabeled surrogate dataset to address the catastrophic forgetting problem, which may be difficult to obtain in some data sensitive scenarios. Furthermore, the usage of an unlabeled surrogate dataset may not be ideal for certain types of data, as it may not capture the full complexity of the original data. In CL, exemplar-based methods <cit.> have achieved leading performance. An exemplar refers to a sample or instance of a previously seen data point that is retained in a memory buffer for future use in the learning process. Dong et al. <cit.> propose a exemplar-based method that stores historical data to address catastrophic forgetting. However, in many privacy-sensitive scenarios (e.g., hospitals and medical research institutions), users are not permitted to store data from previous tasks due to privacy and policy concerns and data will not be kept for a long time <cit.>. In summary, the majority of FCCL methods train the global model with additional datasets or previous task data, which could potentially violate data privacy regulations. This dilemma prompts us to consider the following question: Question: How to effectively alleviate the catastrophic forgetting problem in the FCCL without storing the local private data of the client or any additional datasets? To address this question, we conduct a systematic analysis and observe that the imbalanced distribution of data among clients in FL exacerbates the catastrophic forgetting problem (see Section <ref>). In order to fix this problem: 1) at the model level, we leverage the previously trained global model to transfer knowledge of the old tasks to the current task. 2) at the data level, we train a generator to produce synthetic data that aims to simulate the global distribution of data on each client. Drawing on these insights, we present a method called TARGET (federatTed clAss-continual leaRninG via Exemplar-free disTillation) that mitigates catastrophic forgetting in FCCL without compromising clients' data privacy. Our contributions can be concluded as follows: * We are the first to demonstrate that non-independent and identically distributed (non-IID) data exacerbates catastrophic forgetting issue in FL. Then we propose a novel method called TARGET, which alleviates the catastrophic forgetting in FCCL by leveraging global information. * Compared to previous FCCL methods, TARGET doesn't require extra datasets or data from previous tasks, it can be applied in data sensitive scenarios. * Extensive experiments demonstrate the efficacy of our proposed method. For example, when partitioning the CIFAR-100 dataset into five tasks, our method achieves an accuracy of 36.31%, which is about 6% higher than the best baseline method. § CATASTROPHIC FORGETTING IN FCCL This section conducts an in-depth analysis of catastrophic forgetting problem in federated class-continual learning (FCCL). We start by providing a formal definition of the problem. Then, we investigate the forgetting issue in FCCL and discuss potential methods to mitigate it. §.§ Problem Definition Federated Class-Continual Learning (FCCL) focuses on the problem of learning models for new classes over time in FL. An FCCL framework consists of a central server and multiple clients. All clients do not share their raw data with any other client or the central server. Each client learns from a sequence of n tasks, where k-th task contains non-overlapping subsets of classes C_k∈ C , where C is the set of all possible classes. In our privacy-aware scenario, the task stream is presented in an unknown order, and each client can only access its local data from task k during that task's training period, which is no longer accessible thereafter. Note that the models are trained in a distributed manner, where each party has access to only a subset of the classes C_k (non-IID). We also consider a more challenging and practical setting where the data in each client is heterogeneous. In this paper, we assume the label distribution of data in each client is skewed <cit.>. Please see detailed related work in Appendix. Forgetting Issue in FCCL The goal of the global model optimization problem at task k is to minimize the overall classification error on the current set of classes C_k. However, when a new task arises, clients are not able to access data from previous (old) tasks due to privacy concerns and can only update their local model with data from the new task. This often leads to a significant decrease in performance on previous tasks, which is known as catastrophic forgetting <cit.>. To mitigate catastrophic forgetting in the global model, we aim to minimize the overall classification error on the current set of classes C_k, while simultaneously minimizing the changes to the previously learned classes. Formally, the objective function can be written as: min_θ_k∑_c ∈ C_k∑_i=1^m_c L(f_k(x_i,c; θ_k), c) + α R(θ_k, θ_k-1) where θ_k is the model parameter at round k, L is a loss function that measures the classification error, R is a regularization term that penalizes changes to the previous model parameters, m_c is the number of data in class c, and α is a hyper-parameter that controls the strength of the regularization. In this formula, f_k(x_i,c; θ_k) represents the classification model that takes as input a data point x_i,c associated with class c and outputs a probability distribution over the set of classes in C_k. The regularization term R encourages the new model parameters to be close to the previous model parameters θ_k-1, in order to prevent catastrophic forgetting of the previously learned classes. §.§ Heterogeneous Data Exacerbates Forgetting We argue that the degree of data heterogeneity has a substantial impact on catastrophic forgetting. To verify this, we conduct an experiment on CIFAR-100 dataset <cit.> with different degrees of data heterogeneity. Inspired by Backward Transfer (BwT) <cit.>, we derive the following formula to measure the severity of forgetting, a popular forgetting measure in CL <cit.>: ℱ_k=1/k-1∑_j=1^k-1 f_j^k, where ℱ_k denotes the average forgetting at k-th task and f_j^k quantifies forgetting for the j-th (j k) task after the model has been continually trained up to task k. Specifically, for a given data distribution, f_j^k can be expressed as follows: f_j^k=1/|𝒞^j |∑_c∈𝒞^jmax _t ∈{1, … . N-1}(𝒜_c^(n)-𝒜_c^(N)), where 𝒞^j is a set of classes related to the j-th task, 𝒜_c^(n) is the accuracy on class c at round t, and 𝒜_c^(N) is the final accuracy on class c after learning all tasks. Note that f_j^k captures the average gap between the peak accuracy and the final accuracy for each class of the j-th task after learning the k-th task. We further extend the catastrophic forgetting measurement ℱ in Equation <ref> to FL under different data partitions and introduce a relative metric ℛ to measure forgetting as follows: ℛ_k=∑_j=1^k-1 f_j^k/∑_j=1^k-1𝒜_(j,k), where 𝒜_(j,k) is the accuracy on task j after learning task k. For different data partitions, an increased ℛ_k indicates a more serious forgetting of previous tasks. Figure <ref> illustrates the impact of catastrophic forgetting under independent and identically distributed (IID) and different levels of non-independent and identically distributed (non-IID) data partitions. In particular, we employ the Dirichlet distribution, which is widely used in FL <cit.>, to simulate the imbalanced label distribution among different clients. Figure <ref> shows that the accuracy of the model degrades as training proceeds to new tasks in the IID setting. The performance is even worse in the non-IID settings. These results suggest that FCCL faces significant challenge on extreme non-IID settings. We further analyze the forgetting phenomenon in the Figure <ref>. The higher degree of non-IID exacerbates the forgetting phenomenon in FCCL. These empirical studies motivate us to further investigate the catastrophic forgetting issue in FCCL. §.§ Alleviating Forgetting via Global Information To tackle the issue of catastrophic forgetting in the FCCL, we argue utilizing global information to improve performance. The global information can derive from the global model. We explore this approach and empirically demonstrate that the integration of global information can effectively mitigate catastrophic forgetting. Learn from the Global Model Inspired by LwF <cit.>, we leverage the knowledge from the previously trained global model to the current task via Knowledge Distillation (KD), using only the data from the current task. We conduct experiments on CIFAR100 dataset with 5 continual tasks, where each task contains data of 20 classes. We evaluate the accuracy of the model on each previous task after training on all five tasks and report the final accuracy as the average of these results. Table <ref> shows that FCCL without knowledge from the global model (i.e., FedAvg <cit.>) suffers severely from catastrophic forgetting under both IID and non-IID data partitions. Although FedAvg achieves competitive performance on Task 5, it results in 0% accuracy on previously trained tasks (Task 1, 2, and 3). In contrast, FedLwF achieves better accuracy on Tasks 1, 2, 3, and 4 and final accuracy. The experiments demonstrate that the global model can indeed alleviate the forgetting issue. Learn From Global Exemplar In continual learning, an exemplar refers to a sample from a previous task that is stored in a memory buffer for future training. Assuming that data stored in clients are compliant to use for future training, we adopt the idea proposed in iCaRL <cit.> to save a small proportion of prior training data in memory. The selection of this small proportion of data assumes that the data distribution pertaining the old task is known, but this assumption does not hold in FL because clients are unable to know the data distributions of others due to data privacy concerns. Nevertheless, we employ two exemplar selection methods to illustrate the utility of global data: global exemplar and local exemplar. Global exemplar assumes that the server aggregates a subset of data from clients and distribute these data to clients in training (Note that this method does not conform to FL and is only used for comparison). Local exemplar means that each client retains a subset of data from local data in the previous tasks for future training. As shown in Figure <ref>, we show the performance on the current and all previous tasks after learning the current task by using only the new task data, with local exemplar, and with global exemplar. It can be clearly observed that using exemplars can significantly improve the model performance, especially when using global exemplars, which can achieve much higher accuracy than using local exemplars. However, this raises a critical challenge of how to select such exemplars without violating the data privacy. § OUR METHOD: TARGET §.§ Overview To utilize the global information without touching on the real exemplars from clients, we present a method called TARGET (federatTed clAss-continual leaRninG via Exemplar-free disTillation), which utilizes global information without storing any real data. A detailed procedure is provided in Algorithm <ref>. Figure <ref> presents an illustration of TARGET, wherein we synthesize data by inverting the global model θ_k-1 (which was trained on task k-1), followed by combining the synthesized data with real data for local model update on task k. §.§ Server Side: Synthesizing Data for Old Tasks As demonstrated in Figure <ref>, data with global distributional information is more effective in mitigating the problem of catastrophic forgetting. Therefore, we propose a method of synthesizing data that can model the data distribution of the global model, without the need to preserve any client's privacy data. Specifically, given a global (teacher) model θ_k-1 trained on task k-1, we first initialize a generator G and a student model θ_S . We then repeatedly perform the following two training steps (see line 19∼28 in Algorithm <ref>): 1) update the generator by continuously optimizing it to generate data that conforms to the global model distribution; 2) update the student model by distilling knowledge from the teacher model with the synthetic data, hoping that the student model can learn the knowledge of the teacher model sufficiently, which demonstrates the effectiveness of the synthesized data. Data Generation First, we utilize G to generate synthetic data from noise z, we need to ensure that the synthetic data x̂=G(z) is similar to the training dataset. If the synthetic data is similar to the training dataset, their predictions should also be similar. We minimize the cross-entropy (CE) loss on the output of global model θ_k-1(x̂) and random labels ŷ, ℒ_G^ce=CE(θ_k-1(x̂), ŷ). It is expected that the synthetic data generated by generator can be classified into a particular class with a high degree of confidence. However, utilizing only the CE loss will cause the generator overfitting to the synthetic data that are far away from the decision boundary (of the global model) <cit.>, thus failing to deliver a good performance. In order to generate samples that are closer to the decision boundary (of the global model) with better transferability, following previous work <cit.>, we introduce a boundary support loss. Additional weight is given to the data on which the global model and the student model diverge in decision making. ℒ_G^div=-ω KL(θ_k-1(x̂),θ_S(x̂)), and ω=1(θ_k-1(x̂)≠θ_S(x̂)), where KL denotes the Kullback-Leibler (KL) divergence loss, 1(a) output 1 if a is true and output 0 if a is false. By maximizing the KL divergence loss, the generator can generate more representative data. Motivated by <cit.>, in order to further improve the stability of generator training, we introduce Batch Normalization (BN) loss to make synthetic data conform with the batch normalization statistics. ℒ_G^bn=∑_l(||μ_l(x̂)-μ_l||+||σ_l^2(x̂)-σ_l^2||), where μ_l(x̂) and σ_l^2(x̂) are the batch-wise mean and variance estimate of the l-th BN layer of the generator, μ_l and σ_l^2 are the mean and variance of the l-th BN layer of f_S(·). Combining the above losses, we can obtain the loss of the generator as follows, ℒ_G = ℒ_G^ce + λ_1 ℒ_G^div + λ_2 ℒ_G^bn, where λ_1 and λ_2 is the weight for different loss functions. Model Distillation In Equation <ref>, we introduce a student model to assist in training the generator to produce data with greater diversity. A better student model should lead to a better generator. Therefore, after training the generator for several rounds, we subsequently train the student model using the saved synthesized data and the output of the teacher model, using KL loss for knowledge distillation: ℒ_S=KL(θ_k-1(x̂),θ_S(x̂)). In this way, we can train a student model with better performance, and then further use it to update the generator. An ideal synthetic dataset should be able to efficiently enable student θ_S to fully learn the knowledge of teacher model. Note that when the training of the whole process is over (the student model can use the synthesized data to obtain high performance), we only retain the synthetic dataset X_syn and transfer it to the clients, without saving the generator and student model. §.§ Client Side: Update with Global Information On the client side, we can obtain the data synthesized for the previous task X_syn and the real training data of the current task X_local, then we train the local model θ_k for task k on the two datasets at the same time. We showed in Section <ref> that the use of global models and global data can alleviate forgetting. Thus we distill the knowledge of global teacher model and global synthetic data by minimizing the following objective function, ℒ_client = CE(θ_k(x), y)_for current task + α·KL(θ_k-1(x̂), θ_k(x̂))_for previous tasks, where (x,y)∈X_local and (x̂)∈X_syn. The utilization of the distillation loss facilitates efficient transfer of knowledge from the previous task to the current task model. And α is a hyper-parameter that controls the strength of the regularization for the previous tasks. § EXPERIMENTS §.§ Experimental Settings We experiment on two datasets, namely CIFAR-100 <cit.>, and Tiny-ImageNet <cit.> , to evaluate the performance of our proposed approach. To establish the order of the continual tasks, we adopt the widely used protocols <cit.>. Specifically, we divide all classes of each dataset equally into multiple tasks by default, we evenly divide the classes into 5 and 10 tasks to simulate class continual learning scenarios. We employ ResNet18 <cit.> as the backbone for the classification model. To evaluate our approach, we employ the standard continual learning metrics, as used in prior works <cit.>, which include average accuracy across all tasks and a forgetting measure <cit.> (see Equation <ref>). For a fair comparison with the baseline class continual learning methods in the FCCL setting, we implement three types of baselines: 1) Finetune, in which each client simply learns tasks in sequence; 2) FedWeIT <cit.>, a regularization-based method in Federated Continual Learning that maximizes the knowledge transfer between clients; 3) Examples of typical continual learning methods that do not store training data for rehearsal, including EWC <cit.> and LwF <cit.>. In addition, we compare our method with methods that store real training data of old tasks, such as iCaRL <cit.>. We implement these traditional continual learning algorithms in the FCCL scenario and name them as FedEWC, FedLwF, and FedIcaRL. For detailed information on the task configuration, default hyper-parameters and additional experimental results, please refer to the Appendix. §.§ Experiments on CIFAR-100 For CIFAR-100 dataset, we conduct experiments on two sets of tasks consisting of 5 and 10 tasks, respectively. We run the experiment on both IID and non-IID scenarios. For non-IID setting, the Dirichlet parameter is set to 0.5 and 1, NIID(0.5) and NIID(1). Table <ref> shows the final average accuracy of the FL model trained on all tasks, along with the corresponding forgetting measure for each experiment. It is important to emphasize that an optimal method is characterized by high average accuracy and low forgetting measure. Table <ref> indicates that Finetune exhibits the poorest performance when attempting to learn the continuously incoming tasks sequentially, thereby experiencing the issue of catastrophic forgetting. Moreover, we observed that methods based on regularization constraints, such as FedEWC and FedWeIT, were often ineffective in preventing the model from forgetting old tasks due to the lack of available data. On the other hand, we found that distillation-based approaches such as FedLwF and our proposed method were capable of improving the final average accuracy while simultaneously mitigating the issue of catastrophic forgetting. This is due to the transfer of model knowledge learned from the old task to the new task in a distillation manner, enabling the model to prevent catastrophic forgetting. Obviously, we found that applying our proposed method to generate synthetic datasets for the federated models trained on old tasks and subsequently performing model distillation on these synthetic datasets can lead to a substantial improvement in the average accuracy and reduction in the forgetting measure. This observation underscores the ability of our synthetic data to capture the distribution characteristics of historical task data accurately. For example, in IID setting, when partitioning the CIFAR-100 dataset into five tasks, our method achieves an accuracy of 36.31%, which is about 6% higher than the best baseline method FedLwF. It is worth noting that we observed a decrease in the average accuracy of all methods to varying degrees as the number of tasks increased from 5 tasks to 10 tasks due to increased task complexity and the associated forgetting phenomenon. Nonetheless, our proposed method maintains the highest average accuracy and the lowest forgetting measure even under these more demanding conditions. Figure <ref> illustrates the performance of the models trained by various methods on all previously learned tasks after the completion of each task. Specifically, it shows the average accuracy of the model on both the current and previous tasks after the completion of each task (e.g., after learning the second task, the average accuracy of the model on both the first and second tasks is measured). Based on these curves, it is evident that our proposed model outperforms other competing baseline methods in all incremental tasks, regardless of the number of tasks involved. This finding underscores the effectiveness of our approach in facilitating multiple local clients to learn new classes in a streaming manner while mitigating the forgetting problem. §.§ Experiments on Tiny-ImageNet We also evaluated the performance of our proposed method on the more challenging Tiny-ImageNet dataset and obtained similar results to those observed in the CIFAR-100 experiments. Specifically, in Figure <ref>, we present the final average accuracy and forgetting measure for all learned tasks in both IID and non-IID settings for the case of 5 tasks. The Dirichlet parameter is set to {0.05, 0.1, 0.5, 1}. Based on Figure <ref>, it is evident that our proposed method consistently outperforms FedLwF in terms of average accuracy across all data partitions. Moreover, our method demonstrates a significantly lower forgetting measure than FedLwF under both IID and non-IID settings. Our proposed method achieves an average accuracy that is approximately 3% higher than that of FedLwF even in the most challenging scenario (NIID(0.05)). This result highlights the effectiveness of our method in mitigating catastrophic forgetting in the presence of extreme data distributions. §.§ Comparison with Exemplar-based Method In CL, the most successful approaches to alleviate forgetting require extensive replay of previously seen data, which can be problematic when data legality and privacy concerns exist. Among them, iCaRL <cit.> is a classic but unrealistic algorithm that relies on the stored exemplars in addition to the network parameters, and it is intuitive that using old task's real data could be beneficial to alleviate forgetting problem. To further understand the performance gap, we compare our proposed TARGET (which uses synthetic data) with iCaRL (which requires storing exemplars from old task's real data), and study the effects of different exemplar memories on the performance of our method and iCaRL in Figure <ref>. We set the stored exemplar size to {1000, 1500, 2000} for iCaRL, and {2000, 3000} for our method on the CIFAR-100 dataset. The accuracy curve in Figure <ref> represents the average accuracy rate measured over all 100 classes learned by the model during the last learning task. While our method can achieve similar performance to storing 1k real training data by storing 2k synthetic data, it still cannot outperform storing 2k real training data. However, it is worth noting that our method does not require storing any real training data, which can be a significant advantage in scenarios where storing real data is difficult or not allowed due to privacy or legal concerns. Additionally, our method achieves better performance than storing only 1k real training data, which indicates that our synthetic data is effective in mitigating catastrophic forgetting. We observed that when our method stores 3k synthetic data, it achieves better accuracy than when it stores 2k synthetic data. However, surpassing iCaRL in performance with an equal amount of data remains a challenge for our method. How to effectively use fewer synthetic data with more valuable knowledge from previous tasks will be left as a future research direction. §.§ Analysis of Our Method Trade-off between Backward and Forward Transfer. Continual learning presents a challenge in balancing the trade-off between maintaining high accuracy on old tasks (backwards transfer) and achieving high accuracy on new tasks (forward transfer). In Table <ref>, we evenly split the CIFAR-100 dataset into two tasks and test the average accuracy of our proposed method under different values of α. We observe that the trade-off between backward and forward transfer is not always balanced. In order to achieve good backward transfer, a large value of α should be used to prevent the model from forgetting previous tasks and to encourage it to focus more on the old synthetic data. Conversely, to achieve good forward transfer, a small value of α should be used, allowing the model to learn quickly and effectively from new tasks while still maintaining some knowledge from the old tasks. The experimental results in Table <ref> indicates that when the value of α is between 10-15, the model achieves a good balance between accuracy on new tasks and accuracy on old tasks. We alspo partition the CIFAR-100 dataset into 5 equal tasks and test our method's performance on all previous tasks after learning each new task (refer to Appendix). Memory of Synthetic Data. The optimal amount of synthetic data generated for the old task plays a crucial role in determining the final performance of our method. Insufficient synthetic data may not adequately facilitate knowledge transfer from the old tasks, while excessive data generation can lead to increased memory and communication costs. Therefore, determining an appropriate amount of synthetic data that strikes a balance between knowledge transfer and computational cost is critical for the effectiveness and efficiency of our approach. As shown in Figure <ref>, we test our method on CIFAR-100, which is divided into 5 tasks with different data sizes ranging from 2k to 16k. It can be observed that when the data volume is relatively small, such as 2k and 4k, the performance of the model is poor, especially when the data volume is 2k, the testing curve in task 4 shows a later decline. This is because when the data volume is too small, the model is unable to effectively learn knowledge from old tasks. Increasing the data volume to 8k can effectively alleviate the forgetting phenomenon and achieve good performance. However, continuously increasing the data volume to 12k and 16k do not result in significant improvement in the model's performance. It is important to note that the size of the data volume alone does not guarantee the effectiveness of synthetic data in improving machine learning models. The quality and relevance of the synthetic data must also be carefully considered to ensure that it accurately represents the underlying distribution of the real-world data. Visualization on Synthetic Data. To demonstrate the effectiveness of the synthetic data, we present in Figure <ref> the visualization results of the synthesized images generated by our method after the model learns the penultimate task on Tiny-ImageNet (CIFAR-100 in Appendix) for 5 tasks. These data have the potential to efficiently enable the student model to approach the performance of the teacher model rapidly. However, it is worth noting that these data exhibit visual dissimilarities from the actual training data. Analysis on Distillation. Based on the synthetic data, we distill the knowledge of the model trained on old tasks into a student model. The effect of distillation is further demonstrated in Figure <ref>. It can be observed that even without accessing any private training data from clients, our method can quickly distill the student model on the server to approach the performance of the global model. § CONCLUSION In conclusion, this paper introduces a novel method, TARGET (federatTed clAss-continual leaRninG via Exemplar-free disTillation), to alleviate the catastrophic forgetting problem in Federated Class-Continual Learning (FCCL). Unlike all the previous methods, our proposed method leverages global knowledge, without requiring any additional datasets or data from previous tasks, making it ideal for privacy-sensitive scenarios. Extensive experimental results demonstrate the effectiveness of our proposed method in comparison to existing FCCL methods. ieee_fullname
http://arxiv.org/abs/2303.06703v1
20230312165029
Near-field imaging of domain switching in in-operando VO$_{2}$ devices
[ "Sergio Salvía Fernández", "Xing Gao", "Silvia Cassanelli", "Stephan Bron", "Hans Hilgenkamp", "Erik van Heumen" ]
cond-mat.str-el
[ "cond-mat.str-el", "cond-mat.mes-hall" ]
van der Waals - Zeeman Institute, University of Amsterdam, Sciencepark 904, 1098 XH Amsterdam, the Netherlands Faculty of Science and Technology and MESA+ Institute for Nanotechnology, University of Twente, Enschede, the Netherlands van der Waals - Zeeman Institute, University of Amsterdam, Sciencepark 904, 1098 XH Amsterdam, the Netherlands van der Waals - Zeeman Institute, University of Amsterdam, Sciencepark 904, 1098 XH Amsterdam, the Netherlands Faculty of Science and Technology and MESA+ Institute for Nanotechnology, University of Twente, Enschede, the Netherlands e.vanheumen@uva.nl van der Waals - Zeeman Institute, University of Amsterdam, Sciencepark 904, 1098 XH Amsterdam, the Netherlands QuSoft, Science Park 123, 1098 XG Amsterdam, The Netherlands Experimental insight in the nanoscale dynamics underlying switching in novel memristive devices is limited owing to the scarcity of techniques that can probe the electronic structure of these devices. Scattering scanning near-field optical microscopy is a relatively novel approach to probe the optical response of materials with a spatial resolution well below the diffraction limit. We use this non-invasive tool to demonstrate that it provides detailed information on the origin and memory behaviour of ultra-thin films of vanadium dioxide. Simultaneously recorded I(V) characteristics and near-field maps show that discontinuities in the I(V) characteristics arise from the sudden switching of insulating domains to metallic domains. At the threshold voltage, the domains form a continuous current path. The metallic domains persist once the bias voltage is removed, but narrow monoclinic regions appear around the domain boundaries. The key advantage of our approach is that it provides detailed information on the electronic structure at length scales raging from tens of nanometers up to tens of microns and is easily applied under in operando conditions. Near-field imaging of domain switching in in-operando VO_2 devices Erik van Heumen March 30, 2023 ================================================================== Scattering scanning near field optical microscopy (sSNOM) is a versatile, non-invasive probe of the dielectric and plasmonic response of correlated and 2D materials. Based on tapping-mode atomic force microscopy (AFM), an sSNOM can map out optical contrast on a scale of a few tens of nanometers at any wavelength due to the interaction between a polarizable AFM cantilever, an incoming laser and the sample under study. Some of the more recent enhancements of the sSNOM implementation include enabling broadband spectroscopy <cit.>, ultra-fast pump-probe microscopy <cit.> and THz sSNOM <cit.>. An equally important endeavour has been improving the ability to manipulate material parameters in-situ. Examples include manipulating the optical response of a material through changing the carrier concentration <cit.> or exploring phase transitions with variable temperature microscopy <cit.>. Invariably, adding new capabilities to the sSNOM repertoire have led to new insights in the electronic properties of materials on nanometer length scales <cit.>. In this article we map out the near-field optical response in operando on a memristive device as it is driven through switching events. The device is based on a vanadium dioxide thin film, which features a reversible insulator to metal transition. Vanadium dioxide is a poster child for the application of complex oxide materials in a variety of room temperature, energy saving applications <cit.>. As platform for a memristor device, VO_2 has been investigated in a variety of different forms <cit.>. Depending on the details, switching can be as fast as a few 100's of femtoseconds <cit.>. Particular interest has gone to fully strained films <cit.>. These ultra-thin films are fully in the rutile phase in both the insulating and metal phases, which is expected to lead to enhanced durability of devices. Several studies have investigated whether the current driven transition arises from electric field effects <cit.> or from Joule heating <cit.>. It appears that both effects are present to some degree and that the balance depends on detailed properties of the structures studied (film thickness, substrate etcetera). In-operando probing of device switching has provided insight in the parameters determining the switching speed <cit.>, in the role played by film thickness and crack formation <cit.> and in the role played by nanoscale domains in unstrained films <cit.>. Scattering near-field optical microscopy has proven to be a valuable tool for the study of VO_2 crystals and films <cit.>, but to the best of our knowledge has not been applied to the study of in-operando devices or fully strained thin films. In this article we use it to compare the insulator to metal transition (IMT) both as function of temperature and applied electric field with 20 nm spatial resolution. We investigate the heating induced by the CO_2 laser and its effect on the onset of the MIT. We use the sSNOM contrast to elucidate the mesoscopic changes in the electronic structure as a current is applied. Combined with simultaneously measured I(V) characteristics, this enable us to pinpoint the origin of irregular steps in I(V) traces. In our experiments, we combine scattering scanning near-field optical microscopy (sSNOM) with transport measurements. Strained VO_2 films of 13 nm thickness are grown on a single crystal TiO_2 substrate using pulsed laser deposition <cit.>. Subsequently, sets of eight gold contacts are created using photolithography (Fig. <ref>a). Each set consists of two rows of four contacts that are separated by 3 μm, while the rows are separated by 12 μm. This layout allows us to determine the two-point resistance from V_S/I_S by using pairs of contacts or a four-point resistance, R = V_R/I_R, by employing the four contacts on a row. The smaller spacing between contacts on a row is less ideal for the sSNOM experiments, as only a small region between the contacts can be probed. We therefore use two-point I_S(V_S) measurements between a contact in the top and bottom row to simultaneously record the resistance, while scanning the near-field response over a large 15 μm by 10 μm area. We choose this area to be in between the contacts (yellow square in Fig. <ref>a) over which a voltage V_S is applied, so that the current flows approximately perpendicular to the scanning direction. We use the gold contacts as reference for the near-field maps, enabling quantitative comparisons between experiments and eliminating small changes in the CO_2 laser intensity. All sSNOM data is displayed on a color scale labelled as S_2/S_2,Au. In other words, the value of the second harmonic of the demodulated near-field signal in every pixel, is divided by the average value of the corresponding signal measured on a nearby gold contact. Such gold reference images are recorded frequently, e.g. after changing temperature or voltage. AFM topographies are collected as well, showing an atomically smooth surface over the entire field of view with only a few domain lines across the field of view (white, diagonal lines in Fig. <ref>a). The near-field optical response is measured at a wavelength λ = 10.7 μm (116 meV). At this wavelength large optical contrast is expected between metallic and insulating regions <cit.>. X-ray diffraction measurements on the as-deposited VO_2 film indicate that the film was principally in rutile phase. The associated strain is accommodated by monoclinic-phase planar defects representing the domain lines mentioned above. As observed previously, films with thickness below 35 nm are almost completely in the rutile phase <cit.>. The insulator-to-metal transition (IMT) in our films is therefore purely electronic in nature. Figure <ref>b shows that the resistance changes by almost three orders of magnitude with transition temperatures during T_C = 289 K and T_H = 295 K, recorded during cooling (C) and heating (H) respectively. The width of the transition is approximately 2 K, with a hysteresis of 6 K. The application of a voltage while in the insulating state can also trigger the IMT <cit.>, as shown in Fig. <ref>c. Starting from a temperature below the IMT (293 K in Fig. <ref>c), the system is in a high resistance state until a threshold voltage is reached. Beyond this threshold the current increases hundredfold, signalling the formation of a metallic state. We will call this the forming cycle. In subsequent I(V) cycles the metallic state persists, as evidenced by the distinctly different cycles 2 and 3 in Fig. <ref>c. In these subsequent cycles small steps in current at particular voltages are also present, which are close to reproducible from cycle to cycle. The insulating state can be restored by cooling below T_C. One of the interesting aspects of VO_2 is that, besides dc electric fields, the IMT can be induced through other external knobs such as strain <cit.> and ultrafast light pulses <cit.>. This also plays an important role in our experiments as demonstrated in Fig. <ref>d. The sSNOM data is taken at T = 292 K close to T_H in the insulating state. Indeed, a large part of the field of view (FOV) has a low near-field amplitude, indicative of the insulating state <cit.>. In the middle of the scan we observe that the CO_2 laser used in the experiment is also capable of inducing the IMT. This can be seen by the sudden switching of a domain (indicated by a yellow arrow). Our experimental geometry allows us to determine the laser-induced heating by effectively using the induced change in resistivity as thermometer. For this, we start by cooling the sample to 283 K and then slowly heat the film to a selected temperature. With the AFM engaged, we turn the CO_2 laser `on' and `off' with a flip mounted mirror. The effective temperature increase in the film can now be estimated by monitoring the change in resistivity that is measured in the dark and illuminated state. To convert resistivity to temperature readings, we invert the resistivity data of Fig. <ref>b at the temperatures shown by dark-red solid circles. Figure <ref>e shows the resulting Δ T traces as function of time. Depending on the starting temperature the effect of the laser is to increase the temperature of the film by as much as 0.6 K for the lowest measured temperature. The magnitude of Δ T decreases with increasing starting temperature. This is likely related to the changes in absorption coefficient, specific heat and thermal conductivity that take place near the IMT. We notice that close to T_H the resistivity does not return to the original value, resulting in a finite Δ T also in the `off' state. This can be related to the switching of a large domain to the metallic state induced by the laser, similar to what is observed in Fig. <ref>d. As we will follow the IMT using sSNOM and would like to exclude sudden switching resulting from laser heating, we carry out all subsequent experiments while cooling from the metallic state. For every measurement, we set the temperature and record the two-point resistance between contacts at the top and bottom of the image. The V_S/I_S values obtained in this way are shown in Fig. <ref>c as yellow squares. Note that they cannot be directly compared to the four-point resistance (solid lines) since the two-point resistance probes a different area of the surface. Figure <ref> shows the main experimental result of this paper: sSNOM images recorded as function of temperature (top row) and as function of applied voltage V_S (bottom row). We first focus on the evolution of the near-field signal, recorded while cooling down from 343 K. Initially, the near-field response is fully metallic, but near the phase transition, some domains start to become insulating. As has been observed previously <cit.>, thin films often consist of domains that can have slightly different critical temperatures. In films with a thickness below 15 nm, the domains can become very large and even occupy the whole film. The 294 K panel shows an almost completely metallic film (corresponding to yellow in our color scale), with thin lines (dark) that follow the white domain lines observed in the topography of Fig. <ref>a. We note again that these lines are thought to be VO_2 in a monoclinic phase. At 288.5 K meandering, insulating filaments emerge that creep in from the domain boundary. These filaments permeate the domain as temperature is further decreased. One novel aspect compared to previous experiments <cit.> is that our films consist of large single crystalline domains that are fully strained and thus already in the rutile phase. The transition within each domain is therefore purely electronic and this reflects itself in only weak pinning of the nucleation sites of the filaments. As the experiment is repeated, the formation of filaments starts from different points on the boundary. In the bottom row panels of Fig. <ref> we contrast the temperature dependence of the near-field signal with the voltage dependence of the signal. As starting point we first cool the film to 283 K and subsequently heat the film to 293.2 K, two degrees below T_H. Without applying any voltage, we observe that some domains are already metallic (panel labelled 0.0 V). Comparing the V_S = 0 V data with the data presented in the top row of Fig. <ref>, we note that the formation of the metallic state is reversed as compared to the formation of the insulating state. One can still see insulating filaments within the domain that are absorbed in the metallic matrix as the voltage is increased. As we increase the voltage from V_S = 0 V to V_S = 0.8 V, we observe two small steps in the current that flows between the contacts. This change in current appears to correspond to the switching of two complete domains: one in the middle of our field of view and one on the far left side of it. Time domain reflectivity experiments suggest that the formation of filaments within a domain can take place on microsecond time scales <cit.>, which is too fast for our scanning method to register and we consequently only see the end state in which the domain is fully metallic. While performing the sSNOM measurements, we noticed a large step in current is observed at V_S = 1.15 V, at a lower threshold voltage than the step seen in Fig. <ref>c. This offset in threshold voltage is due to the additional heating induced by the CO_2 laser as can be verified by repeating the experiment with the laser in the `off' state. In the V_S = 1.3 V data presented in Fig. <ref> we see that all domains in our field of view are fully in the metallic state, with the exception of a few narrow domains in the top right corner. We also note that the average intensity of the domains increases and that insulating filaments within a domain have disappeared. Unexpectedly, only a small change is observed when the voltage is set to zero, V_S = 0* V. The most notable change is that the lines between domains become more prominent and increase in width. However, the average sSNOM intensity within domains hardly decreases. We monitored the persistence of this state over time using a small probing current (1 μA). We observed no significant change in the resistivity over a 17 hour period in this way. We have therefore clearly identified the source for the forming effect in the first cycle: starting from a mostly insulating phase 'low' state (0.0 V), metallic domains form upon application of a voltage (0.8 V). As the voltage increases, more domains become conducting and the device changes to a 'high' state when all domains between the contacts are in the metallic state (1.2 - 1.3 V). As the device is turned off, the interior of the domains remain metallic while the domains are isolated from each other through narrow insulating regions. When we go through a second cycle, these insulating regions will again become metallic giving rise to the small steps seen in cycle 2 and 3 in Fig. <ref>c). A more quantitative picture of the changes underlying the I(V) characteristics can be obtained by plotting the intensity variation within a field of view in a histogram representation. Fig. <ref>a shows the histograms for the (extended) series of measurements presented in the bottom row of Fig. <ref>. At V_S = 0 V, most of the domains are insulating and this is represented by a large, sharp peak in the histogram with average signal intensity S_2/S_2,Au ≈ 0.02. A broader peak centred around S_2/S_2,Au ≈ 0.25 can also be seen and corresponds to the metallic domains. As V_S is increased, some weight shifts from the S_2/S_2,Au ≈ 0.02 peak to S_2/S_2,Au ≈ 0.25 until the threshold voltage V_S=1.15 is reached. As can be seen from the histogram, at V_S = 1.2 V the maximum around S_2/S_2,Au ≈ 0.25 suddenly shifts to higher signal values (S_2/S_2,Au = 0.35) and the sharp peak at S_2/S_2,Au = 0.02 is strongly reduced. Finally at V_S = 1.3 V the remaining insulating regions around the domain lines turn metallic and the S_2/S_2,Au ≈ 0.02 peak disappears. When the voltage is set to V_S = 0, a small signal at S_2/S_2,Au ≈ 0.02 reappears, signalling a small contribution from the insulating phase. The mesoscopic transport behaviour of the film can be largely predicted by the changes taking place in the histograms. Figure <ref>b compares relative changes in the insulating area at a particular voltage to the insulating area at V_S = 0 V (e.g. A_ins.(V_S)/A_ins.(V_S = 0)), with the relative change in resistance (R(V_S)/R(V_S = 0). To obtain the relative change in insulating area, A_ins.(V_S), we integrate the histograms of panel <ref>a up to S_2/S_Au = 0.1. As Fig. <ref>b shows, the changes in resistance are accompanied by distinct changes in the total area of insulating domains. Small differences (for example, the step in resistance around V_S = 0.8 V) are due to the fact that some domains that contribute to the total current path fall outside our field of view. Structural effects have little influence on the mesoscopic properties of the film, as demonstrated in Fig. <ref>c. Here we show a partial overlay of near-field (right half) on the topography (left half) under the application of V_S = 5 V at 292.5 K. At such large applied voltages, which were applied only as our final measurements, it is sometimes seen that the film partly detaches from the underlying substrate. Despite the 8 nm height variations between some domains, we observed only a weak impact on the resistance or the near-field signal. The dominant effect underlying the memristive device in our experiments, is therefore consistent with Joule heating <cit.>. In contrast to earlier work <cit.>, we find that the current flow between contacts selectively heats domains above their transition temperature. This points to small variations of T_H in individual domains as has been observed previously <cit.>. Although we cannot completely exclude electric field effects, we note that reversing the sign of the voltage resulted in the same overall behaviour of the current and near-field signal. It has been pointed out previously that strain release in thicker films will lead to domain formation and that domain boundaries can become monoclinic or will have lower strain as compared to the larger domain areas <cit.>. Our direct measurement of the local optical response shows that these regions are quite sharp (Fig. <ref>d). Above the IMT, the data taken at 294 K shows large metallic domains separated by domain lines from which a narrow insulating region extends. The spatial resolution in our experiments is approximately 20 nm, enabling us to determine that the insulating regions along the domain lines are 100 - 300 nm wide. Interestingly, the physical domain lines observed in topography are much sharper than this as Fig.'s <ref>a and <ref>c demonstrate. As temperature is increased, these regions eventually turn metallic as well. In areas of the film with a large domain line density, the intermediate area has a distinctly higher critical temperature as can be clearly seen in the 294 K data presented in Fig. <ref> (top right corner). Similarly, the small, reproducible steps in cycle 2 and cycle 3 (Fig. <ref>d), are a result of the switching of insulating domain lines separating the large metallic domains. To conclude, we note that the near-field signal near the insulating strips is a bit lower, indicating perhaps weak effects of reduced strain within the domain itself. To summarise, nanoscale near-field imaging of in operando devices is a feasible and promising new tool to probe the connection between microscopic electronic properties and mesoscopic transport. When applied to rutile VO_2 devices, it shows that a memory effect is created by persistent switching of large domains. Our 20 nm spatial resolution allows us to demonstrate that I(V) characteristic can be accurately explained from the behaviour of 100 - 300 nm wide insulating strips that are connected to domain boundaries in the film.
http://arxiv.org/abs/2303.07137v1
20230313140514
Convergence proof for the GenCol algorithm in the case of two-marginal optimal transport
[ "Gero Friesecke", "Maximilian Penka" ]
math.NA
[ "math.NA", "cs.NA", "math.OC" ]
Transferable Deep Learning Power System Short-Term Voltage Stability Assessment with Physics-Informed Topological Feature Engineering Zijian Feng, Xin Chen*, Zijian Lv, Peiyuan Sun, Kai Wu, This work was supported in part by the National Natural Science Foundation of China (Grant No.21773182 (B030103)) and the HPC Platform, Xi'an Jiaotong University. Zijian Feng (e-mail: KenFeng@stu.xjtu.edu.cn), Xin Chen (Corresponding author, e-mail: xin.chen.nj@xjtu.edu.cn), and Zijian Lv (e-mail: jtlzj271828@stu.xjtu.edu.cn) are with the School of Electrical Engineering and the Center of Nanomaterials for Renewable Energy, State Key Laboratory of Electrical Insulation and Power Equipment, School of Electrical Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China. Peiyuan Sun (e-mail:spy2018@stu.xjtu.edu.cn) is with the School of Electrical Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China. Kai Wu (e-mail: wukai@mail.xjtu.edu.cn.) is with State Key Laboratory of Electrical Insulation and Power Equipment, School of Electrical Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China. March 30, 2023 ========================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================= The recently introduced Genetic Column Generation (GenCol) algorithm has been numerically observed to efficiently and accurately compute high-dimensional optimal transport plans for general multi-marginal problems, but theoretical results on the algorithm have hitherto been lacking. The algorithm solves the OT linear program on a dynamically updated low-dimensional submanifold consisting of sparse plans. The submanifold dimension exceeds the sparse support of optimal plans only by a fixed factor β. Here we prove that for β≥ 2 and in the two-marginal case, GenCol always converges to an exact solution, for arbitrary costs and marginals. The proof relies on the concept of c-cyclical monotonicity. As an offshoot, GenCol rigorously reduces the data complexity of numerically solving two-marginal OT problems from O(ℓ^2) to O(ℓ) without any loss in accuracy, where ℓ is the number of discretization points for a single marginal. § INTRODUCTION Large-scale discrete optimal transport problems are difficult to solve numerically because the full problem has a huge number of possible configurations. At the same time it is guaranteed that a rather sparse solution exists, a particularly well known manifestation in continuous OT being Brenier's theorem. This effect is especially important in the multi-marginal case, but occurs already in the classical two-marginal case when the support size of both marginals is large. In recent years, computational strategies for optimal transport were driven by the idea of approximating the problem by adding an entropy-like penalty term. This transforms the problem into a strictly convex and more robust optimization problem, which can be solved in short time using the Sinkhorn algorithm. In theory this approach, called entropic optimal transport (EOT), is also valid for two-marginal problems in high dimension or general multi-marginal problem. Unfortunately, this approach corresponds to smearing out the transport plan, yielding a huge amount of configurations in its support: The true optimizer of the EOT problem has the same support as the full product measure of its marginals. Thus the support size scales polynomially in the support size of the marginals, and exponentially in the number of marginals. Recent approaches alleviate this problem by truncation or multi-scale methods <cit.> or – most recently – low-rank approximation <cit.>. An alternative approach was proposed in <cit.>. Rather than looking for further refinements of interior point methods, which struggle to solve huge programs, one goes back to the original linear program, and exploits that the OT program possess extremely sparse solutions. If the k-th marginal is supported on ℓ_k points, there exist optimal plans with support size less than the sum of the ℓ_k, rather than their product <cit.>. The standard approach to solve linear programs is the simplex algorithm and its descendants, most promisingly Column Generation. The latter tackles large LPs by iteratively solving smaller (“reduced”) problems on a dynamically evolving subset of all variables. In optimal transport, every variable of the LP corresponds to a possible configuration in the product of the marginal domains, so Column Generation corresponds to solving the OT problem on a subset of the product of the marginal domains. Thus Column Generation can in principle exploit sparsity and find the exact optimal plan of the full problem, provided a sparse superset of its support is known. But in practice such a superset has to be found. There are two obstructions for doing so. First, in Column Generation the generation of new variables is originally done by solving a second optimization problem, the so called pricing problem. Unfortunately the pricing problem for large problems is still expensive; in the multi-marginal case it has been proven to be NP hard <cit.>. For LPs of moderate size this problem can be alleviated by generating new configurations at random, but in this randomized version one needs to try many configurations, again leading to an unacceptable slowdown for large problems. Second, the algorithm increases the size of the LP in each iteration step, making the iterations slower and slower and lacking any convergence guarantee until the size has reached the original LP size that one wanted to avoid! For these reasons, <cit.> invented * a genetic search rule, restricting the number of possible proposals from all configurations to an update of one entry in one active configuration * a tail-clearing rule which discards those configurations which have not been used the longest, to keep the overall support size at a fixed small multiple of the size of sparse optimizers. The resulting algorithm, which was termed Genetic Column Generation (GenCol), exhibited in several application examples of interest a spectacularly accelerated convergence to global optimizers. A theoretical explanation has hitherto been lacking. In this paper we present a rigorous proof of convergence to a global optimizer in the case of two marginals. The fact that GenCol cannot get stuck in a local optimizer is far from obvious since the upper bound on the support size makes the reduced problem nonconvex. The proof relies on the concept of c-cyclical monotonicity which is well known in the theory of optimal transport. It finds here a beautiful application and yields an intuitive understanding of the algorithm. We close with a counterexample which shows that for more than two marginals and general costs, the algorithm – at least with its original one-entry-at-a-time updating rule – can get stuck in a local minimizer. The investigation of sufficient criteria on costs and updating rules for convergence in the multi-marginal case is left to future work. § C-CYCLICAL MONOTONICITY Given two probability measures μ_1,μ_2 on Polish spaces X respectively Y, the optimal transport problem is the following: minimize ℱ[γ] := ∫_X× Y c(x,y) dγ(x,y) over γ∈(X× Y) subject to γ(A× Y) = μ_1(A) for all measurable A ⊂ X γ(X× B) = μ_2(B) for all measurable B ⊂ Y. where denotes the set of probability measures. Solutions to the constraints are called transport plans. Optimality of a transport plan γ can be characterized by a condition on its support, called c-cyclical monotonicity. [see e.g. <cit.>, Def. 1.36] Given a function c X× Y →∪{+∞}, we say that a set Γ⊂ X × Y is c-cyclically monotone (c-CM) if for every k∈, every permutation σ: {1,…,k}→{1,…,k}, and every finite set of points {(x_1,y_1),...,(x_k,y_k)}⊂Γ we have ∑_i=1^k c(x_i,y_i) ≤∑_i=1^k c(x_i,y_σ(i)). While it is easy to see (at least in the discrete case) that this is a necessary condition on the support of an optimal plan, it turns out to also be sufficient. Suppose X and Y are Polish spaces and c X× Y → is uniformly continuous and bounded. Given γ∈𝒫(X× Y), if supp(γ) is c-CM then γ is an optimal transport plan between its marginals μ_1 = (π_1)_♯γ and μ_2 = (π_2)_♯γ for the cost c. § SPARSITY OF OPTIMAL PLANS The support of optimal transport plans is typically a much smaller set than the product of the supports of the marginals. Rather than going into classical variants for convex costs like Brenier's theorem and their interesting relation to c-cyclical monotonicity, we focus directly on a discrete version for general costs which informed the design of the GenCol algorithm and is useful for its analysis. For X and Y discrete, |X| = ℓ_1, |Y| = ℓ_2, the objective function ℱ becomes a finite sum and the OT problem a linear program in standard form: OTminimize ⟨ c,γ⟩ := ∑_(x,y) ∈ X× Y c(x,y)γ(x,y) over γ: X× Y → [0,∞) subject to γ∈Π(μ_1,μ_2) :⇔∑_y ∈ Yγ(x_0,y) = μ_1(x_0) ∀ x_0 ∈ X ∑_x ∈ Xγ(x,y_0) = μ_2(y_0) ∀ y_0 ∈ Y, where the measures μ_1,μ_2 and γ were identified with their densities with respect to the counting measures on their domains. Suppose X and Y are discrete with |X|=ℓ_1, |Y|=ℓ_2. Then any extreme point of the Kantorovich polytope Π(μ_1,μ_2) is supported on at most ℓ_1+ℓ_2-1 points. In particular, for any cost c : X× Y→ and any marginals, the OT problem (<ref>) possesses an optimizer supported on at most ℓ_1+ℓ_2-1 points. This can be deduced from well known results on extremal solutions in linear programming. For a self-contained and simple proof using geometry of convex polytopes see <cit.>. § GENETIC COLUMN GENERATION ALGORITHM The algorithm doesn't deal with the full OT problem but only its restrictions to certain subsets of X× Y whose size is of the order of the support size of optimizers from Theorem <ref>. We call a subset Ω⊂ X× Y a feasible subset of configurations if Π(μ,ν) ∩{γ : (γ) ⊂Ω} is non-empty. Given such a subset, we define the reduced problem to be ROTminimize ⟨ c,γ⟩ over γ: X× Y → [0,∞) subject to γ∈Π(μ_1,μ_2) and (γ)⊆Ω. Because γ is a discrete measure, (γ) is the set of all (x,y)∈ X× Y with γ(x,y)≠ 0. Thus the reduced problem amounts to reducing the variables in the linear program to the values of γ on configurations in Ω (and setting the values outside Ω to zero), and not changing the constraints. As the values outside Ω no longer need to be considered, this shrinks the size of the program to that of Ω. Before we come to genetic column generation, let us describe classical column generation. Unlike genetic column generation it does not restrict the size of Ω, and works as follows. Given a feasible initial set Ω, the first step is to solve the reduced problem. The second step is to generate a new configuration (x',y') ∉Ω which is added to Ω and improves the solution. The two steps are iterated until no more improving configurations exist. The second step relies on the dual of the reduced problem (<ref>), D-ROT*maximize ⟨μ_1,u_1⟩ + ⟨μ_2,u_2⟩ over u_1 : X →, u_2 : Y → such that u_1(x) + u_2(y) ≤ c(x,y) ∀ (x,y) ∈Ω. In comparison, the dual of the full problem (<ref>) has the same objective function, but more constraints: D-OT*maximize ⟨μ_1,u_1⟩ + ⟨μ_2,u_2⟩ over u_1 : X →, u_2 : Y → such that u_1(x) + u_2(y) ≤ c(x,y) ∀ (x,y) ∈ X× Y. Hence every dual optimizer for the full problem is admissible in the reduced problem (<ref>), but a dual optimizer for the reduced problem might violate a constraint of the full problem (<ref>). If, however, a dual optimizer for the reduced problem is admissible for (<ref>) then it is already optimal for (<ref>): Let (γ^⋆,(u_1^⋆,u_2^⋆)) be a pair of optimizers for the reduced problems (<ref>, <ref>). If (u_1^⋆,u_2^⋆) is admissible for the dual of the full problem (<ref>), then γ^⋆ is optimal for (<ref>). For a proof of this classical result translated into the present context and language of OT see <cit.>. Hence new configurations (x',y')∉Ω can be sought by checking if they violate the dual constraint of the full problem (<ref>), i.e. if they satisfy the following acceptance criterion: Acc u_1^⋆(x') + u_2^⋆(y') - c(x',y') > 0. Due to economic interpretations this difference is called gain. In classical column generation this gain is maximized over all configurations, constituting the so-called pricing problem. The following difficulties arise when applying column generation to large LPs, as already pointed out in the Introduction. (i) The pricing problem is too expensive; and the empirical strategy of instead generating configurations (x',y')∉Ω independently at random until one of them satisfies (<ref>) requires too many trials, especially in the multi-marginal case. (ii) Regardless of how one searches for new configurations, the subset Ω grows in each iteration step, making the iterations slower and slower and lacking any convergence guarantee until the size has reached the original LP size that one wanted to avoid. Genetic column generation <cit.> tackles these difficulties as follows. (i) Motivated by machine learning protocols in unsupervised learning, the algorithm first proposes new configurations originating from currently active configurations, i.e. (x,y) ∈supp(γ) ⊂Ω: one picks an active configuration at random (“parent”), then proposes an offspring (“child”) by changing one entry of the parent configuration. The offspring is then accepted if its gain is positive. The rough analogy to ML is that the proposal step mimics an SGD step and the acceptance mimics learning from an adversary (in this case, the current dual). In fact, the proposal step in the first version of GenCol was even more similar to SGD, in that entries were points on a regular grid and children were proposed from neighbouring sites of parents. (ii) The size of Ω is restricted to remain of the order of the support size of optimizers from Theorem <ref>. More precisely, one introduces a hyperparameter β > 1 and a tail clearing rule which guarantees that |Ω| ≤β (ℓ_1+ℓ_2). Tail clearing means that whenever, after accepting a child, Ω violates (<ref>), the oldest unused configurations are removed. In practice, one chooses 3 ≲β≲ 5 and discards a batch of ℓ_1+ℓ_2 configurations whenever |Ω| exceeds β·(ℓ_1+ℓ_2). The hyperparameter β does not depend on the sizes ℓ_1 and ℓ_2 of X and Y. See Algorithm <ref> for a summary of the algorithm. The extension to multi-marginal problems is straightforward. In this case, one has N marginals μ_1,…,μ_N on discrete spaces X_1,…,X_N of sizes ℓ_1,…, ℓ_N, plans are nonnegative functions on the product space X_1×…× X_N to [0,∞), and one seeks to MMOTminimize ⟨ c,γ⟩ := ∑_(x_1,...,x_N) ∈ X_1× ... × X_N c(x_1,...,x_N)γ(x_1,...,x_N) subject to γ∈Π(μ_1,...,μ_N). This problem possesses an optimizer γ : X_1× ... × X_N → supported on at most ℓ_1+...+ℓ_N-1 points. Sampling of new configurations works as before, i.e. one picks an active configuration (parent) and proposes a child by changing one entry of the parent, which is accepted if the gain ∑_i=1^N u_i(x_i)-c(x_1,...,x_N) is positive, where u=(u_1,...,u_N), u_i : X_i→, is the current dual solution. Tail clearing is carried out whenever |Ω| exceeds β· (ℓ_1+...+ℓ_N). See <cit.> for the details. In practice this turned out to be an extremely fast and accurate method to solve high-dimensional OT problems. In various test examples with up to ∼ 10^30 variables, it converged to a global optimum of the full problem using active sets of only a few thousand unknowns. Besides the question why the algorithm is so efficient, it is not clear why it should find a global optimum at all. Can it happen – due to the genetic updating and the tail clearing – that it instead gets stuck in a local minimum? The answer is No in the two-marginal case, as shown in the next section. Note that in this case every configuration (x',y') ∉Ω which belongs to the product of the supports of μ_1 and μ_2 is proposed by Algorithm <ref> with strictly positive probability, so the only question is if the tail-clearing prevents the algorithm from finding the optimal set of configurations. § CONVERGENCE Before giving the proof of convergence, we must specify line 2 (solving the reduced problem and its dual) and line 4 (sample a parent and a child) of Algorithm <ref> more precisely. Line 2. First, in degenerate cases optimal plans may not be unique, so for convergence it is mandatory that γ^* in Algorithm <ref> is updated only if the previous plan is no longer minimizing. Second, we require the linear programming solver to provide a solution γ^* which satisfies the support size bound from Theorem <ref>. If one uses the simplex algorithm with a warm start, both these requirements are automatically guaranteed. Line 4. Second, to rigorously implement the second stopping criterion in line 5, one does not sample parents and children in each trial independently, but draws random permutations covering all possibilities and then tries them one after another until the stopping criterion is satisfied. Let X and Y be discrete with |X|=ℓ_1, |Y|=ℓ_2, let c : X× Y→ be any cost, let μ_1∈(X), μ_2∈(Y) be any marginals, and let Ω⊂ X × Y be any feasible subset of configurations. For any optimal solution γ^⋆ for the reduced problem (<ref>) which is an extreme point of the Kantorovich polytope and which is not optimal for the full problem (<ref>), the GenCol proposal and acceptance routine (lines 2–9 of Algorithm <ref>) as detailed above finds with positive probability in subsequent steps a superset Ω̃⊃Ω, whose size exceeds that of Ω by at most ℓ_1+ℓ_2-1 elements, which reduces the total cost: min_γ : (γ) ⊆Ω̃ℱ[γ] < min_γ : (γ) ⊆Ωℱ[γ]. Consider an optimal solution (γ^0,u^0) for the reduced problem (<ref>) with γ^0 extremal which is not optimal for the full problem. By Theorem <ref> γ^0 is sparse with at most ℓ_1+ℓ_2-1 non-zero entries (active configurations). In the following we write u^0=(u^0_1,u^0_2). Due to complementary slackness u^0_1(x) + u^0_2(y) - c(x,y) = 0 ∀ (x,y) ∈(γ^0). Because γ^0 is not optimal for the full problem (<ref>), by Theorem <ref> there exists a family Γ = {(x_1,y_1),...,(x_k,y_k)}⊂(γ^0) and a permutation σ∈ S_k such that ∑_i=1^k c(x_i,y_i) > ∑_i=1^k c(x_i,y_σ(i)). Note that the bound |(γ)| ≤ℓ_1+ℓ_2-1 yields the upper bound k ≤ℓ_1+ℓ_2-1. Because {(x_1,y_1),...,(x_k,y_k)}⊂(γ^0), complementary slackness implies equation1 u^0_1(x_1) + u^0_2(y_1) - c(x_1,y_1) = 0 equation.1 ⋮ u^0_1(x_k) + u^0_2(y_k) - c(x_k,y_k) = 0equation.k. After summation, ∑_i=1^k (u^0_1(x_i) + u^0_2(y_i)) - ∑_i=1^kc(x_i,y_i)_> ∑_i=1^k c(x_i,y_σ(i)) = 0 ⟹ ∑_i=1^k( u^0_1(x_i) + u^0_2(y_σ(i)) - c(x_i,y_σ(i))) > 0 ⟹ max_i∈{1,...,k}{u^0_1(x_i) + u^0_2(y_σ(i)) - c(x_i,y_σ(i)) } > 0 . Because, in the two-marginal case, all configurations (x',y')∉Ω are proposed by GenCol with positive probability, the element of Γ where the maximum in (<ref>) is realized, let us call it (x_i_1,y_σ(i_1)), is proposed with positive probability, and accepted. In the next step the reduced OT problem is resolved on Ω extended by this element, yielding a new optimal pair (γ^1,(u_1^1,u_2^1)) and two cases. Case 1: The optimal plan changes: γ^1 ≠γ^0. In that case, due to the rule that the plan only changes when it must, the optimal cost decreases and we are done. Case 2: The optimal plan does not change, γ^1 = γ^0. But the dual solution (u^1_1,u^1_2) must have changed. Because γ^1 = γ^0, we have (x_1,y_1),…,(x_k,y_k) ∈(γ^1) and eqs. (<ref>) - (<ref>) still hold true with u^0_1, u^0_2 replaced by u^1_1, u^1_2. But now, since u^1 must satisfy the dual constraints on the enlarged configuration set, we also have u^1_1(x_i_1) + u^1_2(y_σ(i_1)) - c(x_i_1,y_σ(i_1)) ≤ 0. Since eqs. (<ref>)–(<ref>) all are also still true with u^0_1, u^0_2 replaced by u^1_1, u^1_2, we conclude that max_i∈{1,...,k}\{i_1}{u^1_1(x_i) + u^1_2(y_σ(i)) - c(x_i,y_σ(i))} > 0. But in the next step, again either the optimal plan changes or the element of Γ realizing the maximum in (<ref>) is proposed with positive probability and accepted, and so on. After k enlargement steps of Ω, either a change of optimal plan has occurred in some step, or all elements of Γ have been accepted with positive probability. But then Case 1 occurs, since the mass min{γ^0(x_i,y_i), i = 1,…,k} > 0 can be moved from {(x_i,y_i)}_i=1^k to {(x_i,y_σ(i)}_i=1^k, decreasing the total cost. One can alternatively see that Case 1 occurs once all elements of Γ have been accepted by considering the dual solution u^k: otherwise we would have u_1^k(x_i) + u_2^k(y_σ(i)) - c(x_i,y_σ(i)) ≤ 0 ∀ i∈{1,...,k}, but on the other hand (<ref>) must hold with u^0_1, u^0_2 replaced by u^k_1, u^k_2, a contradiction. Convergence of Algorithm <ref> now follows as an easy consequence. Suppose X and Y are discrete spaces of finite cardinality, and the hyperparameter β is ≥ 2. For any marginals, any cost function, and any feasible initial set Ω⊂ X× Y, GenCol converges with probability 1 to an exact solution of the OT problem (<ref>). The total cost is monotonically decreasing. Moreover X× Y is finite and every non-optimal plan is improved with positive probability: Since β≥ 2, after a tail-clearing the algorithm allows to add more than ℓ_1+ℓ_2-1 configurations, and by Theorem <ref> this suffices to find a plan with lower cost. Therefore the algorithm converges with probability 1. Remarks. * Note the generality of the cost function. * Shorter families are found with higher probability. * Longer tails increase the probability to find also long chains, but slow down the simplex algorithm to solve the LP. In practice, a value slightly larger than the minimal value from theory (e.g. β=3) works well, and was in fact used on empirical grounds in <cit.>. § COUNTEREXAMPLE FOR THREE MARGINALS The proof in the previous section cannot simply be transferred to the multi-marginal case, at least not for the original updating rule proposed in <cit.> where children differ from an active configuration by only 1 entry. We present a simple counterexample. Let X_1=X_2=X_3 = {1,2,3} and N=3. Let further μ_1 = μ_2 = μ_3 := ∑_x=1^31/3δ_x. The cost function is chosen to be c(x_1,x_2,x_3) := 0 x_1 = x_2 = x_3 1 x_1 ≠ x_2 x_1 ≠ x_3 x_2 ≠ x_3 2 else. Then the transport plan γ_0 = 1/3(δ_(1,2,3)+δ_(2,3,1)+δ_(3,1,2)) is a stationary state for GenCol. Obviously the global optimal plan is γ^⋆ = 1/3(δ_(1,1,1)+δ_(2,2,2)+δ_(3,3,3)). GenCol proposes new configurations by updating one entry of one active configuration. Independently of the dual solution, all possible configurations that can be proposed are (1,2,2), (1,3,3), (2,2,3), (3,2,3), (2,1,1), (2,2,1), (2,3,2), (2,3,3), (1,3,1), (3,3,1), (3,2,2), (3,3,2), (3,1,1), (3,1,3), (1,1,2), (2,1,2). The cost for all of them is 2, while the cost for all active configurations in γ_0 is only 1. Hence for any subset of the configurations listed above added to the active configurations in γ_0, the optimal plan is again γ_0. Therefore the current solution γ_0 never changes and γ^* cannot be reached. The example is designed so that one would have to update two entries of an active configuration to reduce the cost. Any update in just one entry increases the cost. Some interesting properties of this example are: * The problem is symmetric (i.e., all marginals are equal and the cost is symmetric in its variables), like the Coulomb OT problem arising in electronic structure. * One can replace {1,2,3} by a convex independent set (i.e. a set all of whose points are extreme points), in which case the cost c can even be chosen convex. It is an interesting open problem whether modified updating rules exist for the multi-marginal case that maintain sparsity yet rigorously avoid non-minimizing stationary states, at least for costs of practical interest like the Coulomb cost or the Wasserstein barycenter cost.
http://arxiv.org/abs/2303.07042v1
20230313120540
Harmonic Field-based Provable Exploration of 3D Indoor Environments
[ "Raksi Kopo", "Charalampos P. Bechlioulis", "Kostas J. Kyriakopoulos" ]
cs.RO
[ "cs.RO" ]
Bayesian Approach to Micromechanical Parameter Identification Using Integrated Digital Image Correlation [ Received; accepted ======================================================================================================== empty empty This work presents a safe and efficient methodology for autonomous indoor exploration with aerial robots using Harmonic Potential Fields (HPF). The challenge of applying HPF in complex 3D environments rests on high computational load involved in solving the Laplace equation. To address this issue, the proposed solution utilizes the Fast Multiple accelerated Boundary Element Method with boundary values controlled to ensure both safety and convergence. The methodology is validated through simulations that demonstrate its efficiency, safety and convergence. § INTRODUCTION Autonomous robotic exploration has a range of useful applications, including search and rescue missions, infrastructure inspection, and mapping. Robots operating autonomously can reduce the risks and costs associated with human exploration in hazardous and remote environments. Several methods have been developed aiming to address the autonomous exploration problem. A popular approach is maximizing the expected information gain <cit.>. In general, this involves finding the control action that minimizes a utility function, which encompasses the map's uncertainty, the uncertainty in the robot's position, and possibly a type of cost for executing the control action, usually the path length. In <cit.> Rapidly Random exploring Trees (RRT) path planning is introduced in information gain exploration. The authors in <cit.> use Frontier-based Exploration planning <cit.> for global exploration and the exploration method in <cit.> to improve the performance of the latter in larger environments. An alternative approach utilizes Artificial Potential Fields (APF) in exploration. Compared to RRTs, which ensure probabilistic exploration, meaning full exploration given infinite time, APFs can ensure complete exploration if they are free of local minima. Furthermore, APFs can produce smooth trajectories and are inherently reactive. The two main approaches in constructing free of local minima APF are Navigation Functions <cit.> and Harmonic Potential Fields <cit.>. The former requires parameter tuning, while the latter is inherently free of local minima inside their domain of definition. The main drawbacks of such approaches are that they might require extraction of a closed form workspace representation from the probabilistic map or, in the case of HAPF, they can be computationally chalenging to calculate using conventional methods like Finite Elements or Finite Differences. These problems become more difficult in three dimensions due to more complex geometries and larger workspace volume. The method in <cit.> uses Fast Multiple Boundary Element Method (FastBEM) which significantly accelerates the calculation of the harmonic potential. In another work <cit.>, the author uses GPU-parallelised Finite Differences and devises an algorithm to eliminate the explored flat potential areas from future calculations. In this work, we extend the results presented in <cit.> to three-dimensional complex indoor environments. The proposed exploration scheme guarantees complete exploration of such environments in finite time, while producing smooth and safe trajectories. We use Fast Multiple Boundary Element Method (FastBEM) to efficiently calculate the Harmonic Potential Field navigating the robot. Contrary to [11], we have developed algorithms for the removal of explored dead ends and robust boundary extraction, which further improve the exploration process. Finally, we demonstrate the effectiveness of our approach by testing it in a realistic indoor environment. § PROBLEM FORMULATION The initially unknown workspace W is a compact and connected subspace of ^3. The interior of W is the free space and its boundary can be considered as a union of disconnected closed surfaces with multiple handles. In most cases, there is only one surface if there are no floating or flying obstacles present. We assume that the robot has spherical sensing capabilities, meaning that its sensing space S(p) is composed of all line segments starting at the robot's position p=[x,y,z] with a length no greater than a specified range r and lying inside W. At a given time instance t, the explored space ε(t) is defined as the union of sensing spaces S(p) for all positions p along the path P(t) that the robot has traversed up to that time. More specifically, the explored space at a time instance t is defined as ε(t)=⋃_p∈ P(t) S(p), where P(t) is the path that the robot has traversed in time t. The boundary of the explored space consists of two different sets: the occupied boundary ∂ε_o, which is comprised of parts of ∂ W and the free boundary parts ∂ε_f, which belong to the unoccupied space. The former remains the same while the latter is integrated into the interior of ε as the robot explores the workspace. Problem definition: Assuming a robot that obeys a single integrator kinematic model ṗ=u with initial position p(0)=p_0 ∈ intW, find a control law u=f(p,t,ε) that generates a path P(T), so that in finite time T>0 , ε(T)=W. § METHODOLOGY The central idea behind boundary value problem (BVP) exploration is to find a harmonic potential field φ(p) by solving the Laplace equation (<ref>), subject to boundary conditions that assign attractive potential unexplored frontiers and repulsive potential to boundaries corresponding to obstacles: ∇^2φ(p)=0, ∂φ/∂ n=∇φ· n(q) =k(q), ∀ q∈∂ε where n(q) denotes the unit normal vector of ∂ε at q and k(q) is a given function that evaluates the directional derivative of φ(p) over the boundary ∂ε. For the boundary value problem (<ref>) with Neumann conditions (<ref>) to have a solution, the potential function must satisfy the compatibility constraint. This constraint states that the flux (flow) of the gradient field of φ across the boundary of the region must be equal to zero. ∬_∂ε∇φ· n dS=0 An important property of harmonic functions, namely the maximum principle, states that a non-constant harmonic function cannot attain a maximum or minimum at an interior point of its domain. This implies that the values of a harmonic function in a bounded domain are bounded by its maximum and minimum values on the boundary. This makes harmonic potential fields suitable for autonomous navigation since the robot cannot be trapped in a local minimum. §.§ Fast Multi-pole Boundary Element Method The method chosen to solve the Laplace equation is the Fast Multi-pole accelerated Boundary Element Method (FastBEM) developed in <cit.> which accelerates the conventional BEM and it is more efficient than Finite Element Method and Finite Difference Method in terms of computational time and memory requirements and for complex boundary geometries such as those of indoor environments. In conventional BEM <cit.> the boundary of the domain ∂ε is discretized and the boundary value problem (<ref>) is reformulated to boundary integral equations (<ref>) using Green's second identity and the fundamental solution. More specifically, the solution at a point p∈ε, inside the domain is expressed as a linear combination of the boundary values of the potential and its normal derivative: φ (p)= H_p·φ̂-G_p·k̂ For Neumann BVPs, the unknown boundary values of the potential, φ̂=[φ̂_1, φ̂_2, ..., φ̂_N]^T, depend linearly on the boundary values of its normal derivative, k̂=[k̂_1, k̂_2, ...,k̂_N]^T φ̂= H^-1· G ·k̂ where N is the number of boundary elements. The definitions of the 1× N vectors H_p, G_p and the N× N matrices H, G which contain the surface integrals of the fundamental solution and its normal derivative on each element can be found in <cit.>. The computational load of the Boundary Element Method primarily lies in assembling the BEM matrix H and solving the associated linear system. It is worth noting that the entries of H depend only on the geometry of the boundary, so if certain parts of the boundary do not change, the corresponding entries of the matrix are computed only once and reused, which reduces the computational effort significantly. In conventional BEM the computation of the matrix H requires O(N^2) operations and the solution of the system H·φ̂=G·k̂ using direct solvers requires O(N^3) operations. The main idea of FastBEM is to use iterative solvers with the Fast Multi-pole Method to accelerate the matrix-vector multiplication H·φ̂ in each iteration without ever forming the entire matrix H explicitly. The boundary elements are subdivided via an octree decomposition and the interactions among elements in conventional BEM are replaced by cell to cell interactions of the octree. Direct integration is performed only for the elements that are close to the source point whereas multi-pole expansions are used for far away elements. This reduces the number of operations to O(N) decreasing dramatically the solution time. Moreover, the use of iterative solvers reduces significantly the memory requirements since the elements of H do not need to be explicitly stored. §.§ Occupancy Grid Mapping The representation of the explored space ε is done through occupancy grid maps <cit.>. An occupancy probability value Pr(m) is assigned to each grid cell and updated using algorithms similar to those described in Chapter 9 of <cit.>, extended to three dimensions. Each point q∈∂ε inherits the probability of the cell that contains it, Pr(q)=Pr(m(q)), ∥ c-q∥_∞≤ m_r/2, where c denotes the center of cell m and m_r the cell size of the map in meters per cell. Defining an occupancy probability threshold a∈[0.5,1] we can classify each boundary point q∈∂ε as occupied or free and define the sets ∂ε_o and ∂ε_f as ∂ε_o={q∈∂ε: Pr(q)≥a} and ∂ε_f=∂ε∖∂ε_o. §.§ Velocity Control Law The robot's velocity control law has the form: u=-K_u· s·∇_pφ(p,k̂) where K_u is a scaling constant and s=S_R_1(d(p,∂ε)) denotes a function that asymptotically approaches zero as the robot approaches the boundary, for instance: S_a(x)={[ 1, x>a; 3(x/a)^2-2(x/a)^3, 0≤ x≤ a; 0, x<0.; ]. By the definition of S_R_1 we see that whenever the minimum euclidean distance d(p,∂ε) between the robot and the the boundary becomes less that a constant R_1, the robot will start slowing down. §.§ Construction of the Boundary Value Problem In order to guarantee safety and complete exploration via (<ref>), as it will be shown later in the next section, the boundary values k̂ will track their desired target values k̂_t that will be designed in the sequel. §.§.§ Target Boundary Values First, we will define k̂_t as: k̂_t=k/k'_m I(q)k'(q). The function k'(q) is defined using (<ref>) as: k'={[ S_1-α(Pr(q)-α), Pr(q)≥α; -S_α(α-Pr(q)), Pr(q)<α; ]. and it assigns the appropriate sign to each target boundary value based on the probability occupancy Pr(q) of the corresponding boundary element at position q and the occupancy threshold α∈ [0.5, 1]. The function I(q) defined as I(q)={[ ∬_∂ε_pk'dS, q∈∂ε_p; ; -∬_∂ε_nk'dS, q∈∂ε_n; ]. is used to render the target boundary values compatible as shown in (<ref>) for the feasibility of the BVP solution. The sets ∂ε_p={q∈∂ε : k'(q)≥0} and ∂ε_n={q∈∂ε : k'(q)<0} correspond to the parts of the boundary where k' is positive and negative respectively. Regarding k and k'_m, it should be noted that k is a constant that specifies the maximum and minimum values of k̂_t and k'_m=max_q∈∂ε(∥k'(q)/I(q)∥). §.§.§ Boundary Value Control Law The boundary values k̂ converge to the desired target values k̂_̂t̂ through the following control law: k̇̂̇=(cμ+b_e)(k̂_t-k̂) , k̂(0)=k̂_0 The parameters c and μ are defined as c=S_ϵ_w(∥∇_pφ-ϵ_1∥) and μ=S_μ_1(K_u s∥∇_pφ∥^2/∥∂φ/∂k̂(k̂_t-k̂)∥+ϵ_2) with ϵ_w, ϵ_1 and ϵ_2 small positive constants. The term c ensures that k̇̂̇→ 0 as the robot converges to a critical point of φ, whereas μ is used to adjust the rate with which the boundary values approach the target values. By specifying μ_1 > 9/8 we ensure that S_μ_1(x)<x, ∀ x > 0. The usefulness of this will become apparent in the next section. Regarding the term ∂φ/∂k̂=[∂φ/∂k̂_1, ∂φ/∂k̂_2..., ∂φ/∂k̂_N] in μ, we see that combining (<ref>) and (<ref>) we have φ = (H_p· H^-1· G-G_p)·k̂, therefore ∂φ/∂k̂=H_p· H^-1· G-G_p. Finally, b_e is defined as b_e={[ 0, if k̂(q) ≥0 ∀ q∈∂ε_o; ; 1, otherwise; ]. and ensures that the potential becomes safe by increasing the convergence rate of k̂ to the desired target value k̂_t in case there exists an attractive occupied boundary, such as when a previously free part of the boundary is replaced by an obstacle during exploration. §.§ Proof of Safety and Complete Exploration In this subsection, we state some useful theoretical results regarding the aforementioned control design. k̂_t is bounded and compatible. From the definition of k'_m it holds that k'_m≥∥k'(q)/I(q)∥⇒∥kk'(q)/k'_m I(q)∥≤k⇒ -k≤k̂_t≤k therefore k̂_t is bounded. Also ∬_∂εk̂_tdS=∬_∂εkk'(q)/k'_m I(q)dS=∬_∂ε_pkk'(q)/k'_m I(q)dS+∬_∂ε_nkk'(q)/k'_m I(q)dS =k/k'_m ∬_∂ε_pk'dS∬_∂ε_pk'(q)dS-k/k'_m ∬_∂ε_nk'dS∬_∂ε_nk'(q)dS=k/k'_m-k/k'_m=0 which completes the proof. Assuming that k̂ is compatible for t = 0, the adaptive law (<ref>) guarantees that k̂ will remain compatible and bounded for all time. Assume that k̂_i(t)=k̅ for some time t ≥ 0. Then, k̇̂̇_i must be non-positive because it is proportional to k̂_t,i-k̂_i and k̂_t,i≤k thus, k̂_i cannot exceed k. Similarly, it holds that -k≤k̂_i. Therefore k̂ is bounded. Next, we denote as I_c the closed surface integral of k̂. For constant boundary elements I_c=∬_∂εk̂dS=∑_i=1^N A_i k̂_i=A·k̂ where A=[A_1, A_2, ..., A_N] denotes the areas of each element. In case A_i=A_j, i≠ j then we remove the j-th elements from A and k̂ and replace k̂_i with k̂_i+k̂_j so that the new A is full column rank. Taking the derivative of I_c w.r.t. time we have İ_̇ċ=Ȧ·k̂+A·k̇̂̇=Ȧ·k̂+A· (cμ+b_e)(k̂_t-k̂) and from the compatibility of k̂_t, i.e., A·k̂_t=0, we obtain: İ_̇ċ=Ȧ·k̂-A·k̂(cμ+b_e)=[Ȧ·(A^T· A)^-1· A^T-(cμ+b_e)] A·k̂ İ_̇ċ=[Ȧ·(A^T· A)^-1· A^T-(cμ+b_e)]I_c. Therefore if k satisfies the compatibility condition, I_c=0, at t=0 then it satisfies it for all t≥0. Considering this, we choose k̂_0=k̂_t,0 as initial conditions for (<ref>). If the potential φ(p,k̂) is unsafe, the control law (<ref>) guarantees it will become safe in finite time. When the robot is using the potential field computed in the previous time step of the newly explored occupied boundary, ∂ε_o may have attractive potential rendering φ unsafe. In that case, b_e in (<ref>) is activated so that in finite time k̂ approaches the desired positive value k̂_t asymptotically and the potential field computed in the next step becomes safe eventually. The function φ(p,k̂) is lower bounded. Due to well-posedness of the boundary value problem φ(p,k̂) depends continuously on the boundary conditions k̂∈[-k,k], ∀ p∈ε. The set [-k,k] is closed therefore by the extreme value theorem φ accepts a maximum and a minimum value in {(p,k̂)| k̂∈[-k,k] and p∈ε}. Therefore it is lower bounded. The robot's trajectory under control law (<ref>) is safe. If φ is safe then all points in the occupied boundary are repulsive and collision avoidance is ensured. In case φ is not safe, it will become safe in finite time as p→∂ε_o, which means that the robot approaches the boundary asymptotically, therefore in the worst case the robot stops at the boundary. Assuming accurate sensing and that the updated potential field is computed as the robot moves, the occupied boundary becomes strictly repulsive and collision avoidance is ensured. Assuming b_e=0, the proposed robot control guarantees the full exploration of W in finite time from almost any initial configuration. Barbalat's lemma will be used to prove that dφ/dt→0 as t→∞. The following conditions must be satisfied: 1) φ has a finite limit as t→∞, and 2) dφ/dt is uniformly continuous w.r.t. time. For the first condition we showed that φ(p,k̂) is lower bounded and we need to show that dφ/dt≤0, where: dφ/dt=∇_pφ·dp/dt+∂φ/∂k̂·dk̂/dt dφ/dt≤-K_us∥∇_pφ∥^2+∥∂φ/∂k̂·(k̂_t-k̂)∥ cμ. For μ_1>9/8 it holds that: K_us∥∇_pφ∥^2/∥∂φ/∂k̂(k̂_t-k̂)∥+ε_2≥ S_μ_1(K_us∥∇_pφ∥^2/∥∂φ/∂k̂(k̂_t-k̂)∥+ε_2) K_us∥∇_pφ∥^2≥ (∥∂φ/∂k̂(k̂_t-k̂)∥+ε_2)μ K_us∥∇_pφ∥^2≥∥∂φ/∂k̂(k̂_t-k̂)∥ c μ 0≥-K_us∥∇_pφ∥^2+∥∂φ/∂k̂(k̂_t-k̂)∥ c μ. Next, we show that dφ/dt is uniformly continuous w.r.t. time. It suffices to show that dφ/dt is locally Lipschitz continuous since φ has been proven bounded. In the first term of dφ/dt in (<ref>) , s is locally Lipschitz continuous and bounded between 0 and 1, ∇_pφ is real analytic and thus locally Lipschitz and bounded in ε. Therefore, the first term of dφ/dt is locally Lipschitz continuous as a product of locally Lipschitz continuous and bounded functions. Regarding the second term, it can be shown that it is continuous and has a piece-wise continuous first derivative, as a composition of such functions. Using the extreme value theorem, it can be shown that the derivative of the second term is bounded. Thus, using the mean value theorem it can be shown that the second term of dφ/dt is locally Lipschitz continuous. Consequently, dφ/dt is locally Lipschitz continuous. Therefore the conditions of Barbalat's lemma are fulfilled and the derivative of φ w.r.t. time converges to 0 as t→∞. By (<ref>) we see that dφ/dt→ 0 occurs in two cases: i) when the robot approaches the free boundary (s→0 and μ→0) and ii) when ∥∇_pφ∥→0 (c→0). The second case, means that the robot converges to a critical point of φ which for a harmonic function is an unstable saddle. Therefore, the robot will move towards the free boundary of W and thus fully explore it in finite time. § IMPLEMENTATION §.§ Boundary Extraction After obtaining the occupancy map of the explored workspace, we need to extract its boundary in form of a closed triangulated surface which is required by the BEM solver. In this implementation, we used 3D Delaunay triangulation <cit.> due to its computational efficiency and ability to produce the required closed surface. The implementation steps are given as follows: §.§ Dead End Closing Given a generated map and trajectory, the goal of this algorithm is to remove the explored regions that the robot will not have to traverse again (i.e., areas with no unexplored free boundaries). To do this we need to identify boundary patches between the region to be removed and the remaining space. Once the region has been removed, the boundaries between the remaining space and the removed region are set to have an occupancy probability of 0.99, indicating that they are now considered occupied. For simplicity, the algorithm considers only one boundary patch at a time that separates the explored space into two distinct regions. In this implementation, we examine planar patches that intersect the trajectory and are perpendicular to it. Next, we provide the implementation steps of the algorithm and demonstrate the results from its application on the ”Maze" environment in Figure <ref>. The figure shows the boundary of the explored space on the left and the boundary that is used in the Fast BEM solver after applying the dead end closing algorithm on the right. § RESULTS In this section, we present the simulation results from our implementation. The sensing and occupancy grid mapping were simulated using Matlab's Navigation Toolbox. The environments were designed in CAD software and imported as mesh files. All aforementioned algorithms where implemented in Matlab 2020b, except the Laplace solver which is provided in <cit.>. The controller parameter values that are used in the following simulations are shown in TABLE <ref>. We test our algorithm in two different environments shown in Figure <ref>. The first is a small corridor maze in order to demonstrate the performance of the dead end closing algorithm and the second is a more complex and larger environment representing a two story building with multiple rooms. §.§ Generated Maps and Trajectories The generated maps and trajectories are shown in Figures <ref> and <ref> and the corresponding path lengths and exploration times in Table <ref>. We see that the robot has fully explored the testing environments in reasonable time and maintains a safe distance from the explored space's boundaries. Regarding the Corridor Maze environment, we see that the dead end closing algorithm helped reduce the total exploration time by a factor of 1.6. As for the two story building environment the robot was able to revisit the upper and lower floor to explore remaining space. This validates the completeness of the proposed exploration scheme for large and complex environments. Regarding the performance of FastBEM, the computation of the unknown boundary values in (<ref>) was conducted every 10 iterations or when the robot approached close to the free boundary and rose linearly from 2 sec for 2500 elements to 27 sec for 27000 elements for the two story building. For the corridor maze those numbers where lower than 6 sec and lower than 2 sec when we applied the dead end closing algorithm. The maximum computation time of the gradient ∇_pφ from (<ref>) per step was 0.2 and 0.12 sec for the Two-story and the Corridor Maze, respectively. For the latter, the dead end closing algorithm reduced the gradient computation time below 0.04 seconds. §.§ Comparison In this subsection, we compare the performance of our algorithm with two other state-of-the-art algorithms: the receding horizon next best view planner (RH-NBVP) <cit.> and the frontier-based planner <cit.>, on the same indoor environment. In order to compensate for the narrower field of view used in <cit.>, which was [60^∘,90^∘] with a depth of 5 meters, we used a smaller sensing radius of 3 meters instead of 5 meters. Additionally, we lowered our map's resolution to 3 cells/m to ensure compatibility with the RH-NBVP's map resolution of 2.5 cells/m. The generated maps and trajectories for our algorithm are shown in Figure <ref> for two different starting positions, while those for the RH-NBVP and the frontier-based planner are shown in Figure <ref>. Regarding the exploration time, the overall time of the RH-NBVP was 501 seconds, the frontier-based planner was 470 seconds (on average), and our algorithm was faster than the other two algorithms, with 451 seconds and 371 seconds respectively for the two initial points. All approaches fully explored the environment, but the trajectories generated by our algorithm are smoother (smaller radius of curvature more than 0.45m), maintain a safe distance from the walls more than 0.35m and transverse every corridor of the environment. In contrast, the trajectories generated by the other approaches contain sharp turns, approach close to the walls (the minimum distance reached 0.05m) and do not extend evenly to all the corridors of the environment. § CONCLUSIONS In summary, this work presents a safe, smooth, efficient and provably complete method for 3D exploration of complex indoor environments. Furthermore, we proposed two algorithms for robust boundary extraction and for reduction of the boundary's size by removing explored dead ends automatically. The aforementioned properties were validated by simulation results in various types of environments. In comparison to two existing approaches, we showed that the proposed scheme outperforms them in terms of safety, trajectory smoothness and exploration time in a typical indoor environment. For future research, we aim at applying a faster GPU-based version of FMBEM in real experiments and extending the methodology to outdoor environments for tasks like inspection of structures. ieeetran
http://arxiv.org/abs/2303.06799v1
20230313010937
Gaussian Process on the Product of Directional Manifolds
[ "Ziyu Cao", "Kailai Li" ]
cs.LG
[ "cs.LG" ]
Object-Centric Multi-Task Learning for Human Instances Hyeongseok Son, Sangil Jung, Solae Lee, Seongeun Kim, Seung-In Park, ByungIn Yoo Samsung Advanced Institute of Technology {hs1.son, sang-il.jung, solae913.lee, se91.kim, si14.park, byungin.yoo}@samsung.com March 30, 2023 ============================================================================================================================================================================================================================== empty empty We present a principled study on establishing Gaussian processes over variables on the product of directional manifolds. As a basic functional component, a manifold-adaptive kernel is presented based on the von Mises distribution for Gaussian process regression on unit circles. Afterward, a novel hypertoroidal von Mises kernel is introduced to enable topology-aware Gaussian processes on hypertori with consideration of correlational circular components. Based thereon, we enable multi-output regression for learning vector-valued functions on hypertori using intrinsic coregionalization model and provide analytical derivatives in hyperparameter optimization. The proposed multi-output hypertoroidal Gaussian process is further embedded to a data-driven recursive estimation scheme for learning unknown range sensing models of angle-of-arrival inputs. Evaluations on range-based localization show that the proposed scheme enables superior tracking accuracy over parametric modeling and common Gaussian processes. § INTRODUCTION Inference on random variables belonging to directional manifolds appears in various control-related areas such as signal processing, robotics, and computer vision <cit.>. Typical examples include the unit circle ^1⊂^2, hypertorus ^3^1×^1×^1⊂^6 (× denotes the Cartesian product), and hyperspheres ^d-1⊂^d (d≥3), which are by nature topologically nonlinear and periodic. Consequently, it is nontrivial to model functions over directional quantities with theoretically-sound stochastic interpretation. Some adaptation measures have been introduced, e.g., based on local linearization, in order to apply conventional probabilistic schemes. However, this may induce poor inferential performance, in particular, on modeling stochastic systems under large uncertainties or fast transitions <cit.>. Recent advances in directional statistics have provided new tools for manifold-adaptive uncertainty quantification on directional domains <cit.>. Popular choices include the wrapped normal and the von Mises distributions on the unit circle, and the von Mises–Fisher distribution on hyperspheres <cit.>. For modeling directional quantities of antipodal symmetry, e.g., unit quaternions on ^3⊂^4, the Bingham distribution is commonly used and has been widely exploited in reasoning and inference on uncertain spatial orientations <cit.>. As for establishing probabilistic schemes on composite directional domains, one important aspect is to interpret correlation across manifold components <cit.>. Former works were shown on the torus for temporal modeling of correlated wind directions <cit.> and on the manifold of unit dual quaternions for spatial pose inference <cit.>. The aforementioned tools, though topology-aware, cannot be trivially applied to modeling stochastic processes over directional manifolds. In this regard, considerable effort has been dedicated to adapting Gaussian processes (GPs) underlying topologies. One general methodology is to exploit Riemannian geometry to determine the kernel function implicitly. By solving a stochastic partial differential equation incorporating the Laplace–Beltrami operator, kernel functions can be obtained on nonlinear manifolds <cit.>. Methods were proposed in <cit.> to derive Matérn kernels on Riemannian manifolds using manifold Fourier feature expansions based on the Laplace–Beltrami eigenpair and its spectral measure. The approach was further adopted in <cit.> for modeling tangential vector fields with tailored kernels on Riemannian manifolds using projective geometry. Such a methodology is generally applicable to developing kernels on Riemannian manifolds, however, theoretically complex and computationally expensive (e.g., performing eigendecomposition of the Laplace–Beltrami operators), inducing considerable gap towards its usage in engineering practices. Alternatively, manifold-adaptive kernels can be explicitly designed the underlying manifold structure. This can lead to a conciser procedure of establishing GPs. However, simply replacing the distance metric with the geodesic to generalize Gaussian kernels on nonlinear manifolds does not lead to positive definiteness <cit.>. Instead, a principled prerequisite was given in <cit.> that Laplacian kernels are eligible if and only if the distance metric is conditionally negative definite. In <cit.>, kernels have been introduced on symmetric and periodic domains, and basic kernel combinations were provided based on summation or multiplication to handle complex topologies. For GP regression on cylindrical surface (^1×^1), a kernel function was proposed in <cit.> by multiplying a sinusoidal kernel and a Laplacian kernel of 𝓁^1-norm. The approach was further applied to spatiotemporal modeling of meteorological fields with periodicity. In <cit.>, various kernel functions were investigated based on hyperspherical geometry for regression on unit quaternions and unit dual quaternions with applications to spatial pose inference. The aforementioned works showcased adapting GPs to nonlinear domains with topology-compatible kernels. However, no systematic study has been done for establishing GP schemes on the product of directional manifolds, in particular, on hypertori. Modeling stochastic processes over hypertoroidal variables refers to numerous real-world applications. Almost all mechanical systems such as ground/aerial vehicles are maneuvered by circular inputs from a certain number of rotational motors. Spatial motions of a mobile agent can thus be modeled as stochastic processes of hypertoroidal inputs. §.§ Contribution We provide a principled study on establishing GPs over random variables on directional manifolds composing unit circles. Under the framework of (multi-output) Gaussian process introduced in sec:preliminaries, we first introduce the von Mises kernel for quantifying similarity of circular data in a topology-adaptive manner. Afterward, a novel hypertoroidal von Mises (HvM) kernel function is proposed for multi-output GPs on the hypertorus with corresponding closed-form derivatives in hyperparameter optimization (sec:gpcircle). We apply GPs using the proposed HvM kernel to learning unknown measurement models of angle-of-arrival inputs for data-driven recursive position estimation in sensor networks. Comparisons with parametric modeling and GPs using kernel multiplication show that the proposed scheme enables superior tracking performance in terms of accuracy and robustness (sec:evaluation). § GAUSSIAN PROCESS REGRESSION AND INFERENCE §.§ Gaussian Process Modeling A Gaussian process is a collection of random variables on a certain domain. Any finite set of these random variables follows a multivariate Gaussian distribution. For instance, a GP of scalar output is denoted as ()∼(m(), (, ')), with m() and (, ) being the mean and covariance functions of (), respectively <cit.>. Suppose there is an arbitrary function that is observed under uncertainty following =r()+ with noise ∼(0,σ_r^2). Given a set of n input locations and corresponding observations corrupted by noise, {(_∙,i,z_i)}_i=1^n, a GP yields a posterior of the function value at test locations {_∘,i}_i=1^m in the form of a Gaussian distribution _∘|{(_∙,i,z_i)}_i=1^n,{_∘,i}_i=1^m∼(_∘,_∘) , with the mean and covariance given by _∘ = _∘∙^-1 _∘=_∘∘-_∘∙^-1_∙∘ , respectively <cit.>, where =_∙∙+σ_r^2_n. Element in matrix _∙∘∈^n×m at entry (i,j) is the covariance given by the kernel function evaluated at training and test locations (_∙,i,_∘,j). Matrices _∙∙∈^n×n, _∘∙∈^m×n can be obtained analogously. Vector =[z_1, ⋯,z_n]^⊤ collects all observations, and _n∈^n×n is an identity matrix. Further, the set of predicted observations at test locations follows the distribution (_∘,_∘+σ_r^2_m). §.§ Multi-Output Gaussian Processes For modeling vector-valued functions expressed as =()+, where ∼(_d,) is the noise term and =(σ_r,1^2,⋯, σ_r,d^2), the multi-output Gaussian process can be exploited. It takes the form ()∼((),(, ')), with ()∈^d being a multi-output function collecting the mean of each dimension and (, ') the matrix-valued covariance function. To obtain a valid (, '), one popular method is the intrinsic coregionalization model. This leads to (, ') = (, ') ,∈^d×d being a coregionalization matrix that is positive semidefinite <cit.>. Given uncertain observations {_i}_i=1^n collected at training locations {_∙,i}_i=1^n, the posterior at a test location _∘ follows _∘|{(_∙,i,_i)}_i=1^n,_∘∼(_∘,_∘). Here, the mean and covariance are calculated according to the general form in (<ref>), with components newly defined as _∘∙=⊗_∘∙, _∘∘= (_∘,_∘) and =⊗_∙∙+⊗_n. Note that _∙∙ still denotes the kernel matrix at training locations as given in (<ref>). Furthermore, vector is obtained through the vectorization =([ _1,⋯,_n ]^⊤)∈^nd, and vector _∘∙=[(_∘,_∙,1),⋯,(_∘,_∙,n)]. Similarly to the scalar case, the predictive distribution of the observation at _∘ is obtained as _∘∼(_∘, _∘ + ). § GAUSSIAN PROCESSES ON THE HYPERTORUS §.§ A Circular Kernel Based on the von Mises Distribution We now consider a scalar-valued function r() defined on the unit circle, namely, r:^1→ for GP modeling. In order to quantify the similarity between two circular inputs ,∈^1, we design a kernel function _vM(,)=ω^2exp(λ ^⊤) based on the von Mises distribution <cit.>, with ω controlling signal variance and λ> 0 the concentration. The kernel inherently handles the periodic nature of circular manifolds. To showcase its functionality within GP scheme compared with conventional kernel structures, we demonstrate the following case study. We synthesize a function on the unit circle in the form of a mixture of typical circular distributions. It has four components of various configurations and is observed via z=∑_i=1^4w_if_circ^i()+ϵ, with ϵ∼ (0,0.0025) being an additive noise. We embed the squared exponential (SE) kernel (distance metric 𝒹=θ-θ^', with θ and θ^' denoting the angular positions of and , respectively) and the proposed von Mises kernel (vM) into the same GP scheme as introduced in subsec:gp for regression over the whole circular domain. Shown in fig:s1gp-(A), the SE kernel produces discontinuous curves due to the aperiodic distance metric of Euclidean geometry. In contrast, the proposed vM kernel quantifies periodic similarity adaptively to circular geometry, inducing identical posteriors with period of 2π as plotted in fig:s1gp-(B). §.§ The Hypertoroidal von Mises Kernel We now aim to establish GPs on the hypertorus ^3⊂^6. In order to develop a kernel function on domains built upon the Cartesian product, the common technique is to multiply corresponding kernels of each circular component <cit.>. However, this disregards similarities lying in correlations across the components. Therefore, it is imperative to design a topology-adaptive kernel function that quantifies hypertoroidal similarities in a unified manner. For that, we propose the so-called hypertoroidal von Mises (HvM) kernel defined as _HvM(,)=ω^2exp(^⊤(,)+(,)^⊤(,)) , for an arbitrary pair of inputs =[ (^1)^⊤,(^2)^⊤,(^3)^⊤ ]^⊤, =[ (^1)^⊤,(^2)^⊤,(^3)^⊤ ]^⊤∈^1×^1×^1 expressed component-wise. Metric (,)=[ (^1)^⊤^1,(^2)^⊤^2,(^3)^⊤^3 ]^⊤ measures component-wise distances according to circular geometry. Similar to the von Mises kernel, ω controls signal variance. The first term in the exponent of (<ref>) interprets concentration on each circular component via a positive-valued vector = [ λ_1,λ_2,λ_3 ]^⊤. The second term allows for modeling correlations between pairs of circular components through the quadratic formulation with a nonnegative and symmetric weighting matrix =[0 a_1 a_3 a_1 0 a_2 a_3 a_2 0]∈^3×3. Note that both terms guarantee the periodic nature of hypertoroidal manifolds and symmetry of the kernel. The following case study further provides a concrete example of the HvM kernel based on a degenerate case. We configure the kernel function in (<ref>) the torus ^1×^1⊂^4 with four sets of parameters {(ω_i,_i,_i)}_i=1^4, where * ω_1=ω_2=ω_3=ω_4=1 , * _1=_2=[ 0.3,0.3 ]^⊤, _3= _4=[ 1,1 ]^⊤ , and * _1=_3 = _2×2, _2=[0 0.3 0.3 0] , _4=[0 1 1 0] . Given one input =[ 1,0,1,0 ]^⊤ at angular locations (0,0) on each circle, the kernel function _HvM (,) is evaluated at =[ cos(α),sin(α),cos(β),sin(β) ]^⊤ angles (α,β). Shown in fig:hvm-(A) to (D), the resulted kernel functions are plotted corresponding to the parameter sets 1 to 4 above. In all cases, the kernel function indicates the largest similarity at (α,β)=(0,0), namely, = . Correlations between circular components are inherently interpreted by the nonzero off-diagonal elements in _2 and _4 as plotted in fig:hvm-(B) and (D), respectively. When =_2×2, as illustrated by fig:hvm-(A) and (C), the proposed hypertoroidal kernel function degenerates to a multiplication of von Mises kernels, which disregards the correlation between the two angular pairs (α,β) and (0,0). §.§ Hyperparameter Optimization Varying the free parameters, e.g., those in the kernel functions, has a considerable impact on the performance of GP regression and inference. In general, these hyperparameters can be obtained via maximum likelihood estimation following ^*=_(). The objective is derived in the form of log marginal likelihood () =2logp(|{_∙,i}_i=1^n,) =-^⊤^-1-log||-nlog(2π) , with and specified according to sec:preliminaries. In practice, the nonlinear optimization problem above is solved numerically with the kernel matrix evaluated in each iteration. The gradient of the objective the i-th element in takes the following general form ()θ_i=^⊤^-1θ_i^-1 -tr(^-1∂/∂θ_i) , with tr denoting the trace of a matrix. As for multi-output GPs using the proposed hypertoroidal von Mises kernel, the hyperparameters can be collected into =[ ω,^⊤,^⊤, ^⊤,_r^⊤ ]^⊤. The first three components, ω, , and =[ a_1,a_2,a_3 ]^⊤ are free parameters in (<ref>). = vec() denotes the vectorized coregionalization matrix in (<ref>). And _r=[ σ_r,1,⋯,σ_r,d ]^⊤ indicates observation noise variance on each output dimension according to subsec:mgp. Computing (<ref>) boils down to deriving the derivative of () hyperparameters in , which we express element-wise now for clear explanation. The derivative of the kernel matrix the signal deviation ω follows ω=⊗_∙∙ω=2⊗_∙∙/ω, where _∙∙ denotes the kernel matrix of training sets as introduced in subsec:mgp. Further, the derivative of each element in the concentration vector follows λ_s=⊗_∙∙λ_s=⊗(_∙∙⊙^s_∙∙), with s∈{1,2,3} being the index of the s-th circular component of the hypertorus. Correspondingly, elements in ^s_∙∙∈^n×n follows (^s_∙∙)_ij(_∙,i^s)^⊤^s_∙,j, which interprets distance between training inputs on each circle, and ⊙ denotes the Hadamard product. As for differentiation on the nonzero elements in matrix , we have a_s=⊗_∙∙a_s=2⊗(_∙∙⊙^s_∙∙⊙^s 3+1_∙∙), with s∈{1,2,3}. The derivative of the s-th element in the vectorized coregionalization matrix[Thus, b_s=()_ij, with s=d (j-1)+i∈{1,⋯,d^2}.] takes the form b_s=(⊗_∙∙)b_s=(b_s)⊗_∙∙=_ij⊗_∙∙, with _ij∈^d×d denoting a matrix unit. The derivative of observation deviation σ_r,s of each output domain s∈{1,⋯,d} can be derived in a similar fashion. It is given by σ_r,s=(⊗_n)σ_r,s=2σ_r,s_ss⊗_n , where _ss∈^d×d is a matrix unit. In practice, we exploit the trust-regions method from Manopt <cit.> for maximizing the objective in (<ref>). § EVALUATION We now evaluate the proposed HvM kernel within the particle filtering scheme, where unknown range sensor network is learned by hypertoroidal GPs taking angle-of-arrival inputs. §.§ Scenario Setup We set up a two-dimensional area of 30×30 m^2, where a mobile agent is tracked while moving along various trajectories. We have the following system dynamics according to a random walk _t+1=_t+_t , with _t, _t+1∈^2 denoting positions and _t∈^2 the process noise following _t∼(_2,_t). A range sensor, e.g., of ultrasonic or ultra-wideband modalities, is equipped onboard the platform observing distances to three reference points of coordinates {_s^r}_s=1^3⊂^2 under uncertainty. This can be formulated as _t=(_t)+_t+_t , where _t∈^3 and _t∈^3 denote the range measurement and corresponding noise, respectively, and _t∼(_3,_t). Function (_t)[‖_1^r-_t‖,‖_2^r-_t‖,‖_3^r-_t‖]^⊤ gives range readings of position state _t the three reference points. Moreover, a time-varying offset _t∈^3 is added to the range signal to include possible interference in sensor networks such as clock drift or signal reflection <cit.>. For the sake of demonstration, we assume that it is proportional to the range signal (_t) by a ratio of c=0.05. We now assume that the uncertainty in range observations is unknown. However, we are able to obtain accurate angle-of-arrival (AoA) readings from each reference point 24 × 10 grid points {_i}_i=1^n=240 that are uniformly spaced on the xy-plane. Meanwhile, range measurements given by the onboard sensor are collected, inducing a training set of {(_i,_i)}_i=1^n, where _i=[ (_i^1)^⊤,(_i^2)^⊤,(_i^3)^⊤ ]^⊤∈^3⊂^6 denotes the AoA reading of each reference point grid point _i. Such a scenario occurs commonly when there exists no positioning system (e.g., camera networks) covering the whole tracking space, whereas certain portable devices such as total stations can be easily deployed to provide accurate relative angles between two locations <cit.>. For nonparametric measurement modeling, we reformulate (<ref>) into _t=(_t)+_t, with _t∈^3 being the hypertoroidal input of AoA and (_t)(1+c)(_t) the observation modeled by a multi-output GP. §.§ GP-Based Particle Filtering We apply particle filtering to tracking the mobile agents set up in subsec:sce <cit.>. Given a particle _t|t-1 drawn at timestamp t from the prior estimate[Without specific need, we omit particle index for brevity.], we first compute the corresponding hypertoroidal state _t|t-1∈^3, where each circular component is given by _t|t-1^s=[ (_s^r-_t|t-1)_x,(_s^r-_t|t-1)_y]^⊤/‖_s^r-_t|t-1‖ each reference point indexed by s∈{1,2,3}. We further inquire the pre-trained hypertoroidal GP (using training data {(_i,_i)}_i=1^n) at _t|t-1 to predict corresponding range measurement distribution, i.e., _t|{(_i,_i)}_i=1^n,_t|t-1∼(_t|t-1,_t|t-1 + ) . Based thereon, the likelihood function is directly obtained for reweighting the prior particle _t|t-1 given current measurement _t. Afterward, particles are updated via resampling. §.§ Evaluation and Results We equip the GP-based particle filter in sec:filter with the proposed HvM kernel. For comparison with existing kernel design on the hypertorus, we instrument the product squared exponential (PSE) and the product von Mises (PvM) kernels on hypertorus through kernel multiplication of the SE and vM kernels on the unit circle, respectively <cit.>. All GPs of different kernels are trained using the same data set collected as introduced in subsec:sce. Furthermore, we approximate range measurement noise with a three-dimensional Gaussian distribution using the same training data to provide likelihood functions of parametric form. We set the process noise in (<ref>) with covariance _t=(0.16,0.16) and the measurement noise in (<ref>) with covariance _t=ξ^2_3, where ξ∈{0.01,0.05,0.1} controls the level of uncertainty. We deploy 100 particles to all particle filters for 1000 time steps and perform evaluation based on 100 Monte Carlo runs for each trajectory and each noise level. Shown in fig:error, we collect evaluation results given by the particle filters configured above on all sequences throughout different trajectories (as plotted in T1 to T3 of fig:exa) and measurement noise levels (S1-S3 ξ). The proposed HvM kernel delivers superior tracking accuracy of particle filtering via GP reweighting over the PvM and PSE kernels, and the parametric approximation method. Exemplary runs of HvM-GP-based particle filtering on the three trajectories are shown in fig:exa with noise level set at ξ=0.01. On sequence S1-T2 (same noise level), we further plot in fig:2Dtraj representative estimates of particle filtering with likelihoods given by the parametric model and hypertoroidal GPs using kernel multiplication. The PvM kernel delivers better accuracy compared with the parametric method, whereas the PSE kernel fails tracking due to disregard of periodic nature of hypertori. Further comparison with T2 in fig:exa showcases the superior tracking performance from the HvM-GP-based particle filter. To bring more insights to the functionality of the proposed HvM kernel on particle reweighting, we demonstrate in fig:comp range measurement distributions predicted by the parametric model and GPs using HvM and PSE kernels over time. The proposed HvM-GP produces data-adaptive predictive range distributions. The parametric method fails at modeling the time-varying noise pattern, and the PSE kernel induces discontinuity when periodicity in inputs takes effect. § CONCLUSIONS We provide a novel study on establishing multi-output GP schemes on the hypertorus. The von Mises kernel is first introduced to quantify similarity of inputs on ^1 in a geometry-adaptive manner. Based thereon, we propose the so-called hypertoroidal von Mises (HvM) kernel for topology-aware GP modeling on ^3⊂^6. It computes covariance over pairs of hypertoroidal inputs by considering similarities lying on each circular component as well as the correlated area. Derivatives of marginal likelihood the hyperparameters are provided for efficient GP training. The proposed HvM-GP is embedded in a particle filter for data-driven likelihood reweighting given angle-of-arrival inputs. Simulations show that the proposed HvM-GP produces data-adaptive measurement predictions, leading to superior tracking performance over the parametric model and GPs using kernel multiplication. For future work, the efficiency of the proposed method can be improved by reducing the computational complexity, e.g., via sparse Gaussian processes <cit.>. In addition, the proposed HvM-GP is to be exploited in real-world scenarios for data-driven modeling of complex stochastic systems with rotational inputs <cit.>. Also, the HvM kernel can be generalized to fit higher-dimensional spaces for more extensive applications. IEEEtran
http://arxiv.org/abs/2303.06743v1
20230312201052
Data-Driven Statistical Reduced-Order Modeling and Quantification of Polycrystal Mechanics Leading to Porosity-Based Ductile Damage
[ "Yinling Zhang", "Nan Chen", "Curt A. Bronkhorst", "Hansohl Cho", "Robert Argus" ]
cond-mat.mtrl-sci
[ "cond-mat.mtrl-sci" ]
1]Yinling Zhang 1]Nan Chencor1 chennan@math.wisc.edu 2]Curt A. Bronkhorst 3]Hansohl Cho 1]Robert Argus [cor1]Corresponding author [1]Department of Mathematics, University of Wisconsin, Madison, WI 53706, USA [2]Department of Mechanical Engineering, University of Wisconsin, Madison, WI 53706, USA [3]Department of Aerospace Engineering, Korea Advanced Institute of Science and Technology, Daejeon, 34141, Republic of Korea Predicting the process of porosity-based ductile damage in polycrystalline metallic materials is an essential practical topic. Ductile damage and its precursors are represented by extreme values in stress and material state quantities, the spatial probability density function (PDF) of which are highly non-Gaussian with strong fat tails. Traditional deterministic forecasts utilizing sophisticated continuum-based physical models generally lack in representing the statistics of structural evolution during material deformation. Computational tools which do represent complex structural evolution are typically expensive. The inevitable model error and the lack of uncertainty quantification may also induce significant forecast biases, especially in predicting the extreme events associated with ductile damage. In this paper, a data-driven statistical reduced-order modeling framework is developed to provide a probabilistic forecast of the deformation process of a polycrystal aggregate leading to porosity-based ductile damage with uncertainty quantification. The framework starts with computing the time evolution of the leading few moments of specific state variables from the spatiotemporal solution of full-field polycrystal simulations. Then a sparse model identification algorithm based on causation entropy, including essential physical constraints, is utilized to discover the governing equations of these moments. An approximate solution of the time evolution of the PDF is obtained from the predicted moments exploiting the maximum entropy principle. Numerical experiments based on polycrystal realizations of a representative body-centered cubic (BCC) tantalum illustrate a skillful reduced-order model in characterizing the time evolution of the non-Gaussian PDF of the von Mises stress and quantifying the probability of extreme events. The learning process also reveals that the mean stress is not simply an additive forcing to drive the higher-order moments and extreme events. Instead, it interacts with the latter in a strongly nonlinear and multiplicative fashion. In addition, the calibrated moment equations provide a reasonably accurate forecast when applied to the realizations outside the training data set, indicating the robustness of the model and the skill for extrapolation. Finally, an information-based measurement is employed to quantitatively justify that the leading four moments are sufficient to characterize the crucial highly non-Gaussian features throughout the entire deformation history considered. Ductile damageExtreme eventsMoment equationsUncertainty quantificationInformation theory § INTRODUCTION For high-pressure mechanical loading conditions of polycrystalline metallic materials with ready access to mobile dislocations, it is known that material structure is a critical factor in the formation and placement of cavitated pores <cit.>. The structure of metallic materials also evolves with deformation, so the material’s initial state and the physical processes invoked during deformation create a complex spatially dependent structural evolution problem. Certainly, environmental and boundary conditions are essential in how these materials resist deformation and choose physical pathways to accommodate these boundary conditions <cit.>. Regarding material cavitation, pores are discrete localized features that form at very small length scales to contribute to a larger field of pores over much larger length scales. The formation of each pore is considered to be a rare event in response to the extreme mechanical loading of an aggregate composite polycrystalline metal. This produces a spatially varying mechanical response dependent upon the initial and evolved heterogeneous structural state of the material that then creates a time-evolving heterogeneous stress state within the material, which drives pore formation <cit.>. The heterogeneous structural state of the material also contributes to spatial variation of defects which create regions of mechanical weakening that are more prone to cavitation. Although the qualitative picture which is painted is likely true and has been known for some time, we are lacking in our understanding of the important variables. Currently, we have not adequately quantified this statistical deformation process leading to these rare and discrete pore formation events <cit.>. The same heterogeneous conditions are also prevalent as the pores grow in size and ultimately percolate into a large-scale failed region. The macroscale ductile damage models which currently exist to represent the formation and evolution of porosity fields under conditions of dynamic loading are continuum theories and employ largely mean-valued (first moment) material internal state variables to describe the evolution of stress, strain, material structure, and porosity with deformation over time <cit.>. Within these continuum structural field theories, the physics of finite elasticity and dislocation slip or deformation twinning mediated plasticity is most often represented by theories that assume an average over a finite-sized representative volume much larger than the mean size of a single crystal and certainly a nucleated pore. Although consistent with the spirit of these mean-valued continuum theories, the fundamental statistics of the structural evolution of the material with deformation leading to the rare events of pore formation are missing or only loosely considered. It is then perhaps of little surprise that we are still challenged in our ability to predict ductile damage in polycrystalline metallic materials exposed to extreme states of mechanical loading. These theories are generally meant to serve as structural design tools for components that can be large in size. Computational efficiency is often important; therefore, directly supplementing such theories with concurrent lower-length scale physics calculations that offer statistical insight is generally prohibitively expensive. Enriching conventional approaches to modeling ductile damage using continuum mean-valued field theories with a higher-order statistical representation of critical state variables, which is computationally tractable, is an important goal. Structural features of a metallic material, which are defects that alter the resistance stress of pore formation, are varied and depend upon the type of material <cit.>. Metallic alloys may have spatial variations in chemistry and phase <cit.>. Commercially pure materials may have impurity sites that form inclusions or taint grain boundaries <cit.>. Each material may have several potential defect types, which have different spatial distributions and weakening influences on the lattice for pore formation. In principle, each defect type must be quantified for its impact on the material depending upon loading conditions. Several defect types may contribute to pore formation, or one may be dominant. High-purity materials will generally have fewer possible defect types and is therefore a logical choice to begin the process of quantifying influence. In the case of body-centered cubic (BCC) high-purity tantalum, it has been demonstrated that pores form predominantly at grain boundaries <cit.> for light to moderate shock loading conditions. Therefore, we seek to use polycrystal mechanics and physics tools to enable the quantification of grain size scale deformation behavior and statistics. Dislocation motion in body-centered cubic (BCC) materials is generally observed to be dominated by the behavior of screw dislocations. These screw dislocations under conditions of zero velocity have been shown to dissociate into three partial dislocations, which form an equidistant triad within the crystallographic lattice <cit.>. Since, at rest, this screw dislocation core is spread onto three different crystallographic planes, there is ambiguity in that it is no longer planar so that its subsequent motion cannot accurately be represented by a resolved shear stress based upon the classical Schmid rule <cit.>. In addition, the spreading of the screw dislocation core also significantly reduces its mobility in relation to an edge dislocation. Therefore, the screw dislocation behavior dominates the plastic response of BCC materials. Although outside the scope of the present work, there is much we do not yet understand about dislocation motion in BCC metallic materials. The prevailing hypothesis that this core must be re-planarized to enable the nucleation of a kink band by one Burgers vector and the spreading of the kink band by the relative ease of motion of the formed edge dislocations at each of the two kinks <cit.>. The implication for this work is that BCC tantalum is represented by a model which accounts for the phenomenology of this screw dislocation behavior with the implication that its motion on a given slip system is directional and adds additional relevant and interesting heterogeneity. Computational techniques to simulate the full-field response of polycrystal aggregates to mechanical and thermal loading have become important in the pursuit of structure-property-processing relationships for advancing our theoretical/computational tools and to speed the time-efficient design of new materials <cit.>. It has been clearly demonstrated in the literature that the conditions of stress in these polycrystal aggregates are spatially variable with the characteristic length of the single crystal when the source of inelastic deformation is limited to dislocation motion and deformation twinning or structural phase transformation is missing <cit.>. Such is the case for moderately shock-loaded tantalum <cit.>. The disparity in the characteristic size of dislocations and grain size in these BCC materials affords the opportunity to represent the dislocation mediated plasticity in the grains comprising the aggregate by a continuum single crystal model with the appropriate deformation rate and temperature physics specific to BCC materials already discussed. Such calculations and their implication for material damage physics are the focus of the present work. In this paper, a new data-driven reduced-order modeling framework is developed and applied to study the process of porosity-based ductile damage in polycrystalline metallic materials. Different from the traditional reduced-order models aiming to capture large-scale dynamical features using reduced-order bases, the framework developed here focuses on the time evolution of critical statistics that characterizes the intrinsic dynamical properties from a probabilistic viewpoint. In other words, the quantity of interest in such a statistical reduced-order model is the probability density function (PDF) associated with some crucial material state variables in the original physical system, for example, the von Mises stress. As ductile damage and its precursors appear as extreme values, the PDF of the von Mises stress and other state variables manifests strong non-Gaussian features <cit.>. In particular, the PDF for the examples examined here often has a one-sided fat tail corresponding to the extreme stress values during the ductile damage process. Therefore, an appropriate characterization of the time evolution of such a non-Gaussian fat-tailed PDF advances the understanding of the ductile damage process of polycrystalline metallic materials in the statistical sense. It also offers the possibility to facilitate studying the formation of extreme damage events, including discovering the statistical precursor, the onset, and the occurrence of these damage events with proper uncertainty quantification represented by the tail probability. In addition, modeling the statistical evolution of important material state variables advances predicting the timing and probability of the occurrence of extreme events with a much lower computational cost than the sophisticated physical models generally used for sub-granular physics resolution. The development of such a data-driven statistical reduced-order model here starts with the spatiotemporal solution of statistical volume element full-field polycrystal simulations using a computationally expensive physical single-crystal model. At each fixed time instant, the solution of the von Mises stress or other material state variables over different spatial grid points is utilized to compute the statistics. Note that, as the PDF is a function of both time and the values of the material state variables, its governing equation is given by a partial differential equation (PDE) <cit.>. However, simple and explicit expressions of such a PDE are often unavailable for such extremely complicated systems. Despite the recent development of many machine learning methods to discover this PDE <cit.>, the computational cost of direct numerical methods usually remains demanding. To this end, an alternative approach that focuses on the time evolution of only the leading few moments is adopted here. Since the underlying dynamics of each moment equation is driven by an ordinary differential equation (ODE), the learning process becomes much more computationally affordable. Based on the moments computed from such a low-order model, an approximate solution of the time evolution of the PDF can be found in light of an information criterion called the maximum entropy principle <cit.>. Thus, the remaining focus is on identifying the governing equations of the moments. A simple learning algorithm via causation entropy <cit.> and an explicit parameter estimation approach containing essential physical constraints <cit.> are utilized to achieve this goal, which provides a sparse identification of the model structure. The data-driven statistical reduced-order modeling framework developed here has several unique features. First, due to the inevitable model error and the lack of uncertainty quantification, the traditional deterministic forecast via sophisticated macroscale continuum ductile damage models may suffer from significant forecast biases, especially in predicting the extreme events associated with ductile damage that is often sensitive to the model uncertainty. Particularly, traditional continuum-based ductile damage models are based upon mean-value state variables and, therefore, cannot properly capture these extreme value events. In contrast, the statistical reduced-order model developed here provides a possible pathway to understand and represent the statistical process of ductile damage in polycrystalline metallic materials within macroscale model frameworks. As the extreme events of damage and its precursor depend on many unresolved or small-scale physical effects, a statistical characterization of their development and emergence with an appropriate uncertainty quantification via the forecast probability is a preferable approach, which also indicates the predictability of these events. Second, compared with solving the physical models, calculating the leading few moments associated with certain critical state variables is computationally more efficient. It allows for carrying out a vast number of statistical predictions for material damage under different loading conditions within a short allotted time. Third, information theory can be applied to systematically quantify error and uncertainty. In addition to reconstructing an approximate PDF from the moments utilizing the maximum entropy principle, another information criterion, called relative entropy <cit.>, is a natural choice to assess the difference between the reconstructed PDF and the truth in an unbiased fashion. This provides a rigorous assessment of the intrinsic barrier in characterizing the statistics under such a reduced-order approximation. Notably, the relative entropy highlights the tail probability, making it a suitable metric to quantify the uncertainty in the statistical prediction of extreme events. Finally, the statistical reduced-order modeling framework developed here, including the identification procedure, is simple and is generalizable to other materials physics applications with strongly non-Gaussian features and extreme events. The framework developed here has broad scientific and computational implications. One critical issue in studying and forecasting the ductile damage process is understanding how low-order statistical moments affect the dynamics of high-order moments. In general, computing the time evolution of the low-order moments, such as the mean, is straightforward in most computational materials mechanics settings regardless of characteristic length with relatively low cost. Such statistics are also relatively easy to measure from lab experiments since they only rely on a small number of samples or the diagnostics used naturally provide a mean response of the material. Discovering the relationship between low- and high-order moments significantly facilitates inferring the latter that is crucial to the uncertainty quantification of extreme damage events. Such a relationship can be used to advantage with highly homogenized theories of material mechanics and physics. This topic will be studied here as an application of the framework. The reminder of the paper is organized as follows. Section <ref> presents the general data-driven statistical reduced-order modeling framework. Section <ref> introduces the polycrystal model, which is utilized to create the spatiotemporal data for the development of the statistical reduced-order model. Section <ref> shows the results of the statistical quantification of dynamical loading from the reduced-order model. Conclusion and discussions are included in Section <ref>. § DATA-DRIVEN STATISTICAL REDUCED-ORDER MODELING FRAMEWORK After obtaining the spatiotemporal solution describing the process of deformation leading to porosity-based ductile damage from a polycrystal simulation utilizing a sophisticated physical model, the data-driven statistical reduced-order modeling framework is as follows. * Compute the time evolution of the PDF associated with a certain state variable from the spatiotemporal solution. * Compute the time evolution of the leading few moments of the state variable to reach a coarse-grained representation of the statistics. * Discover the underlying dynamics of these moments. * Apply the identified model to forecast the moments. * Reconstruct the time evolution of the PDF using the predicted moments via the maximum entropy principle. Figure <ref> provides a schematic diagram containing an overview of the above procedure. The single crystal theory and computational polycrystal models that create the polycrystal simulation results will be presented in Section <ref>. The remaining section contains the details of the statistical reduced-order modeling procedure. Denote by u a scalar state variable of the statistical reduced-order model, for example, the von Mises stress. §.§ Computing the PDF and the moments At each time instant, denote by u(x_i,y_j,z_k) the value of u at the spatial location (x_i,y_j,z_k) under the three-dimensional coordinate system, where i=1,…,I, j=1,…,J and k=1,…,K. The PDF and the moments are computed based on the total IJK data points. The PDF p(u) is given by a normalized histogram that satisfies the condition ∫_-∞^∞ p(u) ụ= 1. The n-th centralized moment is defined as <cit.> μ_1 = ∫_-∞^∞ u p(u) ụ, n = 1, μ_n = ∫_-∞^∞ (u-μ_1)^n p(u) ụ, n≥2. After normalizing the moments for n≥ 3 by taking μ̃_n=μ_n/(μ_2)^n/2, each of the scaled moments μ̃_n describes a particular aspect of the corresponding PDF. Further define μ̃_1=μ_1 and μ̃_2=μ_2. The leading few scaled moments μ̃_n with n=1,…,N are used in developing the statistical reduced-order model as the coarse-grained representation of the statistics. Hereafter μ̃_n is called the n-th moment for the conciseness of presentation. To allow the reconstruction of a non-Gaussian PDF via the maximum entropy principle, the following two conditions need to be satisfied <cit.>. First, at least N≥3 moments are required in the PDF reconstruction to include the information beyond the Gaussian statistics. Second, N must be an even number; otherwise the maximum entropy principle fails to provide a well-defined PDF. Therefore, the minimum number of the scaled moments to be adopted is N=4. The leading four scaled moments are mean, variance, skewness, and kurtosis. Skewness is a measure of the asymmetry of a PDF. For a unimodal distribution, negative skew commonly indicates that the tail is on the left side of the distribution, and positive skew indicates that the tail is on the right. Kurtosis describes the tail behavior of a PDF. Higher kurtosis corresponds to a larger probability of extreme events or outliers. The kurtosis for a Gaussian distribution has a value of 3. When the kurtosis exceeds 3, the distribution usually has fat tails which may correspond to the triggering of extreme events. For problems involving material damage, the shape of the PDF and tail character becomes very important. In the following, N=4, namely the leading four scaled moments, are utilized in developing the statistical reduced-order model for the process of the ductile damage in polycrystal simulations. Such a choice of N will be justified by computing the lack of information in the reconstructed PDF based on these moments and the truth. §.§ Discovery of the moment equations via a causality-based sparse identification learning algorithm To discover the possible underlying dynamics of the leading N moments, a causality-based learning algorithm is utilized <cit.>. The method is summarized in Figure <ref> with the following steps. §.§.§ Developing a function library First, a library 𝐟 consisting of in total M possible candidate functions to model the right-hand side of the moment equations is proposed, 𝐟 = {f_1,…, f_m-1, f_m, f_m+1, …, f_M}. The development of such a library is subjective based on empirical and expert knowledge. Typically, a large number of candidate functions is included in the library to allow for coverage over different possible dynamical features of the underlying unknown true system. This also allows for the opportunity to learn new physical relationships from the physical information. §.§.§ Computing the causation entropy Next, a causation entropy C_f_m→μ̇̃̇_n |[𝐟\f_m] is computed to detect if the candidate function f_m contributes to the dynamics of μ̃_n, namely ̣̃μ_n/ṭ :=μ̇̃̇_n. It reads <cit.>: C_f_m→μ̇̃̇_n |[𝐟\f_m]=H(μ̇̃̇_n|[𝐟\f_m]) - H(μ̇̃̇_n|𝐟). In Eq. (<ref>), the set 𝐟\f_m represent a new set that includes all functions in 𝐟 except f_m. It thus contains M-1 candidate functions and is defined as 𝐟\f_m = {f_1,…, f_m-1,f_m+1,…, f_M}. The term H(·|·) is the conditional entropy, which is related to Shannon's entropy H(·) and the joint entropy H(·, ·). For two multi-dimensional state variables 𝐗 and 𝐘, they are defined as <cit.>: H(𝐗) = -∫_x p(𝐱)log(p(𝐱))x, H(𝐘| 𝐗) = -∫_𝐱∫_𝐲 p(𝐱,𝐲)log(p(𝐲|𝐱))yx, H(𝐗,𝐘) = -∫_𝐱∫_𝐲 p(𝐱,𝐲)log(p(𝐱,𝐲))yx. On the right-hand side of Eq. (<ref>), the difference between the two conditional entropies indicates the information in μ̇̃̇_n contributed by the specific function f_m given the contributions from all the other functions. Thus, it tells if f_m provides additional information to μ̇̃̇_n conditioned on the other potential terms in the dynamics. It is worthwhile to highlight that the causation entropy in Eq. (<ref>) is fundamentally different from directly computing the correlation between μ̇̃̇_n and f_m, as the causation entropy also considers the influence of the other library functions. If both μ̇̃̇_n and f_m are caused by a common factor f_m^', then μ̇̃̇_n and f_m can be highly correlated. Yet, in such a case, the causation entropy C_f_m→μ̇̃̇_n |[𝐟\f_m] will be zero as f_m is not the causation of μ̇̃̇_n. The causation entropy is computed from each of the candidate functions in 𝐟 to each μ̇̃̇_n. Thus, there are in total NM causation entropies, which can be written as a N× M matrix, called the causation entropy matrix. Note that the dimension 𝐗 in Eq. (<ref>) is M when it is applied to compute the second term on the right-hand side of the causation entropy in Eq. (<ref>). This implies that the direct calculation of the entropies in Eq. (<ref>) involves a high-dimensional numerical integration, which is, however, a well-known computationally challenging issue <cit.>. To circumvent the direct numerical integration, the entropy calculation is based on the following approximate method that utilizes a Gaussian fit to each distribution. By approximating all the joint and marginal distributions as Gaussians, the causation entropy can be computed in the following way: C_𝐙→𝐗 | 𝐘 =H(𝐗 | 𝐘)-H(𝐗 | 𝐘, 𝐙) = H(𝐗,𝐘) - H(𝐘) - H(𝐗,𝐘,𝐙) + H(𝐘,𝐙) = 1/2ln(det(𝐑_𝐗𝐘))-1/2ln(det(𝐑_𝐘)) - 1/2ln(det(𝐑_𝐗𝐘𝐙)) +1/2ln(det(𝐑_𝐘𝐙)), where 𝐑_𝐗𝐘𝐙 denotes the covariance matrix of the state variables (𝐗,𝐘,𝐙) and similar for other covariances. The notations ln(·) and det(·) are the logarithm of a number and determinant of a matrix, respectively. The explicit expression in Eq. (<ref>) based on the Gaussian approximation can efficiently compute the causation entropy. It allows the computation of the causation entropy with a moderately large dimension, which is typically the case for a low-order system containing the leading few moment equations. It is worth noting that the Gaussian approximation may lead to certain errors in computing the causation entropy if the true distribution is highly non-Gaussian. Nevertheless, the primary goal here is not to obtain the exact value of the causation entropy. Instead, it suffices to detect if the causation entropy C_f_m→μ̇̃̇_n |[𝐟\f_m] is nonzero (or practically above a small threshold value). In most applications, if a significant causal relationship is detected in the higher-order moments, it is very likely in the Gaussian approximation. This allows us to efficiently determine the sparse model structure, where the exact values of the nonzero coefficients on the right-hand side of the identified model will be calculated via a simple maximum likelihood estimation to be discussed in the following. Note that the Gaussian approximation has been widely applied to compute various information measurements and leads to reasonably accurate results <cit.>. §.§.§ Determining the model structure with sparse identification With the N× M causation entropy matrix in hand, the next step is determining the model structure. This can be done by first setting up a threshold value of the causation entropy and then retaining only those candidate functions that have the causation entropies exceeding the threshold. This allows the identified system to contain only functions that have significant contributions to the dynamics. In other words, the identified system has a sparse model structure. Sparsity is crucial to discovering the correct underlying physics and prevents overfitting <cit.>. It will also guarantee the robustness of the model in response to perturbations and allow the model to apply to certain extrapolation tests, for example, the statistical forecast of other data sets with similar but not identical features. Physical or statistical constraints can be added to the above model identification procedure. One important constraint is called the physics constraint. It means the conservation of energy in the quadratic nonlinear terms are important properties in many complex turbulent systems <cit.>. The physics constraint prevents the finite-time blow-up of the solutions and facilitates a skillful medium- to long-range forecast. To incorporate the physics constraint into the model identification, it is essential to keep or remove the related terms simultaneously. §.§.§ Parameter estimation The final step is to estimate the parameters in the identified model. Denote by 𝐔 an N-dimensional column vector containing the leading N moments, namely 𝐔=(μ̃_1,…, μ̃_N)^𝚃, where ·^𝚃 is the vector transpose. The identified system consisting of the moment equations can be written in the vector form: U/ṭ = Φ(𝐔), where Φ(𝐔) is an N-dimensional column vector with each entry representing the summation of the remaining nonlinear candidate functions from the causality-based learning algorithm for each component of 𝐔. Denote by Θ∈ℝ^s a column vector containing all the parameters in the identified model with s≫ n in a typical situation. The right-hand side of Eq. (<ref>) can be written as Φ(𝐔) = 𝐌Θ + 𝐐, where 𝐌∈ℝ^N× s is a matrix each entry of which is a function of 𝐔 while 𝐐∈ℝ^N is a column vector that depends on 𝐔. Only 𝐌 is multiplied by the parameters Θ. Assume data comes in a sufficiently high frequency in time, which is the typical case if the data is computed from a complicated physical model and the frequency of data dumps with time is completely controlled. Then consider a temporal discretization of Eq. (<ref>) using a first-order forward Euler scheme from time t_j to t_j+1 <cit.>. Further assign the data value to the variables at both time instants. This leads to the following relationship from t_j to t_j+1, 𝐔^j+1 = 𝐔^j + Φ(𝐔^j) Δt + σε^j√(Δt), where Δt is a small time step from t_j to t_j+1, and ε^j is an independent and identically distributed (i.i.d.) standard multidimensional Gaussian random number, representing the residual of the parameter fitting, and σ∈ℝ^N× N is a diagonal matrix representing the strength of the residual. Further assume σ is a constant matrix over time. Due to the Euler approximation, the one-step time evolution from 𝐔^j to 𝐔^j+1 is approximated by a linear function within such a short time interval. Therefore, the likelihood can be computed based on a Gaussian distribution, 𝒩 (μ^j, Σ) = C |Σ|^-1/2exp(- 1/2 (𝐔^j+1 - μ^j)^𝚃 (Σ)^-1 (𝐔^j+1 - μ^j)), where C is a normalization constant. The mean and the covariance of such a Gaussian distribution are given by μ^j = 𝐌^j Θ + 𝐐^j+ 𝐔^j and Σ = σσ^𝚃Δt, respectively. Taking the logarithm to cancel the exponential function and summing up the likelihood over the entire time period yield ℒ = 1/2∑_j=1^J (𝐔^j+1 - 𝐌^j Θ - 𝐐^j - 𝐔^j)^𝚃 (Σ)^-1 (𝐔^j+1 - 𝐌^j Θ - 𝐐^j - 𝐔^j) - J/2log |Σ| , where J+1=⌊ T/Δt⌋ with ⌊·⌋ being the floor function that rounds down the result to the nearest integer. To find the minimum of ℒ, it is sufficient to compute the zeros of ∂ℒ/∂Θ =0 and ∂ℒ/∂Σ =0, which leads to Σ = 1/J∑_j=1^J (𝐔^j+1 - 𝐌^j Θ - 𝐐^j-𝐔^j)(𝐔^j+1 - 𝐌^jΘ - 𝐐^j-𝐔^j)^𝚃 , Θ = 𝐃^-1𝐜, where 𝐃 = ∑_j=1^J (𝐌^j)^𝚃Σ^-1𝐌^j and 𝐜 = ∑_j=1^J(𝐌^j)^𝚃Σ^-1(𝐔^j+1 - 𝐐^j-𝐔^j). The equations in Eq. (<ref>) are solved by first setting Θ=0 to find Σ in Eq. (<ref>) via essentially the quadratic variation, and then plugging in the result into Eq. (<ref>) and Eq. (<ref>) to obtain Θ. The analytic solution in Eq. (<ref>)–Eq. (<ref>) significantly facilitates the estimation of the parameter values compared with using a numerical solver for a non-convex optimization problem resulting from a constrained regression based on, for example, an L1 penalty <cit.>. The computational cost in Eq. (<ref>)–Eq. (<ref>) is proportional to the square of the number of functions in the identified model (in computing 𝐃) and to the total number of observational points in time. Since the goal is to find a parsimonious model, the number of the candidate functions remaining in the model is expected to be small, which leads to a relatively low computational cost in solving Eq. (<ref>)–Eq. (<ref>). In addition to the information provided by the data, including prior knowledge, such as the physical laws, can significantly facilitate the learning process. Such additional knowledge often appears in the form of constraints, many of which are characterized by imposing certain relationships in the model parameters. In such a situation, the above formulae can be slightly adjusted. Assume the constraints are imposed to the model parameters with the following form, 𝐇Θ = 𝐠, where 𝐇 and 𝐠 are constant matrices. To incorporate these constraints, the Lagrangian multiplier method is applied, which modifies the objective function in Eq. (<ref>), ℒ = 1/2∑_j=1^J (𝐔^j+1 - 𝐌^j Θ - 𝐐^j- 𝐔^j)^𝚃 (Σ)^-1 (𝐔^j+1 - 𝐌^j Θ - 𝐐^j - 𝐔^j) - J/2log |Σ^-1| + λ^𝚃 (𝐇Θ - 𝐠), where λ is the Lagrangian multiplier. The solution to the minimization problem with the new objective function Eq. (<ref>) is given as follows <cit.>, Σ = 1/J∑_j=1^J (𝐔^j+1 - 𝐌^j Θ - 𝐐^j - 𝐔^j)(𝐔^j+1 - 𝐌^jΘ - 𝐐^j- 𝐔^j)^𝚃 λ = (𝐇𝐃^-1𝐇^𝚃)^-1 (𝐇𝐃^-1𝐜 - 𝐠), Θ = 𝐃^-1( 𝐜 - 𝐇^𝚃λ), where 𝐃 and 𝐜 are defined in Eq. (<ref>). §.§ PDF reconstruction via maximum entropy principle The identified model from the above learning algorithm gives the value g_n of the moment μ̃_n for n=1,…,N at each time instant. These N moments can be utilized to reconstruct a least biased approximate PDF via the so-called maximum entropy principle <cit.>. Define the set 𝒞_N that contains all possible distributions, the leading N moments μ̃_n of which satisfy μ̃_n=g_n for n=1,…,N: 𝒞_N = {p|μ̃_n = g_n, 1≤ n≤ N}. The least biased probability distribution p̃ given the constraints 𝒞_N is the one that maximizes the entropy, max_p∈𝒞_N𝒮(p) = 𝒮(p̃), p̃∈𝒞_N, where entropy is defined as 𝒮(p) = -∫ p(u) ln(p(u)) ụ. Therefore, solving the least biased distribution p̃ becomes a constrained optimization problem. The cost function is the entropy in Eq. (<ref>). The constraints are given by the N equalities in the set Eq. (<ref>) together with the two additional constraints that all the distributions need to satisfy, that is, ∫ p(u)ụ = 1 and p(u)≥0. §.§ Quantifying the lack of information in the reconstructed PDF via relative entropy With the reconstructed PDF in hand, it is essential to assess its difference (or the so-called lack of information) compared with the true distribution. The comparison involves three PDFs. They are (a) the true PDF computed from the solution of the physical model, (b) the reconstructed PDF using the leading few moments of the truth, and (c) the reconstructed PDF using the same number of moments as (b) but from running the moment equations. The difference between (b) and (a) characterizes the lack of information using the coarse-grained description of the statistics, namely what is lacking in the leading N moments. Such a difference reflects the intrinsic barrier that cannot be overcome by further optimizing the reconstructed PDF unless an additional number of moments is included. A smaller difference is preferred as it implies a more skillful approximation using these N moments. The difference between (c) and (b) accesses the model error of the moment equations. Such an error is expected to be minimized by the optimization procedure in the model identification and parameter estimation. The difference between (c) and (a) is the total error in the results from the moment equations compared with the truth. The traditional path-wise measurements, such as the root-mean-square error or the standard Euclidean norms, are not appropriate to quantify the difference between the two distributions. The main reason is that these measurements give a very low weight toward the tails of the distributions, which are, however, the crucial part of describing the probability of extreme events. Therefore, an information criterion is introduced here, which is called the relative entropy, that can be utilized to quantify the difference between two PDFs p and p̃, where p is the truth or the one that contains more information while p̃ is the approximate PDF or the PDF which has an error. The relative entropy is given by <cit.> 𝒫(p,p̃) = ∫ p(u) ln(p(u)/p̃(u)) ụ. The relative entropy 𝒫(p,p̃), which is also known as Kullback-Leibler (KL) divergence or information divergence <cit.>, is an objective metric for the difference between two PDFs that measures the expected increase in ignorance, or lack of information, about the system incurred by using p^M, when the outcomes are generated by p. It has two important features. First, 𝒫(p,p̃) is positive unless p = p̃. The relative entropy increases monotonically with the difference between the two PDFs. Second, 𝒫(p,p̃) is invariant under general nonlinear change of variables. This is crucial in practice as different communities often use distinct coordinates and units. It also means that relative entropy is a dimensionless measurement. Finally, it is worthwhile to highlight that the ratio between p(u) and p̃(u) is utilized to characterize the difference between the two PDFs. This indicates that even though both the PDFs can have small values at the tail, the ratio p(u)/p̃(u) can be large if the result from the moment equation (namely, p̃(u)) severely underestimates the probability of extreme events. In such a case, the relative entropy becomes large, indicating the lack of skill in p̃(u) in quantifying the uncertainty of extreme events. §.§ Additional remarks The model identification method utilized here is only one of many sparse identification approaches <cit.>. In principle, other model identification methods or computational algorithms can also be applied for the experiments in Section <ref>. The reason for using this specific method is that it separates model identification from parameter estimation, where the latter can be efficiently solved with closed analytic formulae. For more complicated cases, additional latent processes may become essential to advance the model identification of the quantity of interest. In such a situation, an iterative method, which alternates between model identification, learning the latent processes, and parameter estimation, can be developed based on the framework utilized here <cit.>. It is also worthwhile to notice that the variance and kurtosis are non-negative. This condition is satisfied in all the results presented in Section <ref> since the values of these moments are typically far from zero, especially when extreme events are about to occur. A model creating negative variance and kurtosis is thus very unskillful and is unlikely to be selected by the learning algorithm. Yet, such a positivity condition is not automatically guaranteed within the current framework. A straightforward remedy to ensure the positivity of these moments is to identify the governing equation of the square root of the even-order moments and then take the square of the model simulation results to recover the moments. § SOFT-COUPLED DAMAGE AND POLYCRYSTAL MODELS We seek a micromechanical understanding of the conditions which contribute to the formation of pores for states of high triaxiality loading and with a particular focus on a computational database for a high-purity tantalum material. The basis for this computational database of interest to this work is a plate impact experiment which is previously reported upon <cit.> with particular interest to the tantalum on tantalum experiment and material pedigree information. We employ both free surface velocity trace, and the cross-sectioned soft recovered sample, which is also examined in prior work <cit.>. In <cit.>, a macroscale continuum damage model from the pedigree <cit.> is developed and used to describe the experimental results described in <cit.>. The tantalum on tantalum plate impact experimental result, in particular, was well described, and the simulation results were found to be independent of computational element size by natural regularization of deformation rate sensitivity contained in the plasticity model and an inertial term which is included in the equation of motion of the thick-walled sphere representation of a pore. The experiment was material and geometry symmetric so that the center of the damage field in the shock direction was at the center of the sample. With the experimental free surface velocity trace and the damage field well represented by the numerical results of the damage model, these computed results were then used to quantify the principal stress history at the center of the sample to the point in time when the damage model indicated porosity initiation. This occurred at 2.140 μs after impact, as indicated by the time of maximum shock direction tensile stress. See Figure <ref>. From this history of the principal stresses, one can see an initial period of rapid ramped increase in compressive stress as the shock wave reached the center of the sample. This is followed by a period of relatively constant stress over a period of 0.88 μs followed by rapid unloading and tensile reloading as the reflected tensile waves interact and lead to the onset of damage. This principal stress profile is approximated by three linear segments as indicated by the data points in Figure <ref>. This piece-wise linear profile is then applied to a series of computational statistical volume elements (SVEs) representing the tantalum material used in the experimental study <cit.>. Note that the profile used is offset in time by 0.47 μs, the time it takes the shock wave to travel to the center of the sample. The applied profile is given in Table <ref>. The loading profile derived from the computed representation of experimental data using the damage model <cit.> and defined in Table <ref> is applied to a series of ten SVE polycrystal models of the experimental material. These models were constructed based upon the tools and methodology reported by <cit.>. The term SVE differs from that of representative volume element (RVE) in that the volume of sampling of the former may not be large enough to adequately represent the statistical response of larger volumes. For example, two SVE units will provide differing stress response to deformation and the PDF of state variables of interest, while two RVE units will provide similar measured response. The tantalum material microstructure was characterized by electron-backscatter diffraction (EBSD) metallography of the three principal plate directions. These EBSD data sets were then used within the open-source code Dream.3D <cit.> to construct statistically representative 3D numerical microstructure cubes with between 65 and 100 grains represented within each volume. The methodology discussed in <cit.> uses STL files produced by Dream.3D to construct tetrahedral mesh tessellations of each grain and renders grain boundary conforming polycrystal models. The crystallographic orientations assigned to each grain in the ten SVEs were chosen by Dream3D to match the experimental EBSD crystallographic texture. This is important in our study of damage in polycrystalline materials. With each cube face constrained to remain flat and unrotated, each of the ten polycrystal realizations was loaded by applying the stress profile given in Table <ref> to the primary faces of each cube. Cross-sectional images of six of these polycrystal models are shown in Figure <ref>. Cross-sectional images of von Mises stress contour plots in the six SVE simulations at the maximum tensile stress state and the condition at which the damage model suggested porosity nucleation began are illustrated in Figure <ref>. The single crystal theory used to describe the deformation behavior of the tantalum material was developed along the lines of prior work by <cit.>. The single crystal theory and results are to be found in <cit.> and so will only be briefly summarized here for completeness. The model is written for large deformation and therefore the total deformation gradient is multiplicatively decomposed in elastic (with crystallographic rotation) and plastic components by 𝐅=𝐅^*𝐅^p. Accordingly for crystal mechanics, the plastic velocity gradient is given by 𝐋^p=∑_α=1^N γ̇^α_p𝐒^α_0, where γ̇^α_p is the plastic shear rate on slip system α and 𝐒^α_0 is the Schmid projection tensor for slip system α. The second Piola-Kirchhoff stress is given as a function of the energy conjugate Green-Lagrange elastic strain and the thermal expansion term 𝐓^* = ℂ(θ) [ 𝐄^*-𝐀( θ-θ_0 ) ], for temperature θ, reference temperature θ_0, thermal expansion coefficient tensor 𝐀, and elastic stiffness tensor ℂ(θ). The elastic Green-Lagrange strain is defined by 𝐄^*=1/2( 𝐅^*^T𝐅^* - 1). For interests of this work, dislocation motion is well within the regime of thermally activated glide <cit.> and therefore the flow rule is given by γ̇^α_p=γ̇^0_pexp( -Δ G/k_Bθ⟨ 1 - ⟨τ_eff^α/s^α_l⟩ ^p⟩ ^q), for τ^α>0, otherwise γ̇_p=0, where γ̇_0 is the reference shear rate, Δ G is activation energy, τ^α_eff=τ̃^α-s̃^α is the non-Schmid resolved effective shear stress for slip system α, s̃^α is the resistance to dislocation motion due to dislocation interactions, and s̃^α_l is the intrinsic lattice resistance. The brackets ⟨·⟩=1/2(|·|+(·)). The modified resolved shear stress including the non-glide stresses for BCC crystal systems is τ̃^α=𝐓^* : (𝐒^α_0+𝐒̃^α_0). The Schmid tensor 𝐒^α_0 and the additional projection tensor involving non-glide stresses 𝐒̃^α_0 are given by 𝐒^α_0 =𝐦^α_0⊗𝐧^α_0, 𝐒̃^α_0 =ω_1𝐦^α_0⊗𝐧^'α_0+ω_2(𝐧^α_0×𝐦^α_0)⊗𝐧^α_0+ω_3(𝐧^'α_0×𝐦^α_0)⊗𝐧^'α_0, ω_i =ω_i,ss+(ω_i,0K-ω_i,ss)exp(-θ/θ_r), where 𝐦^α_0 and 𝐧^α_0 are slip system α direction and plane normal respectively, 𝐧^'α_0 is an additional non-Schmid direction, and ω_i are empirical weighting factors. The dislocation structure and intrinsic lattice resistances are given by s̃^α=s^αμ(θ)/μ_0, s̃^α_l=s^α_lμ(θ)/μ_0, where s^α and s^α_l are the structural resistance and the intrinsic lattice resistance at 0 K, respectively, μ_0 is the anisotropic shear modulus at 0 K and μ(θ) is the temperature-dependent anisotropic shear modulus at current temperature. The rate and temperature dependent saturation value of the structural resistance is given by s^α_ss=s^α_ss,0(γ̇^α_p/γ̇^0_p)^kθ/A, where s^α_ss,0 is reference resistance and A is reference energy. The structural resistance evolves with dislocation structure evolution during plastic deformation and is given by ṡ^α =∑_β=1^N h_αβ|γ̇^β_p|, h_αβ =(q_i+(1+q_i)δ_αβ)h_β, h_β =h_0(s^β_ss-s^β/s^β_ss-s^β_0), with q_i the latent hardening ratio, initial self-hardeing rate h_0, and the initial slip system resistance s_0^β. The full model, values of material parameters, the procedure by which they were evaluated, and the model performance compared against experimental results for Eq. (<ref>)–Eq. (<ref>) can be found in <cit.>. § STATISTICAL QUANTIFICATION AND PREDICTION OF THE POLYCRYSTAL SIMULATIONS §.§ Setup The dynamic behavior of materials under shock loading conditions on polycrystal realizations of a representative BCC tantalum is studied here in reference to plate impact experiments. These are conceptually simple in that a stationary circular disk (the target sample) is impacted by another circular disk (the flyer) moving at high velocity. The flyer is accelerated through a gun barrel by either compressed gas or in some cases, ignited gunpowder. The flyer is soft-mounted on a sabot that travels through the barrel. One simulation from the polycrystal model (the first one in Figure <ref>; defined as simulation #1 hereafter) is utilized to determine the moment equations. The cubic SVE has an initial dimension of 165 μ m on a side. The simulation contains 69 grains with grain shape and crystallographic orientation populations derived from electron backscatter diffraction (EBSD) results and used in SVE construction by Dream3D. At the time t=0, principal stresses, as described earlier, are imposed on the faces of the cube with the time profile defined in Figure <ref> and Table <ref>. The entire simulation covers the period from t=0 to t=1.67μ s, ending when the damage model indicates that porosity initiation occurs. Computed data is written for 48 sequential times during the loading profile for each of the six simulations considered in this work. At each time instant, there are 540,436 data points in space corresponding to the number of integration points in the realization #1 model, sufficient to eliminate sampling error in computing the one-dimensional statistics. Although any material state variable can be characterized within this framework, the quantity of interest for the statistical reduced-order model studied here is the von Mises stress. The entire process can be divided into three stages. The first stage goes from t=0 to t=0.23μ s, which is the period of compression ramp. The second stage goes from t=0.23μ s to t=1.105μ s, representing the time of shock wave travel through the sample center with relatively constant compressive stress. The third stage is from 1.105μ s onward, which is the period at the end of the compressive wave travel, unloading, and subsequent release wave interaction caused tensile loading leading to porosity nucleation. Once the moment equations are determined, they will first be applied to predict the statistics for the same polycrystal simulation starting from t=0 to validate the learning results. Then, the model will be used to forecast the time evolution of the statistics for the remaining five polycrystal simulations in Figure <ref> with the same loading condition but with different numbers of grains and orientations. This is called an extrapolation test, which is crucial to demonstrate that the identified model is generalizable to different scenarios. Two statistical model experiments are carried out here. In the first experiment, the data from the polycrystal simulation is utilized to learn a four-dimensional model that characterizes the time evolution of the leading four moments. In the second experiment, the time evolution of the mean is treated as known, and the goal is to identify the moment equations for the variance, skewness, and kurtosis, which is a three-dimensional system. The motivation of the second experiment is that the mean is usually computed by continuum-based damage models or measured accurately from experiments. However, the higher-order moments are typically not readily available. Therefore, finding a relationship between the mean and the higher-order moments has practical significance in characterizing and predicting the information associated with the extreme damage events contained in the higher-order moments. Discovering such a relationship also helps understand if the mean stress interacts with high-order moments and extreme events in a simple additive way or a more complicated nonlinear and multiplicative way. §.§ Non-Gaussian statistics and information characterized by the leading four moments Figure <ref> shows the statistics of the von Mises stress computed from the polycrystal simulation #1. The time evolution of the statistics (pink color) demonstrate an apparent three-stage behavior consistent with the three-stage loading process described in Section <ref>. During the first stage (up to t=0.23μ s), the mean and the variance increase monotonically, which is a natural outcome due to the loading condition causing the material compression. The skewness remains near zero; therefore, the PDFs are symmetric around the mean. The kurtosis at the initial period is about 3.5, which results in moderate fat tails, as is expected from the compression. At t=0.23μ s, the kurtosis becomes less than 3, suppressing the fat tails and leading to a sub-Gaussian distribution. Next, during the second stage (from t=0.23μ s to t=1.105μ s), the sustained compressive stress with the shock wave traveling through the sample center induces a slow decaying of the mean and the variance. In contrast, the skewness and the kurtosis are nearly static. The skewness stays around a constant value of 0.2 while the kurtosis is about 2.5. The corresponding PDFs have weak bimodal structures. Yet, no significant extreme events are observed within this period due to the low kurtosis. These statistics experience the most significant changes during the third loading period (from t=1.105μ s to t=1.67μ s). In addition to a first decrease and then an increase of the mean and the variance, both the skewness and the kurtosis increase dramatically. It is important to note that even though the stress profile applied to the SVE cube becomes zero while transitioning from compressive to tensile loading, the significant plastic deformation heterogeneity developed during the compressive loading process within the SVE maintains a value of von Mises stress of near 200 MPa at its minimum value. As a result, the PDF at each instant within this period manifests strong non-Gaussian features with a skewed profile and a one-sided fat tail towards the positive side that corresponds to extreme stress conditions, which may in turn cause damage events. One crucial feature observed from Figure <ref> is that the reconstructed PDF using the leading four moments via the maximum entropy principle (black) successfully captures the true PDF (pink), especially the non-Gaussian characteristics. Despite small errors observed at the first few instants, the strongly skewed PDFs with fat tails are recovered accurately at later instants. As shown in Panel (c), the relative entropy that quantifies the gap between these two PDFs remains very low. It thus provides a quantitative justification that using the leading four moments is sufficient to characterize the time evolution of the dynamic loading process, including representing the statistical features of the development of extreme stress-driven events. Notably, the reconstructed PDFs accurately recover the tail probabilities when non-Gaussian fat-tailed distributions appear, implying that the uncertainty associated with the extreme events can be precisely characterized by the leading four moments. Figure <ref> includes a comparison of the PDFs between simulation #1 and the other five simulations at different time instants. According to Panel (a), these simulations have overall similar time evolution of non-Gaussian statistics, especially the fat-tailed distributions at the final time instant. Yet, discrepancies are also seen between different realizations. Panel (b) shows the relative entropy as a function of time, which quantifies the difference between these realizations. Such differences provide a suitable case for the extrapolation tests. These results also clearly demonstrate the number of grains and total volume of the SVEs is not large enough to achieve statistical steady-state pertaining to the von Mises stress. §.§ Experiment I: Learning the moment equations of the leading four moments In the first experiment, the data from the polycrystal simulation #1 is utilized to learn the moment equations associated with the leading four moments. The library of candidate functions includes all the linear and quadratic nonlinear interactions between mean (m), variance (v), skewness (s), and kurtosis (k). The so-called physics constraint, introduced in Section <ref>, is incorporated into the model identification process. The physics constraint is one of the most fundamental constraints in modeling nonlinear dynamical systems <cit.>, which requires the total energy of the identified model resulting from the quadratic nonlinear terms to be conserved. This is motivated from the physical laws and energy exchange of many physical systems. Without taking into account the physics constraint, the identified models can have finite time blowup of solutions and pathological behavior of their statistics when they are applied for the forecast even though they match the data with high precision. In addition to these moment quantity dynamical terms, forcing terms are also imposed on the model identification. These forcing terms do not depend on m, v, s, or k, but they can be functions of time t. To be consistent with the physical justifications in Section <ref>, the forcing is divided into three periods. Linear functions of t are adopted for the first and second periods, which are the natural choices corresponding to the linear driving stresses. On the other hand, the linear driving stress interacting with the underlying nonlinear dynamics induces a strong nonlinear response of the time evolution of the moments associated with the von Mises stress in the third period, which cannot be fully characterized by adopting a linear forcing. To this end, a quadratic function of t is utilized for this last period. Different forcing terms are imposed on each moment equation as a starting point, F(t) = {[ f_1 + f_2 t, t_0 < t ≤ t_1; f_3 + f_4 t, t_1 < t ≤ t_2; f_5 + f_6 t + f_7 t^2, t_2 < t ≤ t_3. ]. The results with various simplifications of the forcing representations will be presented at the end of this subsection. To determine the model structure, the causation entropy is computed from each candidate function to each of the moments. The threshold value is to be r=0.09. If the causation entropy is above this value, then the corresponding candidate function is retained. With these choices of the hyper-parameters, the identified model structure is shown in Figure <ref> with the associated model parameters listed in Table <ref>. Note that this threshold must be chosen to be positive, as the numerically calculated causation entropy will never be precisely zero. Nevertheless, this threshold should remain small to consider all essential terms in the dynamics. Changing this threshold value will increase or decrease the number of terms in the identified model. But perturbing the threshold within a reasonable range around r=0.09 still leads to similar dynamical behavior as the model presented below, indicating the relative robustness of the method. Figure <ref> compares the truth (pink) and the predicted statistics from the identified model (blue) starting from t=0 for simulation #1. The time evolution of the moments is predicted quite accurately, especially for the first and second time periods. The details of the complicated structures in the third time period are not entirely captured. But the overall tendency is predicted by the identified moment equations. First, the predicted time evolution of the mean from the model is nearly identical to the truth, which indicates that the statistical reduced-order model well captures the averaged behavior of the sophisticated physical model. Second, the model perfectly describes the kurtosis being slightly larger than 3 (the Gaussian value) during the first compression stage and decreasing to around 2.5 during the second stage with the compressive stress. In other words, the precursor of the extreme damage events is appropriately characterized by the model. The model prediction also follows the rapid increase of the kurtosis in the third stage and provides an accurate forecast of the strong positive skewness. Capturing these two significant features allows the model to precisely predict the one-sided fat tail distribution characterizing the uncertainty resulting from extreme events. Based on the skillful recovery of the moments, the reconstructed PDFs also illustrate similar features as the truth in most instances. The only exception to the accurate PDF forecast occurs around t=1.559μ s due to a slight overestimation of the variance. The error in the forecast PDF around that time instant mainly comes from the inaccurate estimation of probability for moderate or small stress values. Nevertheless, it is worth highlighting that the tail behavior on the positive side for the time instants is consistently well predicted, including the one at t=1.559μ s (see the panels with the y-axis showing in the logarithm scale). This is a significant feature, which indicates that the uncertainty quantification of the extreme events using the statistical reduced-order model is entirely accurate throughout time. In other words, the model can provide a precise probabilistic forecast of the timing of the occurrence of extreme damage events, similar to the one computed from the much more expensive and sophisticated physical model. Figure <ref> shows the results of the extrapolation test. Recall that the moment equations were identified using the first SVE von Mises stress data set (simulation #1). Extrapolation means such identified moment equations are applied to predict the time evolution of the statistics of the other SVE data sets. Skillful extrapolations indicate that the identified model is generalizable and can be used for efficient forecast beyond the situation of the training data set. The forecast of the identified model for the second SVE data set (simulation #10; thick pink color) is presented in Figure <ref>, which results from using the same loading condition but different numbers of grains (in total 66) and microstructure relative to simulation #1 and shown in Figure <ref>. In these extrapolation tests, the exact values of the leading four moments from simulation #10 serve as the initial conditions for the forecast using the moment equations identified from the simulation #1. Simulation #10 is also used to measure forecast accuracy. It is seen that the forecasts starting from different time instants covering the three stages are all reasonably accurate. Notably, the predicted kurtosis coincides with the truth, which remains at small values below 3 over the second time period and experiences a rapid increase over the third time period. It implies that the predictions of the tail probability that corresponds to the quantification of uncertainty in extreme damage events and its statistical precursors are both accurate. The extrapolation tests for the other four SVE data sets are quantitatively similar and are included in Figure <ref>. The results here indicate that the identified model is skillful and robust for the extrapolation test of predicting different polycrystal realizations. Finally, Figure <ref> includes additional tests of the model identification. Similar to the previous setup, the model is learned from simulation #1, while the extrapolation test is based on simulation #10. Only the time evolution of the mean and its forecast using different identified models is shown. The qualitative results remain the same for other moments, and, in general, higher-order moments have more significant errors. The result in Panel (a) reveals that the forcing terms play an important role in capturing the time evolution of the moments. Without the forcing terms, the optimal identified model built upon the same library is insufficient in characterizing the transitions in the time evolution of the moments. Adding more candidate functions and increasing the complexity of the model can improve the fitting results but will make the model lose the extrapolation skill. Panel (b) shows the forecast using the identified model, where the same forcing terms and coefficients are applied to all four moment equations. This critical test indicates that different moments driven by the same external forcing in an additive way fail to provide a skillful model. This suggests that if there is one common external forcing, it must interact with different moments in a complicated nonlinear way. This conjuncture will be further validated in Section <ref>. Panel (c) illustrates that if the model is imposed with only a one-stage forcing that is a quadratic function of time, then the model is again insufficient to characterize the time evolution of the moments. Nevertheless, Panel (d) suggests that a model with two-stage forcings that combines the compression and the tension stages can provide good results. Here, the two forcings are a linear and a quadratic function of time, respectively. In addition to the mean, the forecast of higher-order moments and the extrapolation have comparable high skills. The error is slightly larger than the model with a three-stage forcing, but the model shown in Panel (d) has a somewhat simpler form, which can be an appropriate model. Finally, Panels (e)–(f) imply that although the identified model with only the forcing but no other dynamics can provide good fitting results, the initial error in the extrapolation test will never be suppressed. Such an undesirable feature in the extrapolation test is due to the lack of damping effect in the identified model, which is crucial to mitigate the initial or system biases. It also suggests that the identified model should not be driven entirely by forcing terms. §.§ Experiment II: Learning the moment equations of variance, skewness and kurtosis driven by the mean forcing Recall that many existing macroscale ductile damage models representing the formation and evolution of porosity fields under dynamic loading employ mean-valued (first moment) material internal state variables to characterize the evolution of stress, strain, material structure, and porosity with deformation over time. Similarly, the time evolution of the mean state variables can also be measured relatively accurately from lab experiments based on a small number of sample points. Therefore, it is natural to treat the mean as a known component and use such information to identify the high-order moments. This subsection aims to learn a three-dimensional moment equation for the time evolution of variance, skewness, and kurtosis, where the mean is treated to be known. In addition to this practical reasoning, another crucial motivation for this experiment is to investigate the relationship between the mean and the high-order moments via the learning process. Particularly, it is essential to reveal how the mean interacts with the high-order moments in determining the moment equation of the latter. As the information of extreme events lies in these high-order moments, the contribution from the mean to quantifying uncertainty in extreme events is essential to understand. Figure <ref> shows the identified model structure using simulation # 1 results as in Experiment I . To balance model sparsity and essential dynamics, the threshold values for the three moments (variance, skewness and kurtosis) are set to be r_v = 0.01, r_s = 0.04, and r_k = 0.12, respectively. Different from experiment I, the model here does not require to have additional time-dependent forcing. This leads to the first conclusion that the high-order moments are driven by the mean. Next, it is worthwhile to highlight that the mean does not play a role as a simple additive forcing. Instead, the mean interacts with all the other moments in a highly nonlinear way through multiplicative terms, for example, mv and mk. In other words, knowing the time evolution of the mean significantly facilitates the forecast uncertainty of extreme events. This is consistent with the conclusion from Panel (b) of Figure <ref> that indicates the strong nonlinear nature of the moment equations that reflect the complicated nonlinear dynamics throughout the SVE deformation process. Figure <ref> includes the time evolution of the statistics from the model identification. The results are similar to those in Figure <ref>. The identified model is overall accurate except at the time instants around t = 1.559μ s, where the variance is slightly overestimated. Nevertheless, the probability of the extreme events corresponding to the fat tail on the positive side is overall captured reasonably accurate over time, especially given the fact that in the absence of time-dependent forcing the identified model structure here is simpler than that in Experiment I. This implies an overall accurate uncertainty quantification of extreme events. This means the identification model can be applied to the statistical forecast of extreme damage events that provide the timing and the probability of the possible occurrence of the ductile damage. Figure <ref> shows the extrapolation results by applying the identified model to the other five polycrystal realizations. The predicted moments starting from different time instants follow the truth reasonably well, which indicates the skillful generalization of the model. § DISCUSSION AND CONCLUSION In this paper, a new data-driven reduced-order modeling framework is developed and applied to study the early-stage process of porosity-based ductile damage in polycrystalline metallic materials. The framework starts with computing the time evolution of the leading few moments of specific state variables from the spatiotemporal solution of the polycrystal simulation. Then a simple causality-based sparse model identification algorithm, including essential physical constraints, is utilized to discover the governing equations of these moments. An approximate solution of the time evolution of the PDF is obtained from the predicted moments and the maximum entropy principle. Numerical experiments based on polycrystal realizations of a representative BCC tantalum illustrate a skillful reduced-order model in characterizing the time evolution of the non-Gaussian PDF of the von Mises stress and quantifying the probability of extreme events. The learning process also reveals that the mean stress is not simply an additive forcing to drive the higher-order moments and extreme events. Instead, it interacts with the higher-order moments in a strongly nonlinear and multiplicative fashion. Finally, the calibrated moment equations provide a reasonably accurate forecast when applied to the realizations outside the training data set, indicating the robustness of the model and the skill for extrapolation. These results also demonstrate the importance of including measures of material statistics of the higher moments into probabilistic descriptions of porosity-based ductile damage. The polycrystal simulations indicate noticeable structural evolution taking place during the shock compression loading as indicated by significant magnitude of von Mises stress during the stage of unloading after passage of the shock wave through the center of the sample. This is followed by high tensile reverse loading during which significantly high values of skewness and kurtosis were observed. In particular, kurtosis values reach magnitudes of 5 in this region of tensile loading which indicates fat tails of the stress distribution which deviate far from the mean stress state and large magnitudes. It is expected that the regions of the body experiencing such particularly high stress states to also be more probable to nucleate damage events. Such fat tails as quantified by large values of kurtosis are important as this segment of loading also immediately precedes damage events observed experimentally and computationally via the macroscale damage model. Although small in volume, the SVEs are statistically related to the material used experimentally and are therefore quantitatively relevant. This recommends the possibility of adopted use of reduced-order statistical models as described here to accurately represent the complex structural evolution of materials in a tractable fashion. One central subject in practice is efficiently forecasting extreme stress/damage events under different loading conditions. Instead of repeatedly running the expensive polycrystal models with different conditions, the statistical reduced-order model allows an alternative way to rapidly reach the associated statistical forecast with appropriate uncertainty quantification. Here, a small number of the statistical reduced-order models can be trained by considering several fundamental loading conditions, such as imposing compression stress, shearing stress, and tension stress. A combination of these fundamental loading states is usually sufficient to represent more complex and arbitrary loading conditions. This means a large number of the statistical forecast of the damage events with various loading conditions can be easily carried out by running these calibrated statistical low-order models, which are computationally much more efficient than running the physical model multiple times. This remains a natural immediate future work. It is also worth noticing that the highly efficient statistical reduced-order model developed here does not directly tell the exact location of the high-stress events in polycrystalline metallic materials. Nevertheless, the time evolution of the probability of extreme stress values computed from the statistical reduced-order model provides a valuable indicator to predict the timing and the associated uncertainty of the occurrence of extreme damage events with an almost negligible computational cost. The result can be combined with specific spatial distribution maps from other approaches to infer more detailed information about ductile damage. Finally, the statistical reduced-order model can also be developed based on experimental data. The resulting model is then quite useful for dynamically correcting the error in forecasting the ductile damage from more complicated physical models. This can be achieved by running the statistical reduced-order model and the physical model simultaneously. At each time instant, compute the leading few moments from the spatial solution of the physical model. Correct the error in the distribution associated with these data in light of the output from the statistical reduced-order model. Then redistribute the solution values of the physical model and run it forward up to the next instant. This process exploits the statistical reduced-order model as a bridge to connect experimental data with the physical model to perform efficient data assimilation for model error correction in a dynamic fashion. § ACKNOWLEDGEMENT The authors gratefully acknowledge funding for this work from National Science Foundation DMREF program (grant number: #2118399). CAB also acknowledges support from the DOE Advanced Simulation and Computing program at Los Alamos National Laboratory. HC acknowledges the support from National Research Foundation of Korea (grant numbers: 2020R1C1C101324813 and 2021R1A4A103278312).
http://arxiv.org/abs/2303.07301v1
20230313172554
Phantom dark energy as a natural selection of evolutionary processes $\hat{\rm a}$ $\textit{la}$ $\textit{genetic algorithm}$ and cosmological tensions
[ "Mayukh R. Gangopadhyay", "M. Sami", "Mohit K. Sharma" ]
astro-ph.CO
[ "astro-ph.CO", "gr-qc" ]
mayukh_ccsp@sgtuniversity.org sami_ccsp@sgtuniversity.org, samijamia@gmail.com mr.mohit254@gmail.com (Corresponding author) ^1Centre For Cosmology and Science Popularization (CCSP), SGT University, Gurugram, Delhi- NCR, Haryana- 122505, India, ^2Center for Theoretical Physics, Eurasian National University, Astana 010008, Kazakhstan. ^3Chinese Academy of Sciences,52 Sanlihe Rd, Xicheng District, Beijing. We employ a machine learning (ML) algorithm to analyze  cosmological background data and the linear red-shift space distortion (RSD) data in a model-independent way, with specific focus on the Hubble expansion rate and the growth of large-scale structure. We find strong evidence that the natural enhancement in the Hubble parameter at low redshifts is due to the underlying phantom nature of dark energy, rather than low matter density. As for the RSD data, we find a higher value of σ^8_(0) which is consistent with CMB's predictions, but the outcome of low matter density leads to unresolved tension. This might point towards a new physical phenomenon at the perturbative level in the low redshift regime. From a statistical perspective, we have demonstrated that our results hold greater preference compared to those obtained by the ΛCDM model.  We employ a Machine Learning(ML) algorithm to analyze cosmological background data, specifically pertaining to the Hubble expansion rate. Our findings indicate that the phantom dark energy is a natural selection of an evolutionary process that effectively resolves the Hubble tension. Additionally, we incorporate red- shift space distortion data alongside low red-shift gravitational lensing data. Through the algorithm, we have observed a higher value for the amplitude of matter density perturbations that aligns with Planck's prediction. From a statistical perspective, we have demonstrated that our results hold greater preference compared to those obtained by the commonly accepted ΛCDM model.  Phantom dark energy as a natural selection of evolutionary processes â la genetic algorithm and cosmological tensions Mohit K. Sharma^1 March 30, 2023 =============================================================================================================================== Despite the wide recognition of the ΛCDM as a suitable model for describing the evolution of the universe, recent low-redshift observations have subjected it to intense scrutiny, particularly with respect to the identification of a high expansion rate and low matter-density clustering <cit.>. These estimates are found to be in a significant level of tension with the high-redshift Cosmic Microwave Background (CMB) estimations on the ΛCDM model <cit.>. These low-redshift observations such as Supernovae H_0, for the Equation of State of DE (SH0ES) <cit.> and Kilo Degree Survey (KiDS) <cit.> have challenged Planck-18 estimates for H_0 and σ^8_0 by revealing discrepancies of about 4.4 σ and 3 σ, respectively. To address these disagreements within a single framework, many different approaches have been put forward. These approaches make use of interactions between dark energy and dark matter <cit.>, modifications of gravity at early <cit.> or late times <cit.>, and other related mechanisms <cit.>. However, in this letter, our main objective is to identify the fundamental cause(s) to which we can partially or fully attribute the existing problems. To do this, we adopt a model-independent technique that solely relies on the data pertaining to the cosmological background and linear perturbative level to reconstruct the evolution of the universe. We use a metaheuristic optimization algorithm that is inspired by the process of natural selection and genetics, wherein a fitness function evaluates the fitness of individuals in each step (or generation) and, as a result, the individuals from the population get selected to reproduce the offspring of the next generation <cit.>. Thus, individuals who can produce offspring with the highest fitness are identified in the population in an effort to emulate the process of natural selection. The degree of effectiveness for each solution, which involves a single independent variable like redshift, is based on its ability to align with the observational data and achieve consistency. Our approach involves utilizing the Likelihood statistic as the fitness function to assess the “success” of reproducing species in each generation. The population which maximizes the Likelihood is considered to have the highest fitness. Therefore, our stochastic process aims to maximize the Likelihood. It is worth noting that the accuracy of the final optimal solution is largely unaffected by changes in the initial population. Regardless of the initial conditions, the optimization process will generally lead to the same optimal solution, unless any singularities are encountered along the way. The main advantage of using this method is that it can automatically discover most relevant complex features from the data which may be beyond the capability of standard parametric methods. In order to execute the algorithm mentioned, we utilize observational Hubble data (OHD) to analyze the background cosmological data, and redshift-space distortion (RSD) data to analyze the growth of matter density perturbations. The former gives us the insight of how does the dominance of dark energy (DE) is affecting the rate of expansion of the universe for a given cosmological model. Also it further enables us to figure out when does the universe transited from deceleration to acceleration. The latter tells us about the evolution of the large-scale structure of the universe. For better understanding of each dataset, we opt to conduct separate study instead of merging both datasets. We take the OHD data in the red-shift range z ∈ [0.07, 1.965], and by defining the χ^2 function, we execute the search-based algorithm, which utilises a population size that is sufficiently large, around 𝒪(10^3). Additionally, we generate different random numbers for each run to investigate whether the initial population has an impact on the outcome. We have observed that the minimum χ^2 value (corresponds to the maximum fitness) in our case has dropped to around 13.21 which for the ΛCDM is around 14.5, this represents a significant improvement in the fit of almost 8.84%. This suggests a strong preference of some late-time gravitational modification over the ΛCDM and various other models that mimics it. [Here we mention that while the best-fit χ^2 for each run may vary slightly from other runs or require more generations to converge, it consistently yields an almost indistinguishable cosmological evolutionary scenario.] Figure (<ref>) demonstrates the 1σ evolutionary profile of the function H(z). While the Hubble parameter does follow the expected trend of decreasing with z, there is a noticeable deviation around a redshift of 0.2-0.4 where H(z) begins to shift towards higher values. This contradicts the prediction of various DE models, which suggest that the Hubble parameter will continue to decrease till it becomes almost constant in the far future. It is worth noting that if a particular constituent of the universe, which may be attributed to DE or a result of modified gravity, is intrinsically responsible for the enhancement in H(z) through a positive time-derivative, it would necessarily exhibit a phantom-like behavior <cit.>. As is evident that the evolutionary profile of Hubble parameter in Fig. (<ref>) implies that the corresponding equation of state parameter, w__DE, must be super negative. In order to quantitatively measure the effective DE contribution and its dynamics, let us compare it with the standard flat-wCDM expression of the Hubble parameter: ℋ(z) = H_0 √(Ω_m^(0) (1+z)^3 + (1 - Ω_m^(0)) (1+z)^1+w__DE) , where H_0 denotes the Hubble constant, and Ω_m^(0) represents the the current density parameter. Assuming a flat universe with pressure-less dust, the total equation of state parameter w__T of the system is related to w__DE as w__T=Ω__DE w__DE. Now, in order to statistically compare H(z) with ℋ(z), we consider H(z) to be the true function, and measure the square of the ratio of its difference with the ℋ(z), normalized by the 1σ uncertainty in the H(z). This way, one not only estimates the best-fit parameters but also their uncertainties from the uncertainties in H(z). To carry out the analysis, we divide the range of redshift: z ∈ [0,2] into bins of size 0.1, and use the Markov Chain process as a sampling technique. We obtain H_0 = 73.02 ± 1.2 [Km/s/Mpc], Ω_m= 0.305 ± 0.032, w__DE = -1.339 ± 0.175 , within the 1σ level. It is worth noting that our estimation of H_0 aligns with the findings of SH0ES and other low-redshift observations such as the Megamaser Cosmology Project (MCP) <cit.>, H_0 Lenses in COSMOGRAIL's Wellspring (H0LiCOW) <cit.>. These observations measure H_0 = 73.9 ± 3, and 73.3^+1.7_-1.8, respectively. Let us here note that it is the phantom behavior of dark energy which is clearly responsible for the increase in H_0 and the resolution of the Hubble tension, rather than the speculated under-density of matter at low-z. In fact, the increase in H_0 causes a 6.7% increase in total (local) matter density: Ω_m h^2, than what is predicted by the Planck results. Furthermore, from w__DE estimates, it clearly shows >1 σ level discrepancy with the base ΛCDM model. In what follows, we apply the same optimization algorithm to data related to matter perturbation i.e. redshift-space distortion (RSD). For this dataset, we have used the compilation of f σ^8(z) observations (f:= growth factor, and σ^8 is the amplitude of power spectrum in 8h^-1Mpc) from different galaxy surveys in the redshift range: z ∈ [0.02,1.94] <cit.>. The main motivation for opting for this specific subset of data is its exceptional level of organization and lack of anomalies. The χ^2 for the same is defined as: χ^2 = V^i C_ij^-1V^j, where V ≡ f σ^8(z)- [f σ^8(z)]_fit, and C_ij is the covariance matrix between different datasets. Just like the background analysis, here also we have conducted multiple simulations, all utilizing the same procedure as the one used for the cosmological background level. We have also verified for different initial values to determine if there outcomes differ from one other. In fig. (<ref>) we depict the evolutionary profile of f σ^8(z), which corresponds to the maximum fitness up to the 1 σ level. Notably, the value of f σ^8(0) is 0.381 ± 0.012, which is significantly lower (a level >2 σ) than the Planck result of 0.474 ± 0.015. By revisiting the flat-wCDM model to figure out what does fig. (<ref>) indicates in terms of the cosmological parameters which are associated with the growth of matter perturbations, such as, Ω_m^(0), σ^8_(0) and w__DE. We again use the flat-wCDM model to analyze the analytical evolution of matter density contrast δ_m, which is given as δ_m/a = _2 F_1(w__DE-1/2w__DE,-1/3 w__DE;1-5/6 w__DE; a^-3 w__DE(1-1/Ω_m^(0))) where a is the scale factor and _2 F_1 is the Hypergeometric function. Using this one can determine the observable growth rate as f σ^8(z) = f(z) σ^8_(0) δ^(m)(z)/δ^(m)(0) . Here once again, we adopt the same approach to statistically compare f σ^8(z) with Eq. (<ref>). The estimated values are given as follows [The obtained χ^2 value is almost 6.7% better than that of the corresponding ΛCDM model, and is also slightly better than that of the wCDM model.]: w__DE = -1.065 ± 0.103 , Ω_m^(0) = 0.261 ± 0.014 σ^8_(0) = 0.792 ± 0.024 . Here also, we see that the equation of state for DE favours its phantom nature by leaning slightly towards lower values (<-1). On the other hand, the value of σ^8_(0) is significantly higher than what was predicted by low-redshift observations such as KiDS-450 <cit.>. As already mentioned that the KiDS-450 estimate of σ_8^(0) = 0.745 ± 0.039 exhibits a tension of more than 2 σ with Planck result: σ^8_(0) = 0.811 ± 0.006. Notably, our estimate on σ_8^(0) does not show any tension with Planck's σ_8^(0) result and is in agreement within 0.76 σ level. Since, the best-fit value of w__DE is very close to that of the ΛCDM, the primary factor that plays the role in easing the tension of σ^8_(0) is obtaining a lower value of Ω_m^(0) than what was estimated by Planck. It is nevertheless interesting to note that the Planck's tension with RSD appears to be with the value of Ω_m^(0) rather than with the value of σ^8_(0). Fig. (<ref>) shows a comparison between the allowable parameter ranges obtained from the H(z) and RSD datasets to ensure compliance with both sets of estimations. The RSD dataset places stronger bounds on Ω_m^(0) and w__DE^(0) than H(z), while H(z) allows for the DE equation of state parameter to be more towards the phantom side compared to the RSD dataset. We find that the large negative DE equation of state for the background data and lower matter density parameter for the growth of perturbations are the main factors that can alleviate both tensions from their respective datasets. However, we also note that there is no common background parameter that can significantly reduce both tensions simultaneously, unless we introduce a separate mechanism which by introducing more parameters, will also affect the goodness of fit. Based on our RSD estimates, we observe that our σ^8_(0) value is in closer agreement with the Planck results. To verify the consistency of our estimates in the standard Ω_m^(0)-σ^8_(0) plane, which is commonly quantified by S^8_0 = σ^8_0√(Ω_m^(0)/0.3) <cit.>, we use the error propagation method. We find that S^8_0 = 0.738± 0.026, which is although compatible with low-redshift observations such as, KiDS-450 which gives S^8_0 = 0.745 ± 0.039 displays a significant 3.4σ level tension with Planck's estimate of S^8_0 = 0.834 ± 0.016. This tension is primarily due to the low estimated value of Ω_m^(0) which is linked to the low-phantom nature of DE as inferred from the RSD observations. If the DE equation of state were more phantom, similar to what we have obtained from the background estimation, it would require a high matter density parameter, which in turn would decrease the clustering amplitude. Therefore, unlike the H_0 tension, the S^8_0 tension cannot be resolved through standard cosmological parameters. It either indicates something fundamental in the evolution of cosmological perturbations or necessitates a careful cross-check of the systematic errors. Nonetheless, our estimates have revealed the evolutionary profiles of f σ^8(z) with H(z) across a range of redshifts from -0.2 to 1.5 in fig. (<ref>). We have depicted the evolution of linear perturbation with the background expansion by utilizing the Planck best-fits with Ω^(0)_m=0.315 and σ^8_0 = 0.8111 in the plot. The figure demonstrates that both trajectories have evolved similarly in the past, but a change is observed at low-redshift, i.e., z<1. Particularly, the growth rate of matter perturbations, as per the Planck, achieves a maximum value significantly greater than our fit. After reaching the maximum value, the former shows a decreasing pattern with H(z). Nonetheless, due to the enhancement in H(z), f σ^8(z) declines further than it would from the Planck results. The observation that the value of Ω_m^(0) derived from the Planck and RSD data exhibits a noteworthy level of inconsistency suggests that the tension is not solely associated with σ^8_(0). Instead, our background estimates, as well as those from Planck, shows that Ω_m^(0)≃ 0.3. As a result, the RSD dataset's distinctive low matter density parameter indicates that the tension could be attributed to systematics (atleast partially) rather than being largely impacted by the dark energy equation of state. We, therefore, emphasize that although the dark energy equation of state can alleviate the Hubble tension at the background level, it may not play a substantial role in resolving the S^8_0 tension. In summary, we conducted two independent analyses to identify the reasons behind two tensions related to parameters H_0 and σ^8_0. Our cosmological model-agnostic findings demonstrate that the phantom nature of a weekly dynamical DE is required for the background, while a lower matter density parameter is necessary for the large amplitude of clustering of matter density perturbations. However, resolving one tension does not alleviate the other. Our model-independent approach makes our results applicable in general. We show that it is possible to address the σ^8_0 tension (i.e. making it compatible with the Planck results) by adopting a model that imitates ΛCDM and proposes a low matter density parameter. On the other hand, in order to bring σ^8_0 in agreement with the low-z observations by also having high Ω_m^(0), a purely phantom nature of DE is necessary. This suggests that while the phantom nature of DE plays a crucial role in satisfying the low-z observations at the background level, it is not the sole determining factor for reducing the σ^8_0 tension by using RSD observations. If these discrepancies are not in systematics, solving these discrepancies requires a certain mechanism which on the background level largely affect the DE, whereas at the perturbative level, enhances the matter perturbations clustering amplitude. On theoretical grounds, the effective phantom-like behavior can be successfully realized  generically by the disformal coupling between baryonic and dark matter in the Einstein frame; this coupling does not require an additional degree of freedom. Another possibility is provided by the interaction between dark matter and dark energy. § ACKNOWLEDGEMENT The work of MRG is supported by DST, Government of India under the Grant Agreement number IF18-PH-228 (Inspire Faculty Award). The work of MRG and MS is supported by Science and Engineering Research Board (SERB), DST, Government of India under the Grant Agreement number CRG/2022/004120 (Core Research Grant). MS is also partially supported by the Ministry of Education and Science of the Republic of Kazakhstan, Grant No. 0118RK00935 and CAS President's International Fellowship Initiative(PIFI). 99 riess A. G. Riess et. al., A 2.4% Determination of the Local Value of the Hubble Constant, Astrophys. J., 826(1) (2016) 56, arXiv: 1604.01424 [astro-ph.CO]. holicow K. C. Wong et. al., H0LiCOW – XIII. A 2.4 per cent measurement of H0 from lensed quasars: 5.3 tension between early- and late-Universe probes, Mon. Not. Roy. Astron. Soc., 498(1) (2020) 1420-1439, arXiv: 1907.04869 [astro-ph.CO]. kids450 H. Hildebrandt et. al., KiDS-450: Cosmological parameter constraints from tomographic weak gravitational lensing, Mon. Not. Roy. Astron. Soc., 465 (2017) 1454, arXiv: 1606.05338 [astro-ph.CO]. kids1000 C. Heymans et. al., KiDS-1000 Cosmology: Multi-probe weak gravitational lensing and spectroscopic galaxy clustering constraints, Astron. Astrophys. 646 (2021) A140, arXiv: 2007.15632 [astro-ph.CO]. planck18 N. Aghanim et. al., Planck 2018 results. VI. Cosmological parameters, Astron. Astrophys. 641 (2020) A6, arXiv: 1807.06209 [astro-ph.CO]. amendola B. J. Barros, and L. Amendola, and T. Barreiro, and N. J. Nunes, Coupled quintessence with a ΛCDM background: removing the σ_8 tension, JCAP 01 (2019) 007, arXiv: 1802.09216 [astro-ph.CO]. sujikawa J. B. Jiménez, D. Bettoni, D. Figueruelo, F. A. T. Pannia, and S. Tsujikawa, Probing elastic interactions in the dark sector and the role of S8, Phys. Rev. D 104(10) (2021) 103503, arXiv: 2106.11222 [astro-ph.CO]. pandey K. L. Pandey, T. Karwal, and S. Das, Alleviating the H_0 and σ_8 anomalies with a decaying dark matter model, JCAP 07 (2020) 026, arXiv: 1902.10636 [astro-ph.CO]. trodden M. C. Carrillo, Mariana, Q. Liang, and J. Sakstein, and M. Trodden, Neutrino-Assisted Early Dark Energy is a Natural Resolution of the Hubble Tension, arXiv: 2302.09091 [astro-ph.CO]. trodden2 J. Sakstein, and M. Trodden, Early Dark Energy from Massive Neutrinos as a Natural Resolution of the Hubble Tension, Phys. Rev. Lett. 124(16) (2020) 161301, arXiv: 1911.11760 [astro-ph.CO]. generic S. A. Adil, M. R. Gangopadhyay, M. Sami, and M. K. Sharma, Late-time acceleration due to a generic modification of gravity and the Hubble tension, Phys. Rev. D 104(10) (2021) 103534, arXiv: 2106.03093 [astro-ph.CO]. generic2 M. R. Gangopadhyay, S. K. J. Pacif, M. Sami, and M. K. Sharma, Generic Modification of Gravity, Late Time Acceleration and Hubble Tension, Universe 9(2) (2023) 83, arXiv: 2211.12041 [gr-qc]. silk E. D. Valentino, A. Melchiorri, and J. Silk, Planck evidence for a closed Universe and a possible crisis for cosmology, Nature Astron. 4(2) (2019) 196-203, arXiv: 1911.02087 [astro-ph.CO]. elenora E, D. Valentino et. al., Cosmology Intertwined III: f σ_8 and S_8, Astropart. Phys. 131 (2021) 102604, arXiv: 2008.11285 [astro-ph.CO]. sigma8drag V. Poulin, J. L. Bernal, E. Kovetz, and M. Kamionkowski, The Sigma-8 Tension is a Drag, arXiv: 2209.06217 [astro-ph.CO]. pogosian K. Jedamzik, and L. Pogosian, Relieving the Hubble tension with primordial magnetic fields, Phys. Rev. Lett. 125(18) (2020) 181302, arXiv: 2004.09487 [astro-ph.CO]. perivola G. Alestas, and L. Perivolaropoulos, Late-time approaches to the Hubble tension deforming H(z), worsen the growth tension, Mon. Not. Roy. Astron. Soc. 504(3) (2021) 3956-3962, arXiv: 2103.04045 [astro-ph.CO]. supratik R. Shah, A. Bhaumik, P. Mukherjee, S. Pal, A thorough investigation of the prospects of eLISA in addressing the Hubble tension: Fisher Forecast, MCMC and Machine Learning, arXiv: 2301.12708 [astro-ph.CO]. GA S. Nesseris, and J. Garcia-Bellido, A new perspective on Dark Energy modeling via Genetic Algorithms, JCAP 11 (2012) 033, arXiv: 1205.0364 [astro-ph.CO]. gum B. Gumjudpai, T. Naskar, and M. Sami, and S. Tsujikawa, Coupled dark energy: Towards a general description of the dynamics, JCAP 06 (2005) 007, arXiv: hep-th/0502191. mcp D. W. Pesce et. al., The Megamaser Cosmology Project. XIII. Combined Hubble constant constraints, ApJL 891(1) (2020), arXiv: 2001.09213 [astro-ph.CO]. growthdata B. Sagredo, S. Nesseris, and D. Sapone, Internal Robustness of Growth Rate data, Phys. Rev. D 98(8) 2018 (083543), arXiv: 1806.10822 [astro-ph.CO]. sunny R. C. Nunes, and S. Vagnozzi, Arbitrating the S8 discrepancy with growth rate measurements from redshift-space distortions, Mon. Not. Roy. Astron. Soc. 505(4) (2021) 5427-5437, arXiv: 2106.01208 [astro-ph.CO].
http://arxiv.org/abs/2303.07226v1
20230313160031
Scaling Vision-Language Models with Sparse Mixture of Experts
[ "Sheng Shen", "Zhewei Yao", "Chunyuan Li", "Trevor Darrell", "Kurt Keutzer", "Yuxiong He" ]
cs.CV
[ "cs.CV", "cs.CL" ]
namedefver@everyshi.sty empty tikzmark #1figure <ref> #1Figure <ref> #1#2figures <ref> and <ref> #1#2#3#4figures <ref>, <ref>, <ref> and <ref> #1section <ref> #1Section <ref> #1#2sections <ref> and <ref> #1#2#3sections <ref>, <ref> and <ref> (<ref>)1equation <ref> #1Equation <ref> #1<ref> #1chapter <ref> #1Chapter <ref> #1#2chapters<ref>–<ref> #1algorithm <ref> #1Algorithm <ref> #1#2algorithms <ref> and <ref> #1#2Algorithms <ref> and <ref> #1part <ref> #1Part <ref> #1#2parts <ref> and <ref> #1⌈#1 ⌉ #1⌊#1 ⌋ 1 ϵ η a b c d e f g h i j k l n o p q r s t u v w x y z ϵ θ 𝐚 𝐛 𝐜 𝐝 𝐞 𝐟 𝐠 𝐡 𝐢 𝐣 𝐤 𝐥 𝐦 𝐧 𝐨 𝐩 𝐪 𝐫 𝐬 𝐭 𝐮 𝐯 𝐰 𝐱 𝐲 𝐳 a b c d e f g h i j k l m n o p q r s t u v w x y z 𝐀 𝐁 𝐂 𝐃 𝐄 𝐅 𝐆 𝐇 𝐈 𝐉 𝐊 𝐋 𝐌 𝐍 𝐎 𝐏 𝐐 𝐑 𝐒 𝐓 𝐔 𝐕 𝐖 𝐗 𝐘 𝐙 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 μ θ a b c d e f g h i j k l m n o p q r s t u v w x y z α β ϵ λ ω μ ψ σ θ a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z β Φ Λ Σ msl boldbxn A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 𝒜 ℬ 𝒞 𝒟 ℰ ℱ 𝒢 ℋ ℐ 𝒥 𝒦 ℒ ℳ 𝒩 𝒪 𝒫 𝒬 ℛ 𝒮 𝒯 𝒰 𝒱 𝒲 𝒳 𝒴 𝒵 𝔸 𝔹 ℂ 𝔻 𝔽 𝔾 ℍ 𝕀 𝕁 𝕂 𝕃 𝕄 ℕ 𝕆 ℙ ℚ ℝ 𝕊 𝕋 𝕌 𝕍 𝕎 𝕏 𝕐 ℤ Λ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Σ Λ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z itemsep=10pt,topsep=0pt,parsep=0pt,partopsep=0pt =4 Β
http://arxiv.org/abs/2303.06892v1
20230313064019
Direct tomography of quantum states and processes via weak measurements of Pauli spin operators on an NMR quantum processor
[ "Akshay Gaikwad", "Gayatri Singh", "Kavita Dorai", "Arvind" ]
quant-ph
[ "quant-ph" ]
ph16010@iisermohali.ac.in Department of Physical Sciences, Indian Institute of Science Education & Research Mohali, Sector 81 SAS Nagar, Manauli PO 140306 Punjab India. ph20015@iisermohali.ac.in Department of Physical Sciences, Indian Institute of Science Education & Research Mohali, Sector 81 SAS Nagar, Manauli PO 140306 Punjab India. kavita@iisermohali.ac.in Department of Physical Sciences, Indian Institute of Science Education & Research Mohali, Sector 81 SAS Nagar, Manauli PO 140306 Punjab India. arvind@iisermohali.ac.in Department of Physical Sciences, Indian Institute of Science Education & Research Mohali, Sector 81 SAS Nagar, Manauli PO 140306 Punjab India. Vice Chancellor, Punjabi University Patiala, 147002, Punjab, India In this paper, we present an efficient weak measurement-based scheme for direct quantum state tomography (DQST) and direct quantum process tomography (DQPT), and experimentally implement it on an NMR ensemble quantum information processor without involving any projective measurements. We develop a generalized quantum circuit that enables us to directly measure selected elements of the density matrix and process matrix which characterize unknown quantum states and processes, respectively. This generalized quantum circuit uses the scalar J-coupling to control the interaction strength between the system qubits and the metre qubit. We experimentally implement these weak measurement-based DQST and DQPT protocols and use them to accurately characterize several two-qubit quantum states and single-qubit quantum processes. An extra qubit is used as a metre qubit to implement the DQST protocol, while for the DQPT protocol, two extra qubits (one as a metre qubit and the other as an ancilla qubit) are used. Direct tomography of quantum states and processes via weak measurements of Pauli spin operators on an NMR quantum processor Arvind March 30, 2023 =========================================================================================================================== § INTRODUCTION In recent decades, the concepts of weak measurements and weak values have attracted immense attention in quantum information processing from the fundamental as well as the applications point of view <cit.>. The weak value of a given observable obtained via a weak measurement, although is in general a complex number, has been shown to carry information about the system at times between pre and post-selction <cit.>. Weak measurements allow us to sequentially measure incompatible observables so as to gain useful information from the quantum system and learn about the initial state without fully collapsing the state <cit.>. This is in complete contrast to conventional projective measurements, wherein the system collapses into one of the eigenstates resulting in maximum state disturbance <cit.>. This feature of weak measurements provides an elegant way to address several important issues in quantum theory including the reality of the wave function<cit.>, observation of a quantum Cheshire Cat in a matter-wave interferometer experiment<cit.>, observing single photon trajectories in a two-slit interferometer<cit.>, and the Leggett-Garg inequality<cit.>. Weak measurements are also actively exploited in the field of quantum information processing covering a wide range of applications including quantum state and process tomography<cit.>, state protection against decoherence<cit.>, quantum state manipulation<cit.>, performing minimum disturbance measurements<cit.>, precision measurements and quantum metrology<cit.>, sequential measurement of two non-commuting observables<cit.> and tracking the precession of single nuclear spins using weak measurements<cit.>. Several techniques have focused on direct estimation of quantum states and processes including a method based on phase-shifting technique <cit.> and direct measurement of quantum states without using extra auxiliary states or post-selection processes <cit.>. A selective QPT protocol based on quantum 2-design states was used to perform DQPT <cit.> and experimentally demonstrated on different physical platforms<cit.>. Conventional QST and QPT methods require a full reconstruction of the density matrix and are computationally resource intensive. On the other hand, weak measurement based tomography techniques have been used to perform state tomography and it was shown that for certain special cases they outperform projective measurements <cit.>. An efficient DQST scheme was proposed which directly measured arbitrary density matrix elements using only a single strong or weak measurement <cit.>. Circuit-based weak measurement with post-selection has been reported on NMR ensemble quantum information processor <cit.>. In this work, we propose an experimentally efficient scheme to perform direct QST and QPT using weak measurements of Pauli spin operators on an NMR ensemble quantum information processor. The scheme allows us to compute desired elements of the density matrix and is designed in such a way that it does not require any ancillary qubits and has reduced complexity as compared to recently proposed weak measurement-based DQST and DQPT methods <cit.>. Our scheme has three major advantages, namely, (i) it does not require sequential weak measurements, (ii) it does not involve implementation of complicated error-prone quantum gates such as a multi-qubit, multi-control phase gate and (iii) it does not require projective measurements. Furthermore, our proposed method is experimentally feasible as it requires a single experiment to determine multiple selective elements of the density/process matrix. Our scheme is general and can be applied to any circuit-based implementation. We experimentally implemented the scheme to characterize several two-qubit quantum states and single-qubit quantum processes with high fidelity. Further, we fed the weak measurement experimental results as input into a convex optimization algorithm to reconstruct the underlying valid states and processes<cit.>. We compared the experimentally obtained state and process fidelities with theoretical predictions and with numerical simulations and obtained a good match within experimental uncertainties. This paper is organized as follows: A brief review of weak measurements and the detailed schemes for DQST and DQPT are presented in Section <ref>. The details of the experimental implementation of DQST and DQT via weak measurements are given in Section <ref>. Section <ref> describes how to use an NMR quantum processor to perform weak measurements of Pauli spin operators, while Sections <ref> and <ref> contain details of a weak measurement of the Pauli operator σ_1z and the results of DQST and DQPT performed using weak measurements, respectively. Section <ref> contains a few concluding remarks. § GENERAL SCHEME FOR DIRECT QST AND QPT VIA WEAK MEASUREMENTS Consider the system and the measuring device initially prepared in a product state |ψ⟩| M ⟩. The weak measurement of an observable A requires the evolution of the joint state |ψ, M ⟩ under an operator of the form, U_SM = e^-ig A⊗B, where g is coupling strength (| g |≪ 1) between the system and the measuring device. The operator B corresponding to the measuring device is chosen such that ⟨ M |B| M ⟩ =0. In the weak measurement limit (| g |≪ 1), the evolution operator can be approximated upto first order in g as, U^weak_SM = (I -ig A⊗B ) and the evolution of the joint state (system+measuring device) can be worked out as follows <cit.>: |ψ, M ⟩_ final = e^-ig A⊗B|ψ, M ⟩ ≈ (I -ig A⊗B ) |ψ, M ⟩ = |ψ, M ⟩ - ig A|ψ⟩⊗B| M ⟩ We will see that the above equation can be used for QST and QPT by making appropriate measurements on the measuring device. Generally quantum processes are either represented via the corresponding (i) χ matrix (also referred to as the process matrix) using a Kraus operator decomposition<cit.> or (ii) Choi-Jamiolkowski state using the channel-state duality theorem <cit.>. For an N-qubit system, the χ matrix and the Choi-Jamiolkowski state corresponding to quantum channel Λ are given by <cit.>: Λ(ρ_in) = ∑_i=0^4^N-1K_i ρ_in K_i^† = ∑_m,n=0^4^N-1χ_mnE_m ρ̂_inE_n^† |Φ_Λ⟩ = (I ⊗Λ )|Φ⟩=1/2^N / 2∑_m=0^2^N-1| m ⟩⊗Λ| m ⟩ where χ_mn in Eq. (<ref>) are elements of the χ matrix and |Φ_Λ⟩ in Eq. (<ref>) is the Choi-Jamiolkowski state; { K_i }'s and the {E_i }'s in Eq. (<ref>) are Kraus operators and fixed basis operators respectively, while the quantum state |Φ⟩ in Eq. (<ref>) is a pure maximally entangled state of 2N qubits |Φ⟩=2^-N / 2∑_m=0^2^N-1|m⟩|m⟩. The density matrix ρ_Λ = |Φ_Λ⟩⟨Φ_Λ| corresponding to the Choi-Jamiolkowski state can be mapped to the χ matrix using an appropriate unitary transformation U_χ as χ = U_χρ_Λ U^†_χ. The unitary transformation matrix U_χ depends only on the fixed set of basis operators { E_i} (Eq. (<ref>)) and does not depend on the quantum channel to be tomographed. To perform DQPT of a given quantum channel Λ in terms of the χ matrix, we need to apply the unitary transformation U_χ on |Φ_Λ⟩ and then follow the direct QST protocol and estimate the desired elements χ_mn. Consider the operators O^ϕ_x = |ϕ⟩⟨ϕ|⊗σ_x and O^ϕ_y = |ϕ⟩⟨ϕ|⊗σ_y where |ϕ⟩ is a pure system state and σ_x(y) are single-qubit Pauli spin operators. The expectation values of the O^ϕ_x and O^ϕ_y operators in the weakly evolved joint state (Eq. (<ref>)) turn out to be: ⟨ O^ϕ_x ⟩ = ig [ ⟨ψ| A^†|ϕ⟩⟨ϕ|ψ⟩ - ⟨ϕ| A |ψ⟩⟨ψ|ϕ⟩] ⟨ O^ϕ_y ⟩ = -g [ ⟨ψ| A^†|ϕ⟩⟨ϕ|ψ⟩ + ⟨ϕ| A |ψ⟩⟨ψ|ϕ⟩] which can be simplified to: ⟨ O^ϕ_y ⟩ - i ⟨ O^ϕ_x ⟩/-2g = ⟨ϕ| A |ψ⟩⟨ψ|ϕ⟩ Straightforward algebra leads to ⟨ O^ϕ_y ⟩ - i ⟨ O^ϕ_x ⟩/-2g = ρ_mn = ⟨ m |ρ| n ⟩ Similarly, ⟨ O^ϕ_y ⟩ - i ⟨ O^ϕ_x ⟩/-2g = χ_mn = ⟨ m |χ| n ⟩ Using Eqs. (<ref>) and (<ref>), one can perform direct QST and QPT by measuring ⟨ O^ϕ_x ⟩ and ⟨ O^ϕ_y ⟩ for an appropriate choice of A and |ϕ⟩. It is interesting to note that ⟨ϕ| A |ψ⟩⟨ψ|ϕ⟩=⟨ A ⟩_w^ϕΠ_ψ^ϕ where ⟨ A ⟩_w^ϕ is the weak value associated with a post-selection of the system into the state ϕ and Π_ψ^ϕ is the post-selection probability <cit.> We do not use this connection is our work, however, it connects our work with other schemes involving weak values and post-selection. § NMR IMPLEMENTATION OF WEAK MEASUREMENT SCHEME §.§ NMR weak measurements of Pauli spin operators We used the three ^19F spins in the molecule trifluoroiodoethylene dissolved in acetone-D6 to realize three qubits, denoting F_1 and F_2 as the system qubits and F_3 as the meter qubit (Fig. <ref>(c)). The rotating frame NMR Hamiltonian for a system of three spin-1/2 nuclei is given by <cit.>: ℋ=-∑_i=1^3ν_i I_i z+∑_i, j=1, i>j^3 J_i j I_i z I_j z where ν_i and I_iz are the chemical shift and the z-component of the spin angular momentum of the ith spin respectively, and J_ij is the scalar coupling between the ith and jth spins. Experimental parameters characterizing the given system can be found in the Reference <cit.>. We set the initial state of the meter qubit to be | M ⟩ = | 0 ⟩_m, with B = σ_x (Eq. (<ref>)). In this case, the weak interaction evolution operator U^weak_SM is of the form: U^weak_SM = I -ig P_k⊗σ_x where I is an 8 × 8 identity matrix and P_k = { I, σ_x, σ_y, σ_z }^⊗ 2 are two-qubit Pauli spin operators. The operator U^weak_SM given in Eq. (<ref>) can be decomposed as: I -ig P_k⊗σ_x = I -ig (U_kσ_iz U_k^†) ⊗ (R_y(π/2) σ_z R_y^†(π/2)) = 𝒰_k (I -ig σ_iz⊗σ_z) 𝒰_k^† where σ_iz is either σ_1z = σ_z ⊗ I or σ_2z = I ⊗σ_z and 𝒰_k = U_k ⊗ R_y(π/2); U_k is a two-qubit unitary operator acting on system qubits and is constructed such that P_k = U_kσ_iz U_k^†. To further simplify Eq. (<ref>), consider the J-evolution operator U_ij^J(t): U_i j^J(t)=e^-i 2 π J_ij I_i z I_j z t If the evolution time t is sufficiently small such that g = π J_ij t/2≪ 1, Eq. (<ref>) can be approximated as: U_i j^J(t) ≈ I - i g σ_iz⊗σ_jz Hence using Eqs. (<ref>) and (<ref>): U^weak_SM≈𝒰_k U_ij^J(t) 𝒰_k^† where t = 2g/π J_ij, i = 1,2 and j=3. Hence the weak measurement of a desired Pauli operator P_k can be performed by applying the sequence of unitary operations given in Eq. (<ref>) on an initial joint state of the three-qubit system followed by the measurement of O^ϕ_x and O^ϕ_y. The list of 𝒰s corresponding to all P_ks is given in Table <ref>. For the NMR implementation, the quantum circuit depicted in Fig.<ref>(a) is divided into six parts, each consisting of a set of unitary operations. Each of the six parts are implemented using optimized pulse sequences generated through GRAPE, which are represented graphically as colored Gaussian shapes in Fig. <ref>(b). For example, the first part of the circuit consists of a Hadamard gate followed by a CNOT gate, and this composite operation is implemented using a GRAPE pulse denoted by G_1 in Fig.<ref>(b). The approximate length of the GRAPE optimized rf pulses corresponding to given quantum states (or processes) and Pauli operators is given in Table <ref>. The power level was set to 28.57 W in all the experiments. §.§.§ NMR Measurement of O_x^ϕ and O_y^ϕ For simplicity, consider the post-selected state |ϕ⟩ to be one of the computational basis vectors: {| 00⟩, | 01 ⟩, | 10 ⟩, | 11 ⟩} which are required to perform DQST or DQPT (Eq. (<ref>)). In this case, it turns out that the observables O_x(y)^ϕ can be directly measured by acquiring the NMR signal from F_3 (the meter qubit). The NMR signal of F_3 consists of four spectral peaks (see thermal spectra in blue color in Fig. <ref>(a)) corresponding to four transitions associated with density matrix elements (referred to as readout elements): ρ_56, ρ_12, ρ_78 and ρ_34 <cit.>. The first peak from the left in Fig.<ref>(a) corresponds to the post-selected state |ϕ⟩ = | 10 ⟩ while the second, third and fourth peaks correspond to the post-selected states | 00 ⟩, | 11 ⟩ and | 01 ⟩, respectively. These peaks (from the left) are also associated with readout elements ρ_56, ρ_12, ρ_78 and ρ_34, respectively. The line intensity of the absorption mode spectrum (x-magnetization) is proportional to the real part of the corresponding readout element of the density matrix while the dispersion mode spectrum (y-magnetization) is proportional to the imaginary part of the corresponding readout element: ⟨ O_x^ϕ⟩∝ Re(ρ_ij) and ⟨ O_y^ϕ⟩∝ Im(ρ_ij) where ρ_ij is the readout element of the three-qubit density matrix on which the observables O_x(y)^ϕ are being measured. The complete list of observables ⟨ O_x(y)^ϕ⟩ with corresponding spectral transitions and readout elements are listed in Table <ref>. Note that in the case of an arbitrary post-selected state |ϕ⟩, one has to decompose the observables O_x(y)^ϕ into Pauli basis operators as O_x(y)^ϕ = ∑_i a_i^x(y)P_i, then measure ⟨ P_i ⟩ corresponding to non-zero coefficients a_i^x(y) and finally compute ⟨ O_x(y)^ϕ⟩ for the given |ϕ⟩. An efficient way of measuring the expectation value of any Pauli observable is described in Reference <cit.>. §.§ Experimental weak measurement of σ_1z As an illustration, we experimentally obtained various relevant quantities (as described in Section <ref>) for the two-qubit Pauli operator σ_z⊗ I_2 × 2 = σ_1z. The weak measurement of σ_1z allows us to measure all the diagonal elements of the density matrix in a single experiment. We experimentally implemented the proposed scheme and measured ⟨ O_x(y)^ϕ⟩ and A_w^ϕΠ_ψ^ϕ with varying weak interaction strength g for the case of A = P_k = σ_1z, with the initial state |ψ⟩ = | 00 ⟩ and |ϕ⟩ being the computational basis vectors. All the NMR spectrums in Fig.<ref>(a) correspond to measurements on the F_3 qubit. The bottom spectrum in blue represents the thermal equilibrium spectrum obtained by applying a readout pulse on thermal state followed by detection on the F_3 qubit. As shown in Table.<ref>, the first peak (from the left) in the thermal spectrum corresponds to ⟨ O_x(y)^10⟩, while the second, third and fourth peaks correspond to ⟨ O_x(y)^00⟩, ⟨ O_x(y)^11⟩ and ⟨ O_x(y)^01⟩, respectively. The reference spectrum depicted in red is obtained by applying a readout pulse on an experimentally prepared pseudo pure state (PPS) using the spatial averaging technique<cit.> followed by detection on the F_3 qubit. The value of the reference peak is set to be 1. With respect to this reference, the observable ⟨ O_x^ϕ⟩ can be directly measured by computing spectral intensity by integrating the area under the corresponding peak, while the observable ⟨ O_y^ϕ⟩ can be measured by first performing a 90^∘ phase shift and then computing the intensity. Note that the quantity ⟨ O_y^ϕ⟩ is (-1) times the spectral intensity. For example, the third spectrum (depicted in green) in Fig.<ref>(a) corresponds to g = 0.1 The peak intensity with respect to reference spectrum turns out to be 0.1821 ± 0.003 which gives ⟨ O_y^00⟩ = -0.1821 ± 0.003 while the experimental value of ⟨ O_x^00⟩ (intensity before 90^∘ phase shift) turns out to be 0.0272 ± 0.0066. Similarly, the other four spectra in Fig.<ref>(a) correspond to various g values. One can see that from Fig.<ref>(a), the for all values of g the spectral intensity of the first, third and fourth peak corresponding to the post-selected states | 10 ⟩, | 11 ⟩ and | 01 ⟩, respectively, is negligible as compared to the reference peak which implies that the quantities ⟨ O_x(y)^10⟩, ⟨ O_x(y)^11⟩ and ⟨ O_x(y)^01⟩ are almost zero. This is to be expected since theoretically ⟨ϕ|σ_1z|ρ|ϕ⟩ = 0 except for |ϕ⟩ = | 00 ⟩, whereas the spectral intensity of the second peak corresponding to ⟨ O_y^00⟩ is non-zero and increases with g. The experimental values ⟨ O_x(y)^00⟩ and ⟨σ_1z⟩_w^00Π_00^00 are compared with their theoretically expected values in Fig. <ref>(b), for different values of g. Only the real part of ⟨σ_1z⟩_w^00Π_00^00, Re(⟨σ_1z⟩_w^00Π_00^00) = ⟨ O_y^00⟩/-2g is plotted as the imaginary part turns out to be almost zero (as seen from ⟨ O_x^00⟩ values). The experimental quantity ⟨σ_1z⟩_w^00Π_00^00 was calculated using Eq. (<ref>), however it can also be computed by rescaling the spectrum by the factor |1/2g| with respect to the reference spectrum. The expected value of ⟨σ_1z⟩_w^00Π_00^00 is equal to 1, which is the density matrix element ρ_11 of initial state |ψ⟩ = | 00 ⟩. As the value of g increases, the experimental and theoretical value of ρ_11 deviates more and more from 1, because the weak interaction approximation no longer holds for relatively large values of g. At g = 0.05, the experimental value of ρ_11^ exp was (0.9198 ± 0.0057) + i (0.0525 ± 0.0399), while at g = 0.5 the value of ρ_11^ exp was (0.7971 ± 0.0021) + i (0.0989 ± 0.0439). We also would like to point out here that in real experiments an arbitrary small value of g may not work, since the signal strength after the weak interaction may be too small to detect and may introduce large errors in the measurements. We also implemented the weak measurement-based scheme for different initial states. The results shown in Fig.<ref> were obtained by experimental implementing the weak measurement-based scheme for a fixed interaction strength g = 0.1 and for different initial states of the form |ψ⟩ = cos(n π/20)| 00 ⟩ + sin(n π/20)| 10 ⟩. The NMR spectrum in blue color in Fig.<ref>(a), is the reference spectrum, while the other two spectra in red and green correspond to the states n = 0 and n = 10, respectively, which were obtained by implementing the weak measurement quantum circuit (Fig.<ref>) followed by a 90^∘ phase shift. Note that since the value of g is fixed, the spectra corresponding to all n are rescaled by the factor 1/2(0.1) = 5 with respect to the reference spectrum, which directly yields Re( ⟨σ_1z⟩_w^ϕΠ_ψ^ϕ ) and Im(⟨σ_1z⟩_w^ϕΠ_ψ^ϕ ) (the real and imaginary parts of corresponding density matrix, respectively). For n = 0 (red spectrum), the observables ⟨ O_y^10⟩, ⟨ O_y^00⟩, ⟨ O_y^11⟩ and ⟨ O_y^01⟩ turned out to be -0.1370 ± 0.0008, -0.9137 ± 0.0038, -0.0267 ± 0.0010 and -0.1243 ± 0.0085, respectively. For n = 10 (green spectrum) the observables turned out to be 0.8687 ± 0.0054, 0.1255 ± 0.0033, 0.0294 ± 0.0003 and 0.0237 ± 0.0030, respectively. The experimentally obtained Re⟨σ_1z_w^ϕΠ_ψ^ϕ⟩ is compared with the theoretically expected values in Fig. <ref>(b), for |ϕ⟩ = | 00 ⟩ and |ϕ⟩ = | 10 ⟩ and for various initial states. The experimental values are in very good agreement with the theoretical predictions in both Figs.<ref> and <ref>, which clearly shows the successful implementation of the weak measurement of σ_1z. §.§ Experimental DQST and DQPT using weak measurements We now proceed to experimentally demonstrate element-wise full reconstruction of the density and process matrices of several states and quantum gates using the proposed weak measurement-based DQST and DQPT schemes. To estimate a desired element ρ_mn of the density matrix or χ_mn of the process matrix, one of the possible choices of the post-selected state |ϕ⟩, together with the Pauli operator P_k, is depicted as (|ϕ⟩, P_k) in the matrix: [ (| 00 ⟩, σ_1z) (| 01 ⟩, σ_2x) (| 10 ⟩, σ_1x) (| 11 ⟩, σ_1xσ_2x); ρ_12^* (| 01 ⟩, σ_1z) (| 10 ⟩, σ_1xσ_2x) (| 11 ⟩, σ_1x); ρ_13^* ρ_23^* -(| 10 ⟩, σ_1z) (| 11 ⟩, σ_2x); ρ_14^* ρ_24^* ρ_34^* -(| 11 ⟩, σ_1z); ] In this case, the full QST of a two-qubit quantum state requires weak measurements of only four Pauli operators: {σ_1z, σ_1x, σ_2x, σ_1xσ_2x}. The weak measurement of σ_1z allows us to directly estimate all the diagonal elements representing the populations of the energy eigenstates, while the weak measurements of σ_1x, σ_2x and σ_1xσ_2x yield two off-diagonal elements, each representing a single- and a multiple-quantum coherence. As an illustration, we experimentally performed DQST of the maximally entangled Bell states: |ψ_1 ⟩ = (| 00 ⟩ + | 11 ⟩)/√(2) and |ψ_2 ⟩ = (| 01 ⟩ + | 10 ⟩)/√(2) as well as DQPT of two quantum gates: the Hadamard gate H and a rotation gate R_x(π/2). For both DQST and DQPT, the value of g is set to be 0.2. The NMR readouts demonstrating the DQST of the Bell state |ψ_1 ⟩ = (| 00 ⟩ + | 11 ⟩)/√(2) are shown in Fig. <ref>, where weak measurements of four Pauli operators were carried out. The NMR readouts corresponding to the weak measurement of σ_1z, σ_2x, σ_1x and σ_1xσ_2x are depicted in red, green, purple and blue respectively, while the spectrum in black represents the reference spectrum. It can be clearly seen that the non-zero spectral intensities of the NMR peaks corresponding to (| 00 ⟩, σ_1z), (| 11 ⟩, σ_1z), (| 11 ⟩, σ_1xσ_2x) yield the three density matrix elements ρ_11, ρ_44 and ρ_14 respectively, whereas other peak intensities (Eq. (<ref>)) tend to zero as compared to the reference spectrum. The experimentally obtained real and imaginary parts of the density matrix corresponding to the Bell state |ψ_1 ⟩ are given in Eqs. (<ref>)-(<ref>), respectively. All the elements were measured with considerably high accuracy and precision. It is to be noted that the experimental density matrix is Hermitian by construction (the imaginary part of all diagonal elements can be ignored and set to zero) but may not satisfy positivity and trace conditions as all the independent elements {ρ_ij, i ≤ j } are computed individually and independently. For DQST of the Bell state |ψ_1 ⟩, the trace turns out to be 1.3435 and the eigenvalues are 1.2836, 0.2825, -0.1553 and -0.0673, which do not correspond to a valid density matrix. However, the true quantum state satisfying all the properties of a valid density matrix can be recovered from the experimental density matrix by recasting it as a constrained convex optimization problem <cit.>: min_ρ^true_weak ‖ρ^true_weak-ρ^dqst_weak‖_l_2 subject to ρ^true_weak ≥0, Tr(ρ^true_weak) =1. where ρ^ true_ weak is the variable density matrix corresponding to the true quantum state to be reconstructed, while ρ^ dqst_ weak is the experimentally obtained density matrix using the weak measurement-based DQST scheme. The → arrow denotes the vectorized form of the corresponding matrix and ‖ . ‖_l_2 represents l_2 norm, also known as the Euclidean norm of a vector. The valid density matrix ρ^ true_ weak representing the true quantum state was recovered from ρ^ dqst_ weak and is given in Eq. (<ref>). We note here in passing that the experimentally obtained density matrices ρ^ dqst_ weak (or ρ^ true_ weak) corresponding to the states |ψ_1 ⟩ and |ψ_2 ⟩ can be interpreted as the Choi-Jamiolkowski state corresponding to the identity gate (Λ = I) and the bit flip gate (Λ = σ_x), respectively. Re(ρ^ dqst_ weak)=[ 0.6089± 0.0015 -0.0104± 0.0007 0.0774± 0.0047 0.6314± 0.0074; -0.0104± 0.0007 0.0155± 0.0059 0.0633± 0.0073 -0.0534± 0.0183; 0.0774± 0.0047 0.0633± 0.0073 0.0764± 0.0019 -0.0956± 0.0292; 0.6314± 0.0074 -0.0534± 0.0183 -0.0956± 0.0292 0.6425± 0.0011; ] Im(ρ^ dqst_ weak)=[ 0 -0.0566± 0.0085 0.0352± 0.0123 0.1126± 0.0374; 0.0566± 0.0085 0 0.0860± 0.0217 -0.1384± 0.0036; -0.0352± 0.0123 -0.0860± 0.0217 0 0.1367± 0.0139; - 0.1126± 0.0374 0.1384± 0.0036 0.1367± 0.0139 0; ] ρ^ true_ weak=[ 0.4667 -0.0300 - 0.0333i -0.0217 - 0.0618i 0.4858 - 0.0811i; -0.0300 + 0.0333i 0.0043 0.0058 + 0.0024i -0.0255 + 0.0399i; -0.0217 + 0.0618i 0.0058 - 0.0024i 0.0092 -0.0118 + 0.0681i; 0.4858 + 0.0811i -0.0255 - 0.0399i -0.0118 - 0.0681i 0.5198; ] For DQPT implementation, the U_χ acts as a change of basis operation, which transforms the Choi-Jamiolkowski state to the process matrix χ in the chosen basis. The desired unitary operator U_χ is set to: U_χ=1/√(2)[ 1 0 0 1; 0 1 1 0; 0 -i i 0; 1 0 0 -1 ] which allows the estimation of the process matrix χ in the Pauli basis. The real and imaginary parts of the process matrix χ^ dqst_ weak in the Pauli basis corresponding to the Hadamard gate H obtained via the weak measurement-based DQPT protocol are given in Eqs. (<ref>)-(<ref>), respectively, where the trace turned out to be 0.9589 and the eigenvalues are -0.1646, 0.0795, 0.1427 and 0.9014. The true quantum process χ^ true_ weak can be recovered from χ^ dqst_ weak by solving a similar convex optimization problem as given in Eq. (<ref>) with the additional constraint ∑_m, nχ_m n E_n^† E_m= I, and is given in Eq. (<ref>). The theoretical process matrix corresponding to the Hadamard gate contains only four non-zero elements {ρ_ij = 0.5 | i,j=2,4 }, and it can be seen from Eqs. (<ref>)-(<ref>) that the weak measuremement scheme is able to determine all these elements with very high accuracy. The theoretical and experimental density and process matrices corresponding to the quantum state |ψ_2 ⟩ and the gate R_x(π/2) are graphically represented in Fig.<ref>. The experimental state (process) fidelity ℱ is computed using the normalized trace distance between the experimental and theoretical density (process) matrices<cit.>. The experimental fidelity of various quantum states and processes obtained via the weak measurement-based protocol is given in Table <ref>. Re(χ^ dqst_ weak)=[ -0.0010 ± 0.0005 0.0422± 0.0041 0.0635± 0.0012 -0.0854± 0.0004; 0.0422± 0.0041 0.3964 ± 0.0099 -0.0827± 0.0004 0.4406 ± 0.0097; 0.0635± 0.0012 -0.08269± 0.0004 0.0789 ± 0.0036 0.0429± 0.0019; -0.0854± 0.0004 0.4406± 0.0097 0.0429± 0.0019 0.4846± 0.0035; ] Im(χ^ dqst_ weak)=[ 0 0.0243± 0.0033 0.0554± 0.0155 -0.0195± 0.0012; -0.0243± 0.0033 0 -0.0664± 0.0081 0.0754± 0.0445; -0.0554± 0.0155 0.0664± 0.0081 0 0.0633± 0.0445; 0.0195± 0.0012 -0.0754± 0.0045 -0.0633± 0.0004 0; ] χ^ true_ weak=[ 0.0319 -0.0145 + 0.0072i 0.0144 + 0.0246i -0.0389 + 0.0077i; -0.0145 - 0.0072i 0.4021 -0.0380 - 0.0542i 0.3992 + 0.0653i; 0.0144 - 0.0246i -0.0380 + 0.0542i 0.0831 0.0008 + 0.0646i; -0.0389 - 0.0077i 0.3992 - 0.0653i 0.0008 - 0.0646i 0.4829; ] §.§.§ Extension to n qubits For an n-qubit density (or process) matrix, all the independent elements {ρ_ij, i ≤ j } can be obtained as given in Eq. (<ref>). All the 2^n diagonal elements can be recovered using a weak measurement of the σ_1z = σ_z ⊗ I^⊗ n-1 operator, whereas all the 2^n-1(2^n-1) off-diagonal elements can be obtained via weak measurements of n-qubit Pauli operators of the form { I, σ_x }^⊗ n (excluding I^⊗ n), each yielding 2^n-1 elements. For instance, the operator σ_x^⊗ n will measure the off-diagonal elements {ρ_ij, 1 ≤ i ≤ 2^n-1, j= 2^n+1-i }. The reconstruction of the full density matrix requires weak measurements of 2^n Pauli operators which is in stark contrast to standard tomographic protocols which require the measurement of 4^n-1 operators. Hence, even for full reconstruction, the weak measurement-based tomography protocol turns out to be much more efficient than standard and selective tomography protocols. The quantum circuit given in Fig. <ref>(a) can be extended to n-qubits, with DQST requiring one extra qubit as the meter qubit and DQPT requiring n extra ancillary qubits along the meter qubit. § CONCLUSIONS In this work an efficient scheme was proposed and a generalized quantum circuit to perform direct QST and QPT using a weak measurement-based technique was constructed and the protocol was successfully tested on an NMR quantum processor. We used the scalar J coupling to control the strength of the interaction between the system and the metre qubits and hence were able to efficiently simulate the weak measurement process with high accuracy. Our protocol allows us to directly obtain multiple selective elements of the density and the process matrix of an unknown quantum state and an unknown quantum process in a single experiment, which makes it more attractive as compared to other direct tomography methods. Furthermore we employed the convex optimization method to recover the underlying true quantum states and processes from the experimental data sets obtained via the weak measurement-based scheme which substantially improved the experimental fidelities. Unlike other measurement-based DQST (or DQPT) methods which require projective measurements on the system qubits and maximally disturb the state of the system, our protocol does not involve any measurements on the system qubits. Our experiments open up new research directions for various interesting weak measurement experiments on quantum ensembles which were earlier not possible. All experiments were performed on a Bruker Avance-III 400 MHz FT-NMR spectrometer at the NMR Research Facility at IISER Mohali. Arvind acknowledges funding from the Department of Science and Technology (DST), India, under Grant No DST/ICPS/QuST/Theme-1/2019/Q-68. K.D. acknowledges funding from the Department of Science and Technology (DST), India, under Grant No DST/ICPS/QuST/Theme-2/2019/Q-74. 42 fxundefined [1] ifx#1 fnum [1] #1firstoftwo secondoftwo fx [1] #1firstoftwo secondoftwo noop [0]secondoftwo ref[1]@startlink#1@href href[1]#1@endlink anitize@url [0]` 12`$12`&12`#12`1̂2`_12`%12 startlink[1] endlink[0] rl [1]href #1 @bib@innerbibempty [Yokota et al.(2009)Yokota, Yamamoto, Koashi, and Imoto]yokota-njp-2009 author author K. Yokota, author T. Yamamoto, author M. Koashi, and author N. Imoto, 10.1088/1367-2630/11/3/033011 journal journal New J. Phys. volume 11, pages 033011 (year 2009)NoStop [Piacentini et al.(2016a)Piacentini, Avella, Levi, Lussana, Villa, Tosi, Zappa, Gramegna, Brida, Degiovanni, and Genovese]avella-prl-2016 author author F. Piacentini, author A. Avella, author M. P. Levi, author R. Lussana, author F. Villa, author A. Tosi, author F. Zappa, author M. Gramegna, author G. Brida, author I. P. Degiovanni, and author M. Genovese, 10.1103/PhysRevLett.116.180401 journal journal Phys. Rev. Lett. volume 116, pages 180401 (year 2016a)NoStop [Aharonov and Vaidman(1990)]lev-prl-1990 author author Y. Aharonov and author L. Vaidman, 10.1103/PhysRevA.41.11 journal journal Phys. Rev. A volume 41, pages 11 (year 1990)NoStop [Aharonov et al.(1988)Aharonov, Albert, and Vaidman]lev-prl-1988 author author Y. Aharonov, author D. Z. Albert, and author L. Vaidman, 10.1103/PhysRevLett.60.1351 journal journal Phys. Rev. Lett. volume 60, pages 1351 (year 1988)NoStop [Piacentini et al.(2016b)Piacentini, Avella, Levi, Gramegna, Brida, Degiovanni, Cohen, Lussana, Villa, Tosi, Zappa, and Genovese]tosi-prl-2016 author author F. Piacentini, author A. Avella, author M. P. Levi, author M. Gramegna, author G. Brida, author I. P. Degiovanni, author E. Cohen, author R. Lussana, author F. Villa, author A. Tosi, author F. Zappa, and author M. Genovese, 10.1103/PhysRevLett.117.170402 journal journal Phys. Rev. Lett. volume 117, pages 170402 (year 2016b)NoStop [Thekkadath et al.(2016)Thekkadath, Giner, Chalich, Horton, Banker, and Lundeen]lundeen-prl-2016 author author G. S. Thekkadath, author L. Giner, author Y. Chalich, author M. J. Horton, author J. Banker, and author J. S. Lundeen, 10.1103/PhysRevLett.117.120401 journal journal Phys. Rev. Lett. volume 117, pages 120401 (year 2016)NoStop [Lundeen et al.(2011)Lundeen, Sutherland, Patel, Stewart, and Bamber]lundeen-nat-2011 author author J. S. Lundeen, author B. Sutherland, author A. Patel, author C. Stewart, and author C. Bamber, 10.1038/nature10120 journal journal Nature volume 474, pages 188 (year 2011)NoStop [Bhati and Arvind(2022)]bhati-pla-2022 author author R. S. Bhati and author Arvind, https://doi.org/10.1016/j.physleta.2022.127955 journal journal Phys. Lett. A volume 429, pages 127955 (year 2022)NoStop [Denkmayr et al.(2014)Denkmayr, Geppert, Sponar, Lemmel, Matzkin, Tollaksen, and Hasegawa]yuji-natcom-2014 author author T. Denkmayr, author H. Geppert, author S. Sponar, author H. Lemmel, author A. Matzkin, author J. Tollaksen, and author Y. Hasegawa, 10.1038/ncomms5492 journal journal Nat. Commun. volume 5, pages 4492 (year 2014)NoStop [Kocsis et al.(2011)Kocsis, Braverman, Ravets, Stevens, Mirin, Shalm, and Steinberg]sacha-science-2011 author author S. Kocsis, author B. Braverman, author S. Ravets, author M. J. Stevens, author R. P. Mirin, author L. K. Shalm, and author A. M. Steinberg, 10.1126/science.1202218 journal journal Science volume 332, pages 1170 (year 2011)NoStop [Groen et al.(2013)Groen, Ristè, Tornberg, Cramer, de Groot, Picot, Johansson, and DiCarlo]groen-prl-2013 author author J. P. Groen, author D. Ristè, author L. Tornberg, author J. Cramer, author P. C. de Groot, author T. Picot, author G. Johansson, and author L. DiCarlo, 10.1103/PhysRevLett.111.090506 journal journal Phys. Rev. Lett. volume 111, pages 090506 (year 2013)NoStop [Lundeen and Bamber(2012)]lundeen-prl-2012 author author J. S. Lundeen and author C. Bamber, 10.1103/PhysRevLett.108.070402 journal journal Phys. Rev. Lett. volume 108, pages 070402 (year 2012)NoStop [Bolduc et al.(2016)Bolduc, Gariepy, and Leach]bolduc-natcom-2016 author author E. Bolduc, author G. Gariepy, and author J. Leach, 10.1038/ncomms10439 journal journal Nature Communications volume 7, pages 10439 (year 2016)NoStop [Kim et al.(2012)Kim, Lee, Kwon, and Kim]kim-np-2012 author author Y.-S. Kim, author J.-C. Lee, author O. Kwon, and author Y.-H. Kim, 10.1038/nphys2178 journal journal Nat. Phys. volume 8, pages 117 (year 2012)NoStop [Wang et al.(2014)Wang, Yu, Zou, and Wang]wang-pra-2014 author author S.-C. Wang, author Z.-W. Yu, author W.-J. Zou, and author X.-B. Wang, 10.1103/PhysRevA.89.022318 journal journal Phys. Rev. A volume 89, pages 022318 (year 2014)NoStop [Blok et al.(2014)Blok, Bonato, Markham, Twitchen, Dobrovitski, and Hanson]blok-np-2014 author author M. S. Blok, author C. Bonato, author M. L. Markham, author D. J. Twitchen, author V. V. Dobrovitski, and author R. Hanson, 10.1038/nphys2881 journal journal Nat. Phys. volume 10, pages 189 (year 2014)NoStop [Baek et al.(2008)Baek, Cheong, and Kim]baek-pra-2008 author author S.-Y. Baek, author Y. W. Cheong, and author Y.-H. Kim, 10.1103/PhysRevA.77.060308 journal journal Phys. Rev. A volume 77, pages 060308 (year 2008)NoStop [Zhang et al.(2015)Zhang, Datta, and Walmsley]zhang-prl-2015 author author L. Zhang, author A. Datta, and author I. A. Walmsley, 10.1103/PhysRevLett.114.210801 journal journal Phys. Rev. Lett. volume 114, pages 210801 (year 2015)NoStop [Avella et al.(2017)Avella, Piacentini, Borsarelli, Barbieri, Gramegna, Lussana, Villa, Tosi, Degiovanni, and Genovese]avella-pra-2017 author author A. Avella, author F. Piacentini, author M. Borsarelli, author M. Barbieri, author M. Gramegna, author R. Lussana, author F. Villa, author A. Tosi, author I. P. Degiovanni, and author M. Genovese, 10.1103/PhysRevA.96.052123 journal journal Phys. Rev. A volume 96, pages 052123 (year 2017)NoStop [Cujia et al.(2019)Cujia, Boss, Herb, Zopes, and Degen]cujia-nature-2019 author author K. S. Cujia, author J. M. Boss, author K. Herb, author J. Zopes, and author C. L. Degen, 10.1038/s41586-019-1334-9 journal journal Nature volume 571, pages 230 (year 2019)NoStop [Feng et al.(2021)Feng, Ren, and Zhou]feng-pra-2021 author author T. Feng, author C. Ren, and author X. Zhou, 10.1103/PhysRevA.104.042403 journal journal Phys. Rev. A volume 104, pages 042403 (year 2021)NoStop [Li et al.(2022)Li, Wang, Feng, Li, Ren, and Zhou]li-pra-2022 author author C. Li, author Y. Wang, author T. Feng, author Z. Li, author C. Ren, and author X. Zhou, 10.1103/PhysRevA.105.062414 journal journal Phys. Rev. A volume 105, pages 062414 (year 2022)NoStop [Wang et al.(2022)Wang, Zhang, and Zhao]wang-commun-2023 author author Z. Wang, author Z. Zhang, and author Y. Zhao, 10.1088/1572-9494/ac9f0e journal journal Communications in Theoretical Physics volume 75, pages 015101 (year 2022)NoStop [Perito et al.(2018)Perito, Roncaglia, and Bendersky]perito-pra-2018 author author I. Perito, author A. J. Roncaglia, and author A. Bendersky, 10.1103/PhysRevA.98.062303 journal journal Phys. Rev. A volume 98, pages 062303 (year 2018)NoStop [Schmiegelow et al.(2011)Schmiegelow, Bendersky, Larotonda, and Paz]paz-prl-2011 author author C. T. Schmiegelow, author A. Bendersky, author M. A. Larotonda, and author J. P. Paz, 10.1103/PhysRevLett.107.100502 journal journal Phys. Rev. Lett. volume 107, pages 100502 (year 2011)NoStop [Gaikwad et al.(2018)Gaikwad, Rehal, Singh, Arvind, and Dorai]gaikwad-pra-2018 author author A. Gaikwad, author D. Rehal, author A. Singh, author Arvind, and author K. Dorai, 10.1103/PhysRevA.97.022311 journal journal Phys. Rev. A volume 97, pages 022311 (year 2018)NoStop [Gaikwad et al.(2022a)Gaikwad, Shende, Arvind, and Dorai]gaikwad-sr-2022 author author A. Gaikwad, author K. Shende, author Arvind, and author K. Dorai, 10.1038/s41598-022-07721-3 journal journal Sci. Rep. volume 12, pages 3688 (year 2022a)NoStop [Das and Arvind(2014)]debmalya author author D. Das and author Arvind, 10.1103/PhysRevA.89.062121 journal journal Phys. Rev. A volume 89, pages 062121 (year 2014)NoStop [Xu et al.(2021)Xu, Xu, Jiang, Xu, Zheng, Wang, Zhang, and Zhang]xu-prl-2021 author author L. Xu, author H. Xu, author T. Jiang, author F. Xu, author K. Zheng, author B. Wang, author A. Zhang, and author L. Zhang, 10.1103/PhysRevLett.127.180401 journal journal Phys. Rev. Lett. volume 127, pages 180401 (year 2021)NoStop [Ren et al.(2019)Ren, Wang, and Du]ren-prapp-2019 author author C. Ren, author Y. Wang, and author J. Du, 10.1103/PhysRevApplied.12.014045 journal journal Phys. Rev. Appl. volume 12, pages 014045 (year 2019)NoStop [Lu et al.(2014)Lu, Brodutch, Li, Li, and Laflamme]lu-njp-2014 author author D. Lu, author A. Brodutch, author J. Li, author H. Li, and author R. Laflamme, 10.1088/1367-2630/16/5/053015 journal journal New J. Phys. volume 16, pages 053015 (year 2014)NoStop [Kim et al.(2018)Kim, Kim, Lee, Han, Moon, Kim, and Cho]kim-natcom-2018 author author Y. Kim, author Y.-S. Kim, author S.-Y. Lee, author S.-W. Han, author S. Moon, author Y.-H. Kim, and author Y.-W. Cho, 10.1038/s41467-017-02511-2 journal journal Nat. Commun. volume 9, pages 192 (year 2018)NoStop [Zhang et al.(2017)Zhang, Zhu, Wu, and Chen]zhang-ap-2017 author author Y.-X. Zhang, author X. Zhu, author S. Wu, and author Z.-B. Chen, https://doi.org/10.1016/j.aop.2016.12.034 journal journal Ann. Phys. volume 378, pages 13 (year 2017)NoStop [Gaikwad et al.(2021)Gaikwad, Arvind, and Dorai]gaikwad-qip-2021 author author A. Gaikwad, author Arvind, and author K. Dorai, 10.1007/s11128-020-02930-z journal journal Quant. Inf. Proc. volume 20, pages 19 (year 2021)NoStop [Kraus et al.(1983)Kraus, Bohm, Dollard, and Wootters]kraus-book-83 author author K. Kraus, author A. Bohm, author J. D. Dollard, and author W. H. Wootters, @noop title States, Effects and Operations: Fundamental Notions of Quantum Theory (publisher Springer Berlin Heidelberg, address Berlin Germany, year 1983)NoStop [Jiang et al.(2013)Jiang, Luo, and Fu]jiang-pra-2013 author author M. Jiang, author S. Luo, and author S. Fu, 10.1103/PhysRevA.87.022310 journal journal Phys. Rev. A volume 87, pages 022310 (year 2013)NoStop [Oliveira et al.(2007)Oliveira, Bonagamba, Sarthour, Freitas, and deAzevedo]oliveira-book-07 author author I. S. Oliveira, author T. J. Bonagamba, author R. S. Sarthour, author J. C. C. Freitas, and author E. R. deAzevedo, @noop title NMR Quantum Information Processing (publisher Elsevier, address Linacre House, Oxford, UK, year 2007)NoStop [Gulati et al.(2022)Gulati, Arvind, and Dorai]gulati-epjd-2022 author author V. Gulati, author Arvind, and author K. Dorai, 10.1140/epjd/s10053-022-00527-y journal journal Eur. Phys. J. D . volume 76, pages 194 (year 2022)NoStop [Gaikwad et al.(2022b)Gaikwad, Arvind, and Dorai]gaikwad-qinp-2022 author author A. Gaikwad, author Arvind, and author K. Dorai, 10.1007/s11128-022-03695-3 journal journal Quantum Information Processing volume 21, pages 388 (year 2022b)NoStop [Singh et al.(2018)Singh, Singh, Dorai, and Arvind]singh-pra-2018 author author A. Singh, author H. Singh, author K. Dorai, and author Arvind, 10.1103/PhysRevA.98.032301 journal journal Phys. Rev. A volume 98, pages 032301 (year 2018)NoStop [Cory et al.(1998)Cory, Price, and Havel]cory-physicad-1998 author author D. G. Cory, author M. D. Price, and author T. F. Havel, https://doi.org/10.1016/S0167-2789(98)00046-3 journal journal Physica D: Nonlinear Phenomena volume 120, pages 82 (year 1998)NoStop [Singh et al.(2016)Singh, Arvind, and Dorai]harpreet-mle author author H. Singh, author Arvind, and author K. Dorai, https://doi.org/10.1016/j.physleta.2016.07.046 journal journal Physics Letters A volume 380, pages 3051 (year 2016)NoStop
http://arxiv.org/abs/2303.07006v1
20230313110149
Inelastic Exponentiation and Classical Gravitational Scattering at One Loop
[ "Alessandro Georgoudis", "Carlo Heissenberg", "Ingrid Vazquez-Holm" ]
hep-th
[ "hep-th", "gr-qc", "hep-ph" ]
Appendix Mengchao He March 30, 2023 ================== § INTRODUCTION AND SUMMARY OF RESULTS Recent years have witnessed renewed efforts in the study of two-body systems undergoing classical gravitational collisions, motivated by the ultimate objective of providing increasingly accurate waveform templates for gravitational wave detection <cit.>. While at first sight counterintuitive, scattering-amplitude methods borrowed from collider physics <cit.> have proven to be powerful tools for describing such systems and providing state-of-the-art predictions in the Post-Minkowskian (PM) regime, when the two colliding objects are sufficiently far apart and interact weakly <cit.>. Interactions between astrophysical black holes or neutron stars involved in such collisions are indeed classical, since their typical quantum wavelength is much smaller than the length scale associated to the gravitational curvature they induce, a statement that for black holes of mass M translates to GM^2/ħ≫1. This inequality, which is of course amply satisfied by such objects, signals, however, a breakdown of conventional perturbation theory, since the effective coupling to gravity is not small. Therefore scattering amplitudes, which are organized as a weak-coupling G-expansion, must actually be supplemented with a nonperturbative principle in order to correctly capture the classical limit. One such guiding principle, which is also familiar from the non-relativistic WKB approximation, is that in the classical limit the S-matrix should be dominated by the exponential e^2iδ of a large phase 2δ, which plays the role of a large action in units of ħ. For the elastic 2→2 amplitude this resummation is known as the eikonal exponentiation and the eikonal phase, or the closely related radial action, has been employed to extract from the amplitude the deflection angle(s) for two-body collisions up to 4PM order <cit.>. The nonperturbative nature of the problem manifests itself at each loop order via “superclassical” or “iteration” terms, contributions that scale with higher powers of the large ratio GM^2/ħ, or, for short, of ħ^-1. The eikonal exponentiation dictates how such spurious terms should be subtracted, by matching with the power series expansion of the exponential, and fixes all ambiguities associated to possible remainders, providing a direct connection to the impulse and to the deflection angle via a saddle point approximation <cit.>. However, by focusing on the elastic 2→2 amplitude, the conventional eikonal framework fails to capture possible subtractions associated to inelastic channels. For instance the infrared (IR) divergent imaginary part in the 3PM eikonal signals the fact that at 𝒪(G^3) an inelastic 3-particle channel involving the two massive states and a graviton opens up, and the standard eikonal exponentiation does not capture it. This problem has been studied and solved in <cit.>, the basic idea being that, in a more comprehensive framework, the eikonal should be promoted to the exponential of i times a suitable Hermitian operator that is able to appropriately combine all needed channels. The approach of Ref. <cit.> is to apply this principle to the full S-matrix, writing S = e^iN with N^†= N and building N-matrix elements out of conventional scattering amplitudes, which are of course T-matrix elements with S = 1 + iT. A complementary approach is provided by the formalism first introduced by Kosower, Maybee and O'Connell (KMOC) <cit.> and later developed in Refs. <cit.>. This framework is based on the principle that, after identifying a well-defined classical observable O associated to the collision, its expectation value in the final state dictated by the S-matrix, ⟨in| S^† O S |in⟩ (minus its expectation in the initial state ⟨in| O |in⟩ if nonzero) will be free of superclassical terms and thus possesses a well-defined classical limit. The state |in⟩ models the two incoming massive particles with given impact parameter(s) via an appropriate superposition of plane-wave states built with suitable wave-packets, whose details become immaterial after the cancellation of superclassical terms. In this paper, we explore further the exponentiation in the classical limit and the connection between amplitudes and classical observables. We focus on the 2→3 amplitude for the scattering of two minimally-coupled massive scalars plus the emission of a single graviton in General Relativity, whose loop expansion reads 𝒜^μν=𝒜_0^μν+𝒜_1^μν+⋯, or, pictorially, [draw, ultra thick, blue] (-4.5,2.2)–(-1.5,2.2); [draw, ultra thick, green!60!black] (-4.5,.8)–(-1.5,.8); [draw, red] (-3,1.5)–(-1.5,1.5); [white, very thick] (-3,1.5) ellipse (.7 and 1); [pattern=north west lines, very thick] (-3,1.5) ellipse (.7 and 1); = [draw, ultra thick, blue] (-4.5,2.2)–(-1.5,2.2); [draw, ultra thick, green!60!black] (-4.5,.8)–(-1.5,.8); [draw, red] (-3,1.5)–(-1.5,1.5); [black!20!white, thick] (-3,1.5) ellipse (.7 and 1); [thick] (-3,1.5) ellipse (.7 and 1); + [draw, ultra thick, blue] (-4.5,2.2)–(-1.5,2.2); [draw, ultra thick, green!60!black] (-4.5,.8)–(-1.5,.8); [draw, red] (-3,1.5)–(-1.5,1.5); [black!20!white, thick] (-3,1.5) ellipse (.7 and 1); [thick] (-3,1.5) ellipse (.7 and 1); [white, thick] (-3,1.5) ellipse (.3 and .4); [pattern=none, thick] (-3,1.5) ellipse (.3 and .4); +⋯ and discuss the calculation of its 1-loop part, 𝒜_1^μν, starting from the integrand provided in Ref. <cit.>. We focus on the non-analytic terms in the near-forward limit, whereby the transferred momentum and the emitted graviton's momentum are simultaneously taken to be small, 𝒪 (ħ), in comparison with the particles' masses, 𝒪 (ħ^0). To this end we apply the method of regions and restrict our attention to the soft region, in which the loop momentum assigned to the exchanged gravitons is also small, 𝒪 (ħ). We employ dimensional regularization, letting ϵ= 4-D/2, and express the result as a Laurent expansion around ϵ=0. The calculation of 𝒜_1^μν in the soft region constitutes one of the main new results of this work, and represents a first step in generalizing the studies of graviton emissions during collisions of ultrarelativistic or massless objects <cit.> to the case of massive objects with generic velocities. The amplitude 𝒜_1^μν, as expected, involves both superclassical, 𝒪 (ħ^-2), and classical, 𝒪 (ħ^-1), contributions, for each of which we calculate both infrared (IR) divergent and finite terms. For the IR divergent pieces, we find complete agreement with the well-known exponential pattern <cit.> according to which IR divergences in a given one-loop amplitude are equal to a one-loop-exact divergent factor 𝒲 times the tree-level amplitude with the same external states <cit.>. In the Weinberg limit, in which the emitted graviton's frequency becomes very small, k^μ∼𝒪(λ) with λ→0, the one-loop amplitude 𝒜_1^μν must also exhibit 𝒪(λ^-1) terms whose form is completely fixed by the leading soft graviton theorem <cit.> as the factor ℱ^μν = √(8π G)∑_n p_n^μ p_n^ν / (p_n· k) times the 2→2 one-loop amplitude without graviton emissions. This 1/λ pole is a frequency-space manifestation of the memory effect <cit.>. Comparing with the results available from the literature <cit.>, we find perfect agreeement with this prediction, reproducing in particular the terms arising from the 2PM deflection encoded in one-loop 2→2 “triangle” contributions, i.e. from the sub-leading eikonal phase 2δ_1. Moreover, exploiting the conventional exponentiation of the 2→2 amplitude, this factorization allows us to check the inelastic exponentiation of Refs. <cit.> to leading order in the soft limit. Throughout the paper, we focus on emitted gravitons with positive frequencies, so that we do not include in our analysis terms with support localized at ω=0 in frequency space, which are associated to static effects in time domain (see e.g. <cit.> for their concrete appearance in the tree-level expressions). The inclusion of such terms has been discussed in <cit.> and can be typically performed by means an appropriate dressing of the initial and final states with a modified Weinberg factor √(8π G)∑_n p_n^μ p_n^ν / (p_n· k-i0). After constructing the appropriate subtractions dictated by the N-matrix formalism <cit.>, we calculate the 2→3, N-matrix element ℬ_1^μν from the amplitude 𝒜_1^μν. In this way we obtain a purely classical object, ℬ_1^μν, which is also real and free of IR divergences. Indeed, by comparing the operator power series N = -ilog(1+iT) = T - i/2T^2+ ⋯ and the unitarity constraint i(T^†-T) = T^† T, it is easy to see that, at one loop, the operator exponentiation of <cit.> boils down to simply dropping the imaginary parts of the amplitude, i.e. to subtracting its unitarity cuts, 2Im𝒜_1^μν = ∑(cuts). For the process under considerations, there are four distinct channels, which we depict in Table <ref>. Two of them, often referred to as s and s', involve cutting an intermediate state with two massive particles, and we shall call them collectively “S-channel”. We find that the subtraction of the S-channel is actually enough to get rid of all superclassical terms. This is in accordance with Refs. <cit.>, since this subtraction in momentum space is equivalent in b-space to the subtraction of 2iδ_0 𝒜̃_0^μν. Indeed, since this cut contributes schematically via +i/2(S-channel) to the amplitude and each of the two diagrams in the first line of Table <ref> contributes as 2δ_0 𝒜̃_0^μν in b-space, it is crucial to consider both diagrams in order to get the right combinatoric factor in front. The remaining two cuts in Table <ref>, s_1 and s_2, instead involve an intermediate state with a massive particle and a graviton, in which the latter re-scatters against the massive line in the gravitational analog of a Compton process. For this reason, we may call them collectively “C-channel”. Albeit classical as far as the ħ scaling is concerned, the C-channel involves an infrared divergence and its subtraction is crucial in order to make the resulting ℬ_1^μν (real and) finite as ϵ→0. The amplitude 𝒜_1^μν, and the N-matrix element ℬ_1^μν, encode the dynamical information needed in order to evaluate the 𝒪(G^3) corrections to asymptotic value of the metric fluctuation far away from the collision, which provide the next order in the PM expansion compared to the results of Refs. <cit.>. For this reason we investigate the construction of the associated KMOC kernel, i.e. the object whose Fourier transform from q-space to b-space provides the waveform in frequency domain. We find that this kernel is not simply given by iℬ_1^μν, as perhaps expected. Rather, it equals iℬ_1^μν plus 12 times the IR divergent C-channel cuts. By its very nature, the associated IR pole in 1/ϵ can be exponentiated to a q-independent phase, amounting to a (divergent) shift of the origin of the observer's retarded time, at the price of introducing a logarithm involving an unspecified scale in the finite part. Neither the phase nor this logarithm appear in the energy-momentum spectra, and could as such be considered “harmless”. The appearance of potentially ambiguous logarithms in the waveform, as a result of the long-range nature of the gravitational force, is a known issue and is often fixed by the appropriate treatment of so-called tail or rescattering effects <cit.>. We leave further investigations of this issue for future work, together with the calculation of the (b-space) waveform and with a comparison with subleading logλ-corrected soft theorems <cit.>, which are also intimately related with long-range corrections to the asyptotic interactions. The paper is organized as follows. In Section <ref> we present our conventions for dealing with the external states of the scattering, illustrating a useful choice of variables and polarizations, while more details on them are available in Appendix <ref>. In Section <ref> we discuss the classical limit and how focusing on the soft region simplifies the integration. We list the corresponding 9 independent master integrals in Appendix <ref> and in the file . Section <ref> is devoted to illustrating our result for the amplitude, which is collected in computer-readable format in the file , discussing the consistency checks offered by the exponentiation of IR divergences and from factorization in the soft limit. We also discuss the implications of unitarity and the subtraction of superclassical iterations, explicitly proving the leading constraint coming from the inelastic exponentiation. The tree-level amplitudes needed to perform such checks are presented in Appendix <ref>. In Section <ref>, we discuss the calculation of the gravitational field, of the associated spectrum and of the asymptotic waveform, before presenting a summary of our conclusions and a prospect of possible future directions in Section <ref>. *Conventions: We employ the mostly-plus signature, η_μν = diag(-,+,+,+). All momenta are regarded as formally outgoing, so that p_3, p_4 and k are the physical momenta of the final states of the scattering, while p_1 and p_2 are minus the physical momenta of the initial states. *Note added: While working on this project we became aware of independent progress by Refs. <cit.>, whose scope partly overlaps with our analysis. These groups' work was also presented as a series of seminars <cit.> at the “QCD Meets Gravity 2022” conference. § KINEMATICS We consider the scattering of two massive objects with masses m_1 (depicted with a thick blue line) and m_2 (thick green line) and the emission of a graviton (thin red line), 𝒜^μν = [scale=1] [<-] (-4.8,5.17)–(-4.2,5.17); [<-] (-1,5.15)–(-1.6,5.15); [<-] (-1,3.15)–(-1.6,3.15); [<-] (-1,.85)–(-1.6,.85); [<-] (-4.8,.83)–(-4.2,.83); [<-] (-2.85,1.7)–(-2.85,2.4); [<-] (-2.85,4.3)–(-2.85,3.6); [draw, ultra thick, blue] (-5,5)–(-3,5)–(-1,5); [draw, ultra thick, color=green!60!black] (-5,1)–(-3,1)–(-1,1); [draw, color=red] (-3,3)–(-1,3); [draw] (-3,1)–(-3,5); [dashed] (-3,3) ellipse (1.3 and 2.3); at (-1,3)[below]k; at (-5,5)[left]p_1; at (-5,1)[left]p_2; at (-1,5)[right]p_4; at (-1,1)[right]p_3; at (-2.8,4)[right]q_1; at (-2.8,2)[right]q_2; with p_1^2 = p_4^2 = -m_1^2 , p_2^2 = p_3^2 = -m_2^2 , k^2 = 0 . The figure in (<ref>) is meant to help remembering the definition of the “transferred momenta” q_1, q_2, q_1 = p_1+p_4 , q_2 = p_2+p_3 , q_1+q_2+k=0 and does not represent an actual topology. Let us begin by discussing a useful choice of variables. §.§ Physical variables We let p_1^μ=-m̅_1 u_1^μ+q_1^μ/2 , p_4^μ = m̅_1 u_1^μ + q_1^μ/2 p_2^μ=-m̅_2 u_2^μ +q_2^μ/2 , p_3^μ = m̅_2 u_2^μ + q_2^μ/2 with u_1^2 = -1 = u_2^2 , y=-u_1· u_2≥1. In this way, u_1· q_1 = 0 , u_2· q_2=0 , and m̅_1^2 = m_1^2 + q_1^2/4, m̅_2^2 = m_2^2 + q_2^2/4 . The momentum transfers q_1^μ and q_2^μ are not independent because of momentum conservation (<ref>) and of the mass-shell condition k^2=0, which implies q_1· q_2 = -1/2(q_1^2+q_2^2) . Five independent invariant Lorentz products can be taken as follows: y = -u_1· u_2 , ω_1= u_1· q_2 , ω_2=u_2· q_1 , q_1^2 , q_2^2 . The variable y is the relative Lorentz factor of two observers with four-velocities u_1^μ, u_2^μ. Letting v̅ denote the velocity of the former as seen from the rest frame of the latter (or vice-versa), y = 1/√(1-v̅^2) . Using (<ref>), we see that ω_1 and ω_2 are the frequency of the graviton measured by these two observers, ω_1= -u_1· k≥ 0 , ω_2= -u_2· k≥ 0 . In order to simplify square roots that frequently appear in the calculations, it is convenient to define the following dimensionless variables x = y-√(y^2-1) , w_1 = ω_1+√(ω_1^2+q_2^2)/q_2 , w_2 = ω_2+√(ω_2^2+q_1^2)/q_1 , with the inverse relations given by y = 1/2(x+1/x), ω_1= q_2/2(w_1- 1/w_1), ω_2= q_1/2(w_2-1/w_2) so that they obey the inequalities 0<x≤ 1 , w_1≥1 , w_2≥1 . The limit x→ 0 corresponds to the high-energy (ultrarelativistic) regime and x→ 1 to the low-energy one. §.§ Polarization tensor It is convenient to contract the amplitude with an appropriate polarization tensor, which we can build as follows. We start from a vector ε^μ = c_1 u_1^μ + c_2 u_2^μ + d_1 q_1^μ + d_2 q_2^μ with generic coefficients c_1, c_2, d_1, d_2. We solve the transversality condition, k^με_μ = - (q_1+q_2)^με_μ = 0 , by letting d_1 = d_+ - d_- , d_2 = d_+ + d_- , d_- = c_1 ω_1 + c_2 ω_2/q_1^2-q_2^2 . We then define the polarization tensor ε^μν = ε^με^ν . This transverse, thanks to (<ref>). It can be also made traceless and related to more standard choices of graviton polarizations as detailed in Appendix <ref>. We introduce the symbol 𝒜_1^ = ε_μ𝒜_1^μνε_ν to denote the contracted amplitude. Defining ε̂^μ = ε^μ - d_+ (q_1+q_2)^μ= ε^μ + d_+ k^μ , gauge invariance requires that we can freely replace ε^μ with ε̂^μ 𝒜_1 = ε̂_μ𝒜_1^μνε̂_ν . The new polarization vector (<ref>) is independent of d_+, which thus constitutes a free parameter that ought to drop out from the final expression. This serves as a very useful cross-check of the calculations. § CLASSICAL LIMIT AND INTEGRATION Let us spell out the decomposition of our amplitude in the classical or near-forward limit. In this regime the momentum transfers q_1, q_2 are taken to be simultaneously small with respect to the masses of the incoming particles, or, equivalently, the masses are taken to be large with respect to the exchanged momenta. We can therefore use a common scaling parameter as a bookkeeping device for the associated power counting. We shall use ħ for this bookkeeping purpose and define the scaling by q_1,2∼𝒪(ħ) , m̅_1,2∼ u_1,2∼𝒪(ħ^0 ) , ε∼𝒪(ħ^0) , ħ→ 0 . We emphasize again that (<ref>) only serves to keep track of powers of the transferred momenta and does not refer to the actual dependence of the amplitude on the Planck constant after restoring standard units <cit.>. We shall also scale the integrated momentum ℓ associated to exchanged gravitons in the same way as the exchanged momenta q_1,2, ℓ∼𝒪(ħ) . This enforces the expansion for the loop integrals in the soft region, which is the appropriate one to capture all the non-analytic dependence on q_1, q_2 in the amplitude. From Eq. (<ref>), it also follows that k∼𝒪(ħ) , c_1,2∼𝒪(ħ^0) , d_1,2∼𝒪(ħ^-1) , where c_1,2 and d_1,2 are the decomposition coefficients in (<ref>). We follow the numbering of the 24 topologies, 𝒢_j with j=1,…,24, associated to the integrand numerators given in Ref. <cit.>, which are depicted in Table <ref> and can be grouped into five families as in Table <ref>. As we shall discuss in the Subsection <ref>, all integrals belonging to the P, P', M and M' families can be mapped to a collection of linearized pentagon integrals. The 5 integrals of the quantum family are manifestly associated to intermediate processes, like creation of black-hole-/anti-black-hole pairs, which ought be disregarded in the classical limit, and indeed the associated integrals vanish in the soft region. In this way, the 16 master integrals in Table <ref> below suffice to decompose the integrand via Integration By Parts and to evaluate the resulting integrals relevant for our purposes. Each of the 16 numerators belonging the P, P', M and M' families should be multiplied by the appropriate propagators dictated by its diagram, and summed over the 8 independent permutations P_8 = {σ_1, σ_2, σ_3, σ_4, σ_2σ_3, σ_3σ_4, σ_2σ_4,σ_2σ_3σ_4 } generated by the following ones, σ_1: The trivial transformation (identity element). σ_2: The permutation interchanging the endpoints of the blue line in Eq. (<ref>), sending u_1^μ↦ -u_1^μ and correspondingly[In principle also x↦-x corresponds to changing the sign of y, but the transformation in (<ref>) is the one that leaves √(y^2-1)=12(x+1x) invariant. For the same reason, one discards w_1↦-w_1.] y ↦ -y , ω_1→ -ω_1 ; x ↦ -1/x , w_1 ↦1/w_1 . σ_3: The permutation interchanging the endpoints of the green line in Eq. (<ref>), sending u_2^μ↦ -u_2^μ and correspondingly y ↦ -y , ω_2↦ -ω_2 ; x ↦ -1/x , w_2 ↦1/w_2 . σ_4: Particle-interchange symmetry, which corresponds to replacing the blue line with the green one and vicevesa, and to interchanging all particle labels 1↔2. Of course, these operations should be performed while leaving ε^μ in Eq. (<ref>) invariant. For this reason, after expanding it as in (<ref>), one should compensate for the transformations of the basis vectors by also sending c_1↦ -c_1 (resp. c_2↦ -c_2) when performing σ_2 (resp. σ_3) and by sending c_1↔ c_2, d_1 ↔ d_2 when performing σ_4. Moreover, each diagram should only be summed over its nontrivial permutations. Equivalently, when summing over the whole P_8, each diagram should be supplied with the appropriate symmetry factor s_i accounting for the fact that a subset of the permutations may leave it invariant. Massless bubble diagrams 𝒢_20, 𝒢_23 carry an additional factor of 1/2 due to the freedom of relabeling the loop momentum. After evaluating the integrals in each family using the integration measure ∫_ℓ= e^γ_E ϵ∫d^4-2ϵℓ/iπ^2-ϵ and summing over the allowed permutations, the last step is to multiply by the overall normalization factor 𝒩 given by 𝒩 = e^-γ_Eϵμ^2ϵ/(4π)^2-ϵ(32π G)^5/2 = 𝒩_4 μ̅^2ϵ , 𝒩_4 = (32π G)^5/2/(4π)^2 , μ̅^2= 4π e^-γ_Eμ^2 , with μ an arbitrary energy scale introduced by dimensional regularization. All in all, we may summarize this construction as follows, 𝒜_1 = 𝒩∑_j=1^24∫_ℓ∑_σ∈ P_8σ[s_j 𝒢_j/den_j]. §.§ Mapping to the pentagon family In the limit (<ref>), with an appropriate choice of loop momentum routing, all integrals in the pentagon family can be mapped to the following collection of integrals I_i_1,i_2,i_3,i_4,i_5 = ∫_ℓ1/(2 u_1·ℓ)^i_1(-2u_2·ℓ)^i_2(ℓ^2)^i_3 ((ℓ+q_2)^2)^i_4((ℓ-q_1)^2)^i_5 . In Eq. (<ref>) and in the following, the -i0 prescription is left implicit for brevity. The family (<ref>) is obtained from the conventional scalar pentagon with two massive lines (the momentum flows clockwise in the loop and, as in Eq. (<ref>), the external momenta are all outgoing) [draw, ultra thick, green!60!black] (-2,0)–(2,0); [draw, ultra thick, blue] (-2,3)–(2,3); [draw,thin] (-1.5,0)–(-1.5,3); [draw,thin] (1.5,0)–(1.5,3); [draw,thin] (1.5,1.5)–(2,1.5); at (2,1.5)[right]k; at (-1.5,1.5)[left]ℓ; at (0,3)[below]-p_1+ℓ; at (0,0)[above]p_2+ℓ; at (1.5,2.5)[right]ℓ-q_1; at (1.5,0.5)[right]ℓ+q_2; by linearizing the two massive propagators and factoring out m̅_1, m̅_2: 1/(ℓ-p_1)^2+m_1 = 1/-2p_1·ℓ+ℓ^2= 1/2m̅_1 u_1·ℓ +ℓ^2-q_1^2 = 1/m̅_11/(2u_1·ℓ) + 𝒪(ħ^0) , 1/(ℓ+p_2)^2+m_2 = 1/2p_2·ℓ+ℓ^2= 1/-2m̅_2 u_2·ℓ +ℓ^2+q_2^2 = 1/m̅_21/(-2u_2·ℓ) + 𝒪(ħ^0) . In our conventions, the sign of each propagator is fixed due to the -i0 prescription, e.g. 1/(-2u_2·ℓ) = 1/-2u_2·ℓ-i0 , - 1/(2u_2·ℓ) = - 1/2u_2·ℓ-i0 , so that 1/(-2u_2·ℓ)+1/(2u_2·ℓ) = 2iπδ(2u_2·ℓ) . A basis of for the family of integrals (<ref>), which determine all the others via Integration By Parts (IBP), can be obtained using  <cit.> and is given by the 16 elements in Table <ref> (although 7 of them can be deduced from the remaining 9 by using σ_4). Using  <cit.> and dimensional shift identities <cit.>, we have found the values of all such master integrals up to transcendental weight 2. We present our results in Appendix <ref> in the Euclidean region, and discuss their analytic continuation to the physical one in the Subsection <ref>. It turns out that the pentagon prime, mushroom and mushroom prime families can be also mapped to the integrals (<ref>) in the limit (<ref>), by suitably decomposing the linearized propagators into partial fractions and applying symmetry transformations. Let us discuss this step in detail focusing on a prototypical integral for each family, with propagators raised to the first power. Generalizing this procedure to any other positive power is straightforward. A typical integral of the pentagon prime family takes the form [draw, ultra thick, green!60!black] (-.65,0)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(.65,1); [draw,thin] (.5,.97)–(.5,.03); [draw,thin] (-.5,.97)–(-.5,.03); [draw,thin] (0,.03)–(0,.3); at (-.5,.5)[left]ℓ; → I^(P') =∫_ℓ1/(2u_1·ℓ)(-2u_2·ℓ)(-2u_2·ℓ+2ω_2)ℓ^2(ℓ-q_1)^2 and decomposing the second and third propagator into partial fractions leads to I^(P') = 1/2ω_2∫_ℓ1/(2u_1·ℓ)(-2u_2·ℓ)ℓ^2(ℓ-q_1^2) - 1/2ω_2∫_ℓ1/(2u_1·ℓ)(-2u_2·ℓ+2ω_2)ℓ^2(ℓ-q_1)^2 . We can change integration variable in the second integral, letting ℓ→ q_1-ℓ, and obtain I^(P') = 1/2ω_2∫_ℓ1/(2u_1·ℓ)(-2u_2·ℓ)ℓ^2(ℓ-q_1^2) - 1/2ω_2∫_ℓ1/(-2u_1·ℓ)(2u_2·ℓ)ℓ^2(ℓ-q_1)^2 . The two integrals do not simply cancel against each other, due to (<ref>), (<ref>), but we can map them to the family (<ref>) by applying permutations σ_2 and σ_3 to the second one, I^(P') = 1/2ω_2 I_1,1,1,0,1- 1/2ω_2 σ_2σ_3 I_1,1,1,0,1 . For a typical integral of the mushroom family,[For the diagram in the figure 1/(2u_2·ℓ) would actually be raised to the second power.] [draw, ultra thick, green!60!black] (-.65,0)–(0,.98)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(.65,1); [draw,thin] (.5,.17)–(-.5,.17); [draw,thin] (.3,.58)–(.55,.58); at (0,0)ℓ; → I^(M) = ∫_ℓ1/(2u_2·ℓ)(2u_2·ℓ-2ω_2)ℓ^2 we have I^(M) = - 1/2ω_2∫_ℓ1/(2u_2·ℓ)ℓ^2 + 1/2ω_2∫_ℓ1/(2u_2·ℓ-2ω_2)ℓ^2 . Noting that the first integral on the right-hand side is scaleless, and sending ℓ→ q_1-ℓ in the second one, we find I^(M) = 1/2ω_2 I_0,1,0,0,1 . Finally, a typical mushroom prime integral takes the form [draw, ultra thick, green!60!black] (-.65,0)–(0,.98)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(.65,1); [draw,thin] (.5,.17)–(-.5,.17); [draw,thin] (0,-.1)–(0,.17); at (-.4,.6)[left]ℓ+p_3; → I^(M') = ∫_ℓ1/(2u_2·ℓ)(2u_2·ℓ-2ω_2)(ℓ-q_1)^2(ℓ+q_2)^2 , and leads to the following partial fractions I^(M') = - 1/2ω_2∫_ℓ1/(2u_2·ℓ)(ℓ-q_1)^2(ℓ+q_2)^2 + 1/2ω_2∫_ℓ1/(2u_2·ℓ-2ω_2)(ℓ-q_1)^2(ℓ+q_2)^2 . Performing the permutation σ_3 in the first integral and sending ℓ→ q_1-q_2-ℓ in the second one, I^(M') = -1/2ω_2 σ_3I_0,1,0,1,1 + 1/2ω_2 I_0,1,0,1,1 . Let us comment that, since one is ultimately summing over all allowed permutations (<ref>) to build the full integrand from the 19 diagrams in Table <ref>, it is not strictly necessary to apply σ_2σ_3 as in (<ref>) and σ_3 as in (<ref>). One can also first treat the two contributions to each equation as separate objects, perform the IBP reduction and mapping to the master integrals only for the appropriate permutation, and then perform all 8 permutations on the result. §.§ Euclidean variables and analytic continuation The amplitude is the boundary value of an analytic function which develops branch cuts when its variables are located in the physical region. For this reason it is convenient to introduce complex variables y_E, ω_1E, ω_2E such that the physical region corresponds to setting y_E =- y-i0 , ω_1E=-ω_1-i0 , ω_2E=-ω_2-i0 , with y, ω_1, ω_2 the invariant products defined in Eq. (<ref>). The new variables allow for manifestly real expressions of the master integrals (<ref>) when they are taken in the Euclidean region, defined by y_E≥1 , ω_1E≥ 0 , ω_2E≥0 . We similarly define new rationalized variables according to x_E = y_E+ √(y_E^2-1) , w_1E = √(ω_1E^2+q_2^2)+ω_1E/q_2 , w_2 = √(ω_2E^2+q_1^2)+ω_2E/q_1 , so that y_E = 1/2(x_E+1/x_E), ω_1E= q_2/2(w_1E-1/w_1E), ω_2E= q_1/2(w_2E-1/w_2E). The rationalized variables fall in the physical region when x_E = -x+i0 , w_1E = -w_1-i0 , w_2E = -w_2-i0 , with x, w_1, w_2 as in Eq. (<ref>). The conditions (<ref>) defining the Euclidean region instead translate to the following ones in terms of the rationalized variables, x_E≥1 , w_1E≥1 , w_2E≥ 1 . Mapping back to the physical variables discussed in Subsection <ref> via (<ref>), (<ref>), one encounters branch singularities when the variables fall in the physical region. We have expressed our master integrals (see Appendix <ref>) in terms of the analytic functions log x_E , log(x_E-1) , log w_1E , log(w_1E± 1) , log w_2E , log(w_2E± 1) , and Li_2(±1/x_E), Li_2(±1/w_1E), Li_2(±1/w_2E) so that their expressions are manifestly real in the Euclidea region (<ref>). We then perform the analytic continuation back to the physical region (<ref>) by letting log x_E →log x + i q_I π , log w_1E →log w_1 - i q_O π , log w_2E →log w_2 - i q_A π , where we have kept all analytic continuations in principle arbitrary. We find that, consistently with the i0 prescriptions in (<ref>) or equivalently by demanding consistency with the exponentiation of infrared divergences (see Subsection <ref>), q_I = q_O = q_A = +1 . The sign of the i0 prescription q_I for x_E matches the elastic calculation in <cit.> where for instance in the double box solution log x_E →log x +iπ. The elementary choices made in (<ref>) then resolve all other branch ambiguities upon reducing the analytic continuation of the dilogarithms to those of conventional logarithms via Li_2(1/z) = - Li_2(z) - π^2/6 - 1/2(log (-z))^2 , which holds whenever z doesn't belong to the positive real axis. § STRUCTURE OF THE AMPLITUDE IN THE CLASSICAL LIMIT Looking at the integrand obtained by combining the diagrams in Table <ref>, we find the following structure in the limit (<ref>), (<ref>) (including the scaling of the measure element d^4ℓ), 𝒜_1^ = 𝒜_1^[-3] + 𝒜_1^[-2] + 𝒜_1^[-1] + 𝒪(ħ^0) , where 𝒜^[-j]∼𝒪(ħ^-j) . We expand each coefficient for small ϵ=4-D/2, defining 𝒜_1^[-j] = μ̅^2ϵ[𝒜_1^[-j,-2]/ϵ^2 + 𝒜_1^[-j,-1]/ϵ + 𝒜_1^[-j,0] + 𝒪(ϵ)]. The first (second) index within square brackets thus refers to the ħ (resp. ϵ) scaling. After inputting the values of the master integrals, we find that (for nonzero graviton frequencies) 𝒜_1^[-3] = 𝒪(ϵ) . This cancellation is expected because it mirrors a similar one occurring for the tree-level amplitude 𝒜_0, whose classical limit also naively goes like ħ^-3 (and it indeed involves terms localized at zero frequency at that order), while its actual scaling is ħ^-2 in our present conventions. Eq. (<ref>) also serves a nontrivial check of the symmetry factors because it relies on s_3 = 2s_1 and on s_6+s_24=s_11+s_14. We also find that the coefficient of the double pole in ϵ vanishes, 𝒜_1^[-j,-2]=0 , j=2,1 . For instance, both 𝒢_2, 𝒢_4 and 𝒢_9 would naively diverge like 1/ϵ^2 to order 𝒪(ħ^-2), but thanks to the transversality condition (<ref>) such divergences cancel between 𝒢_2 and 𝒢_9, and separately in 𝒢_4. This serves as a cross check that s_2=s_9. This cancellation is also expected on general grounds <cit.> as we shall discuss more in detail shortly. Taking into account the vanishing of these coefficients, we find the following structure of the amplitude in the classical limit, 𝒜_1 = μ̅^2ϵ{[𝒜_1^[-2,-1]/ϵ + 𝒜_1^[-2,0]] + [𝒜_1^[-1,-1]/ϵ + 𝒜_1^[-1,0]] + 𝒪(ϵ)+𝒪(ħ^0) }. The functions 𝒜_1^[-2,-1], 𝒜_1^[-2,0], 𝒜_1^[-1,-1], 𝒜_1^[-1,0] constitute the main results of the present work and are all provided in the ancillary files in attachment, where for convenience we collect their expressions after dividing by 𝒩_4 defined in (<ref>). We have checked that our expressions for the classical terms, 𝒜_1^[-1,-1] and 𝒜_1^[-1,0], agree with the results of Ref. <cit.> on numerical points, up to an overall sign. In its turn, this also ensures agreement with the results of Ref. <cit.>. The remainder of this section is devoted to the discussion and illustration of Eq. (<ref>). We find that the coefficients of the ϵ^-1 poles, 𝒜_1^[-2,-1], 𝒜_1^[-1,-1], are in complete agreement with the prediction obtained from the exponentiation of infrared divergences, which fixes them in terms of the tree-level five-point amplitude 𝒜_0 times a universal factor <cit.>. The combinations 𝒜_1^[-2,-1]/𝒩_4 and 𝒜_1^[-1,-1]/𝒩_4 have uniform transcendental weight 1, i.e. they are rational functions of the invariants x, w_1, w_2 in (<ref>), q_1 and q_2 times iπ. For all terms displayed in (<ref>), we also find agreement with Weinberg's soft theorem <cit.>, which dictates that, as the frequency of the graviton tends to zero, their most singular term must reduce to a universal factor times the one-loop four-point amplitude 𝒜_1^(4). Moreover, the “superclassical” terms 𝒜_1^[-2,-1], 𝒜_1^[-2,0], as well as 𝒜_1^[-1,-1] and the terms proportional to the imaginary unit in 𝒜_1^[-1,0], when written in terms of c_1 and c_2, arise from the cuts of the amplitude exactly as predicted by unitarity. The terms that do not multiply the imaginary unit in 𝒜_1^[-1,0]/𝒩_4 have uniform transcendental weight 2. When expressed in terms of log x , log(1± x) , log w_1,2 , log(w_1,2± 1) , log(q_1,2) and Li_2(x) , Li_2(1/w_1,2) , all dependence on the logarithms and dilogarithms drops out in such terms, so that they reduce to rational functions of the invariants x, w_1, w_2 in (<ref>), q_1 and q_2 times π^2. After this simplification, the structure of this piece is thus analogous to that of the 𝒪(ħ^-1) in the elastic 2→2 amplitude at one loop (Eq. (<ref>) below). The terms that multiply the imaginary unit in 𝒜_1^[-1,0]/𝒩_4 (and similarly the combination 𝒜_1^[-2,0]/𝒩_4), instead, can have transcendental weight either 2, i.e. reduce to rational functions times the logarithms (<ref>) times iπ, or 1, i.e. reduce to rational functions times iπ. Schematically, 𝒜_1^[-1,0]/𝒩_4 = π^2 Q(x,w_1,w_2,q_1,q_2) + iπ[ ∑_j (log x_j) R_j(x,w_1,w_2,q_1,q_2) + S(x,w_1,w_2,q_1,q_2) ] where Q, R_j and S are real, rational functions of the invariants and log x_j are the logarithms (<ref>). §.§ Exponentiation of infrared divergences Infrared divergences in gravity amplitudes follow a simple exponential patter first clarified by Weinberg <cit.> (see also <cit.>), 𝒜_α→β = e^𝒲_α→β [𝒜_α→β]_ IR finite with 𝒲_α→β an infrared-divergent, one-loop-exact exponent whose expression in terms of the states α, β takes a universal form. Accordingly, the infrared divergences of any one-loop five-point amplitude are equal to 𝒲 = G/2πϵ∑_n,m=1^5 w_nm times the tree-level five-point amplitude with the same external states. When the 5 particles are massive, letting (η_n is +1 if n is outgoing and -1 if n is incoming) ζ_nm = - η_n η_m p_n· p_m > 0 , we have w_nm = ζ_nm^2- 12 m_n^2m_m^2/√(ζ_nm^2-m_n^2m_m^2)[ η_nη_m logζ_nm+√(ζ_nm^2-m_n^2m_m^2)/ζ_nm-√(ζ_nm^2-m_n^2m_m^2) - iπη_nm] where η_nm = +1 provided n≠ m and n and m are both outgoing or both incoming, and vanishes otherwise. Moreover w_nn = m_n^2/2. When m_5→0 and p_5→ k, the function 𝒲 is smooth and reduces to 𝒲 = G/2πϵ∑_n,m=1^4 w_nm + G/2πϵ∑_n=1^42(-p_n· k)[log4(p_n· k)^2/Λ^2 m_n^2-iπη_n5] with Λ an arbitrary energy scale. One can explicitly check this by taking the limit in (<ref>) and by using momentum conservation p_1+p_2+p_4+p_4 = -k to show that a potentially dangerous log m_5 cancels out, leaving behind an arbitrary reference scale Λ in the logarithm in (<ref>). All in all, this dictates the IR divergences of our amplitude, 𝒜_1 = 𝒲𝒜_0 + 𝒪(ϵ^0) , with 𝒜_0 = ε_μ𝒜_0^μνε_ν the tree-level five-point amplitude (<ref>). In particular, (<ref>) predicts that no double pole 1/ϵ^2 should occur and Eq. (<ref>) is consistent with this prediction. We checked that, expanding to leading and subleading order in ħ, 𝒲 = 𝒲^[0] + 𝒲^[1] + 𝒪(ħ^2) , where 𝒲^[0] = -i 2G m̅_1 m̅_2 (y ^2-12)/ϵ √(y ^2-1) , 𝒲^[1] = - i G/ϵ (m̅_1 ω_1+ m̅_2 ω_2) . Therefore, to this order in ħ, the Weinberg exponent is purely imaginary. 𝒲^[0] is a divergent phase arising from soft graviton exchanges between lines 1-2 and 3-4 while 𝒲^[1] arises from those between the outgoing graviton line and lines 3, 4. The other ingredient is the tree-level five-point amplitude, which in the classical limit is given by 𝒜_0 = 𝒜_0^[-2] + 𝒪(ħ^0) as in (<ref>) <cit.>. Note the lack of 𝒪(ħ^-1) corrections to this leading 𝒪(ħ^-2) result, as discussed below Eq (<ref>). Consistently with these general facts, we checked that our result (<ref>) obeys 1/ϵ 𝒜_1^[-2,-1] = 𝒲^[0]𝒜_0^[-2] , 1/ϵ 𝒜_1^[-1,-1] = 𝒲^[1]𝒜_0^[-2] . §.§ Factorization in the soft limit In the limit k ∼𝒪(λ) , λ→0 , the one-loop five-point amplitude 𝒜_1^μν must factorize according to the Weinberg soft graviton theorem <cit.> as ℱ^μν = √(8π G) ∑_n=1^4 p_n^μ p_n^ν/p_n· k∼𝒪(λ^-1) times the one-loop four-point amplitude 𝒜_1^(4), 𝒜_1 = ℱ 𝒜_1^(4) + 𝒪(λ^0) , where ℱ = ε_μℱ^μνε_ν in analogy with (<ref>). The limit (<ref>) is best taken after performing the decomposition in Eq. (<ref>) and following, introducing also the exchanged momentum q = 1/2(q_1-q_2) , whose decomposition reads q^μ = -ω_1/2ǔ_1^μ + ω_2/2ǔ_2^μ + q_⊥^μ . The limit (<ref>) should then be understood for fixed u_1, u_2 and q_⊥^μ, so that u_1,2∼𝒪(λ^0) , q_⊥∼𝒪(λ^0) , y ∼𝒪(λ^0) , ω_1,2∼𝒪(λ) and to leading order q_1,2^2 =q^2 + 𝒪(λ)= q^2_⊥ + 𝒪(λ) , q_2^2-q_1^2 = 2 k· q + 𝒪(λ^2) = 2 k_⊥· q_⊥ + 𝒪(λ^2) . To leading order in this limit, the five-point kinematics (<ref>) reduces to the four-point one introduced in Ref. <cit.>, p_1^μ=-m̅_1 u_1^μ+q_⊥^μ/2 , p_4^μ = m̅_1 u_1^μ + q_⊥^μ/2 p_2^μ=-m̅_2 u_2^μ - q_⊥^μ/2 , p_3^μ = m̅_2 u_2^μ - q_⊥^μ/2 with u_1,2· q_⊥ = 0 , m̅_1^2 = m_1^2 + q_⊥^2/4, m̅_2^2 = m_2^2 + q_⊥^2/4 . Both sides of the factorization (<ref>) should be expanded in the near-forward limit (<ref>) in order to be applied to our results. One finds the following near-forward limit for the Weinberg factor <cit.>, ℱ = ℱ^[0] + 𝒪(ħ^2) , ℱ^[0] = 𝒪_α q^α with 𝒪_α = √(8π G) ( ω_1 (u_2·ε)- ω_2 (u_1·ε )) (2 ω_1ω_2 ε_α + k_αω_2 (u_1·ε)+ k_αω_1 (u_2·ε))/ω_1^2ω_2^2 . Note the absence of 𝒪(ħ^1) corrections in (<ref>). For the other ingredient of (<ref>), the one-loop four-point amplitude, one has instead <cit.> 𝒜_1^(4) = 𝒜_1^(4)[-2] + 𝒜_1^(4)[-1] + 𝒪(ħ^0) with the 𝒪(ħ^-2) term 𝒜_1^(4)[-2]=1ϵ𝒜_1^(4)[-2,-1]+𝒜_1^(4)[-2,0]+𝒪(ϵ) given by 𝒜_1^(4)[-2] = μ̅^2ϵ i 32 π G^2 m̅_1^3 m̅_2^3 (y^2-12-2 ϵ)^2/√(y^2-1)e^γ_E ϵΓ (ϵ +1) Γ (-ϵ )^2/(q^2)^1+ϵΓ (-2 ϵ ) for generic ϵ, while we will only need the 𝒪(ħ^-1) term 𝒜_1^(4)[-1]=𝒜_1^(4)[-1,0]+𝒪(ϵ) to leading order in ϵ, 𝒜_1^(4)[-1,0] = 6 π^2 G^2 m̅_1^2 m̅_2^2 (5 y^2-1) (m̅_1+m̅_2)/q . Eq. (<ref>) then translates into the following relations 𝒜_1^[-2] = ℱ^[0]𝒜_1^(4)[-2]+𝒪(λ^0) , 𝒜_1^[-1] = ℱ^[0]𝒜_1^(4)[-1]+𝒪(λ^0) , which can be also expanded for small ϵ. Of course, the soft limit of the 1/ϵ terms, 1/ϵ 𝒜_1^[-2,-1] = ℱ^[0]𝒜_1^(4)[-2,-1]+𝒪(λ^0) , 1/ϵ 𝒜_1^[-1,-1] = 𝒪(λ^0) , is already captured by the exponentiation of infrared divergences discussed in Subsection <ref>. If one considers the soft limit of Eq. (<ref>) and takes into account that the tree-level amplitude obeys the Weinberg theorem, 𝒜_0^[-2] = ℱ^[0]𝒜_0^(4) + 𝒪(λ^0), then (<ref>) becomes equivalent to (<ref>), because 𝒜_1^(4) also obeys the factorization of infrared divergences. For the 𝒪(ħ^-2) term, this dictates 1ϵ𝒜_1^(4)[-2,-1] = 𝒲^[0]𝒜_0^(4), i.e. (see e.g. Eq. (3.52) of <cit.>) 1/ϵ 𝒜_1^(4)[-2,-1] = 64 G^2 m̅_1^3 m̅_2^3/ϵ q^2( y^2-12 )^2 -i π/√(y^2-1) . For the 𝒪(ħ^-1) terms in (<ref>), the absence of a Weinberg pole ∼ 1/λ is also ensured by (<ref>) because 𝒲^[1] carries an extra power of λ. Constraints on the soft limit of 𝒜_1 independent of the exponentiation of infrared divergences instead involve the finite parts, 𝒜_1^[-2,0] = ℱ^[0]𝒜_1^(4)[-2,0]+𝒪(λ^0) , 𝒜_1^[-1,0] = ℱ^[0]𝒜_1^(4)[-1,0] +𝒪(λ^0) . We have checked that our results are consistent with these constraints. It is instructive to see how they translate to impact-parameter space, by letting FT[𝒜^(4)] = 𝒜̃^(4)(b) = ∫𝒜^(4)(q) 2πδ(2m̅_1u_1· q) 2πδ(2m̅_2u_2· q) e^ib· qd^Dq/(2π)^D , where the 2→2 amplitude (see (<ref>), (<ref>) for the tree level) obeys the eikonal exponentiation <cit.> 𝒜̃^(4)_0 = 2δ_0 , 𝒜̃^(4)_1 = i (2δ_0)^2/2 + 2δ_1 . Since we work to leading order in the soft limit, we can apply the same Fourier transform (<ref>) to the 2→3 amplitude as well, finding that (<ref>) translates to 𝒜̃_1^[-2] = 2δ_0 𝒪^α Q^1PM_α +𝒪(λ^0) , 𝒜̃_1^[-1] = -i𝒪^α Q^2PM_α +𝒪(λ^0) , were we have used that FT[q^α( ⋯)]=-i∂_b^αFT[ ⋯] and the relation between the impulse and the eikonal phase up to 2PM, Q_α = ∂ 2δ/∂ b^α , 2δ= 2δ_0 + 2δ_1+𝒪(G^3) , Q= Q^1PM+ Q^2PM+𝒪(G^3) . Of course the soft theorem also holds for the tree-level amplitude, and one has 𝒜_0^[-2] = 𝒪^α q_α𝒜_0^(4)+𝒪(λ^0) , 𝒜̃_0^[-2] = -i 𝒪^α Q^1PM_α+𝒪(λ^0) . Combining (<ref>) and (<ref>) provides a check of the leading inelastic exponentiation of the one-loop level amplitude in b-space, to first order in the soft limit 𝒜̃_1^[-2] = 2iδ_0 𝒜̃_0^[-2] +𝒪(λ^0) , whereby the “superclassical” term of the one-loop inelastic amplitude factorizes in terms of the elastic tree-level amplitude times the inelastic one in b-space. Moreover, the relations (<ref>) can be seen as a manifestation order by order in G of the non-perturbative pattern discussed in <cit.> according to which the soft dressing governing the soft theorem/memory effect for processes with generic deflections can be obtained from the Weinberg factor (<ref>) by replacing the perturbative momentum transfer q^α with the classical impulse Q^α given by (<ref>). §.§ Imaginary parts and unitarity The “superclassical” contributions[The discussion of real and imaginary parts of the amplitude should be performed by either stripping off the polarization tensor, which has both real and imaginary parts in our case, or by keeping it while disregarding factors of “i” arising from it.] 𝒜_1^μν[-2,-1], 𝒜_1^μν[-2,0] are purely imaginary and, by unitarity, they must correspond to appropriate intermediate states for the 2→3 process under consideration. We find that they are equal to the the sum of two processes where one “cuts” two intermediate massive states, which we may term “S-channel” by analogy with the situation at four points, μ̅^2ϵ[ 1/ϵ 𝒜_1^μν[-2,-1]+ 𝒜_1^μν[-2,0]] = i/2 [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-1,1.5)–(-.32,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.5) ellipse (.5 and .8); [thick] (-1.3,1.5) ellipse (.5 and .8); + i/2 [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-3,1.5)–(-2.1,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.5) ellipse (.5 and .8); [thick] (-1.3,1.5) ellipse (.5 and .8); The first process on the right-hand side is obtained by gluing together a tree-level 2→2 amplitude 𝒜_0^(4) involving four massive states (<ref>) and a tree-level 2→3 amplitude 𝒜_0 for the inelastic process under consideration (<ref>). The second process formally corresponds to a 2→3 amplitude glued together with a partially disconnected 3→3 one, in which the graviton line simply “passes through” the second blob, so that in practice it corresponds to gluing together 𝒜_0^(4) and 𝒜_0 in the opposite order. Equivalently, it can be obtained from the first one by applying the permutation σ_2σ_3, which flips ω_1, ω_2 and leaves y unaltered. We have checked Eq. (<ref>) in two ways. First, by leaving the signs of the analytic continuations arbitrary as in (<ref>), i.e. without imposing (<ref>), one sees that the left-hand side of (<ref>) is only sensitive to q_I, the sign of the analytic continuation of y, which is the invariant associated to propagation in the S-channel. More precisely, denoting by f(q_I,q_O,q_A) this generalized version of the amplitude obtained by leaving the three signs of the analytic continuations arbitrary, the left-hand side of (<ref>) coincides with the S-channel discontinuity Disc_S f = 1/8 [f(+1,+1,+1)+f(+1,+1,-1)+f(+1,-1,+1) +f(+1,-1,-1) -f(-1,+1,+1)-f(-1,+1,-1)-f(-1,-1,+1) -f(-1,-1,-1) ]. Second, we have explicitly constructed the integrand for the right-hand side of (<ref>) by gluing together 𝒜_0^(4) and 𝒜_0 (for completeness, we provide their explicit expressions in Appendix <ref>) in the classical limit and performed the integration over phase space via reverse unitarity <cit.>. This amounts to treating the Lorentz-invariant phase space delta functions like formal propagators, performing the IBP reduction while dropping all integrals that do not possess the cut (<ref>), and lastly substituting the master integrals with 2 times their imaginary parts obtained by applying Disc_S as defined by (<ref>) (i.e. the imaginary parts associated to their S-channel discontinuities). The purely imaginary term 𝒜_1^μν[-1,-1] and the imaginary part of 𝒜_1^μν[-1,0] arise instead due to intermediate processes whereby one cuts a massive line and a graviton line. Since these cuts are built using the “Compton” amplitude (<ref>) involving two massive states and two gravitons, together with the tree-level 2→3 amplitude 𝒜_0, we may term these “C-channel” cuts, μ̅^2ϵ[ 1/ϵ𝒜_1^μν[-1,-1] + i Im𝒜_1^μν[-1,0]] = i/2 [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-2.1,1); [draw, red] (-3,1.5)–(-.3,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.75) ellipse (.45 and .55); [thick] (-1.3,1.75) ellipse (.45 and .55); + i/2 [draw, ultra thick, blue] (-4,2)–(-2.1,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-3,1.5)–(-.3,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.25) ellipse (.45 and .55); [thick] (-1.3,1.25) ellipse (.45 and .55); Once again these processes can be also thought of as 2→3 amplitudes glued with partially disconnected 3→3 ones. We have checked (<ref>) in the same two ways as for (<ref>), both by calculating the discontinuity of the f(q_I,q_O,q_A) with respect to q_O (and separately q_A), and by building the integrand for the cuts and evaluating it via reverse unitarity.[For this check, we find that the trace condition (<ref>) plays an important role.] Combining (<ref>) with (<ref>), we reconstruct the complete unitarity relation for the one-loop amplitude, 2Im [draw, ultra thick, blue] (-4.5,2.2)–(-1.5,2.2); [draw, ultra thick, green!60!black] (-4.5,.8)–(-1.5,.8); [draw, red] (-3,1.5)–(-1.5,1.5); [black!20!white, thick] (-3,1.5) ellipse (.7 and 1); [thick] (-3,1.5) ellipse (.7 and 1); [white, thick] (-3,1.5) ellipse (.3 and .4); [pattern=none, thick] (-3,1.5) ellipse (.3 and .4); = [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-1,1.5)–(-.32,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.5) ellipse (.5 and .8); [thick] (-1.3,1.5) ellipse (.5 and .8); + [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-3,1.5)–(-2.1,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.5) ellipse (.5 and .8); [thick] (-1.3,1.5) ellipse (.5 and .8); + [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-2.1,1); [draw, red] (-3,1.5)–(-.3,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.75) ellipse (.45 and .55); [thick] (-1.3,1.75) ellipse (.45 and .55); + [draw, ultra thick, blue] (-4,2)–(-2.1,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-3,1.5)–(-.3,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.25) ellipse (.45 and .55); [thick] (-1.3,1.25) ellipse (.45 and .55); §.§ Removing superclassical iterations We follow Ref. <cit.> and consider the operator N linked to the S-matrix by S = 1+i T = e^iN , N = -i log(1+iT) = T - i T^2/2+⋯ . As usual, we define their matrix elements by stripping a momentum-conserving delta function, ⟨β | T |α⟩= (2π)^D δ^(D)(P_α+P_β) 𝒜_α→β , ⟨β | N |α⟩= (2π)^D δ^(D)(P_α+P_β) ℬ_α→β , where 𝒜_α→β are the conventional scattering amplitudes. From (<ref>), one trivially obtains ℬ_0^μν = 𝒜_0^μν at tree level. Going to the next order and inserting a complete set of free intermediate states to resolve the terms involving T^2, one finds ℬ_1^μν = 𝒜_1^μν - i/2 [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-1,1.5)–(-.32,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.5) ellipse (.5 and .8); [thick] (-1.3,1.5) ellipse (.5 and .8); - i/2 [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-3,1.5)–(-2.1,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.5) ellipse (.5 and .8); [thick] (-1.3,1.5) ellipse (.5 and .8); - i/2 [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-2.1,1); [draw, red] (-3,1.5)–(-.3,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.75) ellipse (.45 and .55); [thick] (-1.3,1.75) ellipse (.45 and .55); - i/2 [draw, ultra thick, blue] (-4,2)–(-2.1,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-3,1.5)–(-.3,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.25) ellipse (.45 and .55); [thick] (-1.3,1.25) ellipse (.45 and .55); In view of the unitarity relation (<ref>), all imaginary parts of 𝒜_1^μν cancel out and one is left with the real and IR-finite result ℬ_1^μν = Re𝒜_1^μν = Re𝒜_1^μν[-1,0] + 𝒪(ϵ) + 𝒪(ħ^0) . In fact, the subtractions in the first line of (<ref>) are enough in order to remove all 𝒪(ħ^-2) “superclassical” terms, while as already discussed the ones in the second line are 𝒪(ħ^-1). Both types of subtractions involve imaginary infrared divergences, the ones in the first line being associated to 𝒲^[0], i.e. to soft-graviton exchanges between massive lines, and the ones in the second line being associated to 𝒲^[1], i.e. soft-graviton exchanges between the graviton and an outgoing massive line, as also suggested by the respective figures. Letting ℬ_1 = ε_μℬ_1^μνε_ν, as already mentioned, ℬ_1/𝒩_4 has uniform transcendental weight 2 and takes the form of π^2 multiplying a rational function of the invariants. Let us conclude this section by commenting on the parity properties of ℬ_1 under the transformation[As already mentioned, also w_1,2↦-w_1,2 corresponds to changing the sign of ω_1,2, but the transformation in (<ref>) is the one that leaves √(ω_1,2^2+q_2,1^2)=q_2,12(w_1,2+1w_1,2) invariant.] ω_1,2↦ -ω_1,2 , w_1,2↦1/w_1,2 . We find that ℬ_1 = ℬ_1E + ℬ_1O , with ℬ_1E (resp. ℬ_1O) even (odd) under (<ref>). In particular, the odd piece is equal to an x-dependent function times iπ times the coefficient of the ħ^-1ϵ^-1 pole ℬ_1O = 2 x^4 (x^2-3)/(x^2-1)^3 (i π) 𝒜_1^[-1,-1] = ( 1- y (y^2-3/2)/(y^2-1)^3/2) (i π) 𝒜_1^[-1,-1] . Time-reversal-odd terms in the finite real part thus arise from the analytic continuation of logarithms left behind by the 1/ϵ in the imaginary part. This mechanism is highly reminiscent of how radiation reaction enters the eikonal phase at two loops <cit.> (see also <cit.>). § GRAVITATIONAL FIELD, SPECTRUM AND WAVEFORM Following Refs. <cit.>, let us model the initial state of the collision by | in⟩ = |1⟩⊗ |2⟩ , with |1⟩ =∫ 2πδ(p_1^2+m_1^2) θ(-p_1^0) d^Dp_1/(2π)^D φ_1(-p_1) e^ib_1· p_1|-p_1⟩ |2⟩ = ∫ 2πδ(p_2^2+m_2^2) θ(-p_2^0) d^Dp_2/(2π)^D φ_2(-p_2) e^ib_2· p_2|-p_2⟩ in terms of wavepackets φ_1,2 and impact parameters b_1, b_2. We can then take the expectation value of the graviton field H_μν(x) = ∫_k [ e^ik· x a_μν(k) + e^-ik· x a^†_μν(k) ] , ∫_k= ∫ 2πδ(k^2) θ(k^0) d^Dk/(2π)^D , in the state obtained by applying the S matrix (<ref>), |out⟩ = S |in⟩ . We denote this expectation by (“c.c” stands for “complex conjugate”) g_μν(x)-η_μν/√(32π G) = h_μν(x) = ⟨out | H_μν(x) |out⟩ = ∫_k e^ik· x⟨out|a_μν(k)|out⟩ +(c.c.) . Defining the Fourier transform by the generalization of (<ref>) to the 2→3 kinematics, FT[ f^μν] = f̃^μν = ∫d^Dq_1/(2π)^Dd^Dq_2/(2π)^D (2π)^Dδ^(D)(q_1+q_2+k) × 2πδ(2m̅_1 u_1· q_1)2πδ(2m̅_2 u_2· q_2) e^ib_1· q_1+ib_2· q_2 f^μν and introducing a shorthand notation for the wavepacket average ⟨ f ⟩ = ∫∏_j=1,2 2πδ(p̅_j^2+ m̅_j^2) θ(p̅_j^0) d^D p̅_j/(2π)^D φ_j(p̅_j- 12 q_j) φ_j^∗(p̅_j+ 12 q_j) f , we find h_μν(x) = ∫_k[ e^ik· x i FT⟨ W_μν⟩] + c.c. , W^μν = W_0^μν + W_1^μν where W_0^μν = ℬ_0^μν =𝒜_0^μν , W_1^μν = ℬ_1^μν + i/2 [draw, ultra thick, blue] (-4,2)–(-.3,2); [draw, ultra thick, green!60!black] (-4,1)–(-2.1,1); [draw, red] (-3,1.5)–(-.3,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.75) ellipse (.45 and .55); [thick] (-1.3,1.75) ellipse (.45 and .55); + i/2 [draw, ultra thick, blue] (-4,2)–(-2.1,2); [draw, ultra thick, green!60!black] (-4,1)–(-.3,1); [draw, red] (-3,1.5)–(-.3,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); [black!20!white, thick] (-1.3,1.25) ellipse (.45 and .55); [thick] (-1.3,1.25) ellipse (.45 and .55); Notably, although ℬ_0 and ℬ_1 are real and finite, the two infrared divergent C-channel cuts have “reappeared” in the loop-level result for the KMOC kernel,[From now on, we drop the explicit wavepacket average, and neglect the difference between, say m̅_1,2 and m_1,2, since superclassical terms have all been subtracted out.] W_1^μν = ℬ_1^μν -i μ̅^2ϵG/ϵ (m_1ω_1+m_2ω_2)ℬ_0^μν +i Im𝒜_1^μν[-1,0] +𝒪(ϵ) where we have used that the infrared divergence is proportional to the tree-level result by (<ref>) and (<ref>). By exponentiating it, we may also rewrite W^μν in the following way W^μν = e^-iG/ϵ(m_1ω_1+m_2ω_2)[ ℬ_0^μν + ℬ_1^μν +i ℳ_1^μν] +𝒪(ϵ) + 𝒪(G^7/2) in terms of the infrared-finite object ℳ_1^μν = G(m_1ω_1+m_2ω_2) ℬ_0^μνlogμ̅^2 + Im𝒜_1^μν[-1,0] . As usual, the factorization of an infrared-divergent scale has left behind the logarithm of an arbitrary scale, and one can verify that such logμ̅^2 terms neatly combine with the leftover log q_1,2^2 terms in Im𝒜_1^μν[-1,0] to reconstruct logarithms of dimensionless quantities. Let us now turn to the spectral rate, dρ̃= |W̃|^2 θ(k^0) 2πδ(k^2) d^4k/(2π)^4 , where omitting the μν indices stands for contraction according to |W|^2 = W̃^μν( η_μρη_νσ - 1/2 η_μνη_ρσ) W̃^ρσ∗ . Then it is clear that, although W^μν in (<ref>) has an IR-divergent phase, the spectrum is free from infrared divergences, since this overall phase cancels out, and retaining terms up to 𝒪(G^4), |W̃|^2 = ℬ̃_0^∗∘ℬ̃_0 + (ℬ̃_0^∗ ℬ̃_1 + ℬ̃_1^∗ ℬ̃_0) -i (ℬ̃_0^∗ ℳ̃_1 - ℳ̃_1^∗ ℬ̃_0) + 𝒪(G^5) . In principle this cancellation could leave behind ambiguities associated to the logμ̅^2 terms in (<ref>), (<ref>). To see why this is not the case, let us denote by E(k) = G( m_1 ω_1 + m_2 ω_2) the combination appearing in the logμ̅^2 terms, which is insensitive to the Fourier transform (<ref>). Terms of type ℬ_0 E logμ̅^2 in the imaginary part ℳ_1 of waveform kernel enter the spectral rate via ℬ̃_0^∗ℬ̃_0 E(k) logμ̅^2 - E(k)ℬ̃_0 ℬ̃_0^∗logμ̅^2 = 0 . In this way, we see that the logμ̅^2 terms in (<ref>) do not contribute to the spectral rate and a fortiori to the energy emission spectrum. One then considers a detector with four-velocity t^μ placed at a spatial distance r from the scattering event in the angular direction characterized by the null vector n̂^μ, so that x^μ = u t^μ + r n̂^ν , n̂· t=-1 , and takes the asymptotic limit r→∞ , u,n̂^μ fixed. In this limit, the asymptotic field (<ref>) takes the form <cit.> h_μν(x) ∼∫_0^∞ω^-ϵ/(ir)^1-ϵ e^-iλ u(i W̃_μν|_k= λn̂) dλ/2(2π)^2-ϵ + (c.c.) , so that using (<ref>) h^μν(x) ∼∫_0^∞ω^-ϵ/(ir)^1-ϵ e^-iω(u-G/ϵ (m_1 u_1+m_2u_2)·n̂) i [ ℬ̃^μν_0 + ℬ̃^μν_1 + i ℳ̃^μν_1 ]_k= λn̂dω/2(2π)^2-ϵ + (c.c.). In this way, the classical information extracted from the one-loop amplitude can be used to build the 𝒪(G^3) corrections to the asymptotic metric fluctuation √(32π G) h_μν, and its IR-divergent phase can be formally reabsorbed via a redefinition of the detector's retarded time. § CONCLUSIONS AND OUTLOOK In this paper we calculated the 2→3 amplitude for the collision of two massive scalars and the emission of a graviton. We focused on the near-forward regime, where the exchanged momenta are small, 𝒪(ħ), compared to the masses, and on the soft region in which the loop momentum associated to the exchanged gravitons is of the same order. This allowed us to perform the integration of the integrand first obtained in Ref. <cit.>, calculating the result up to and including 𝒪(ħ^-1) and 𝒪(ϵ^0). The result passes nontrivial consistency checks. It displays the appropriate structure of IR divergences predicted by Ref. <cit.> as well as the correct factorization in the soft limit <cit.>. After checking that the operator version of the eikonal exponentiation <cit.> indeed works as expected and produces a classical, real and finite matrix element for the “eikonal”, or more precisely N-operator <cit.>, we sketched the calculation of the asymptotic waveform and spectral emission rates. We derived an expression for such quantities, showed that the spectra are free of ambiguities, while the waveform itself is affected by an IR divergent phase or, once such an irrelevant phase is discarded, by the presence of the logarithm of an arbitrary scale. The appearance of logarithms of (seemingly) arbitrary parameters left behind by infrared divergences in waveform calculations is usually cured by the inclusion of hereditary or “tail” terms <cit.>. We leave further investigations of this point for future work. Another interesting issue to which we plan to return is the comparison with subleading log-corrected soft theorems <cit.>, which are also intimately related to tail effects and to the long-range nature of the gravitational force in four spacetime dimensions. In analogy with the tree-level case, such checks will likely require to first obtain sufficient analytic control of the b-space expression of the waveform. More generally, but also in connection with the issue of infrared divergences, which here we removed by following the exponentiation <cit.>, it will be interesting to investigate how our results fit within the broader program of the eikonal operator and to understand whether an improved operator formalism is actually able to directly provide an infrared finite answer, possibly fixing the associated scale ambiguity. Of course, for all such open issues, extremely valuable guidance will come from comparisons with the available PN results (see e.g. Ref. <cit.> and references therein). In the spirit of reverse-unitarity applications for classical gravitational scattering <cit.>, our result can be useful for verifying and extending calculations of radiative observables to 𝒪(G^4), including emitted energy-momentum <cit.> and angular momentum (see Refs. <cit.> for the analogous 𝒪(G^3) results). In this work we focused on the ω>0 portion of the graviton spectrum, although of course interesting phenomena are associated with static effects <cit.> and require taking into account terms localized at ω=0. Such additional contributions can be typically included by means of suitable dressed states, and are likely to be important in order to correctly account for angular momentum losses. §.§ Acknowledgements We would like to thank Francesco Alessio, Paolo Di Vecchia, Kays Haddad, Martijn Hidding, Henrik Johansson, Stephen Naculich, Ben Page, Rodolfo Russo, Augusto Sagnotti, Fei Teng, and Gabriele Veneziano for very useful discussions. The research of CH is supported by the Knut and Alice Wallenberg Foundation under grant KAW 2018.0116. Nordita is partially supported by Nordforsk. § MORE ON THE KINEMATICS AND ON THE POLARIZATION TENSOR It this appendix, we complement the material presented in Sections <ref> and <ref> concerning the properties of the kinematic variables and of the polarization tensor employed in the text. Introducing the dual vectors ǔ_1^μ= y u_2^μ-u_1^μ/y^2-1 , ǔ_2^μ= y u_1^μ-u_2^μ/y^2-1 , so that u_i·ǔ_j=-δ_ij for i,j=1,2, we can decompose k^μ= ω_1 ǔ_1^μ + ω_2 ǔ_2^μ + k_⊥^μ with k_⊥· u_i=0 and similarly q_1^μ= -ω_2 ǔ_2^μ + q_1⊥^μ , q_2^μ= -ω_1 ǔ_1^μ + q_2⊥^μ , q_1⊥^μ + q_2⊥^μ+ k_⊥^μ=0 where we used (<ref>). The condition k^2=0 then takes the following form k_⊥^2 = -ω_1^2+2yω_1ω_2-ω_2^2/y^2-1≥ 0 , while q_1^2 and q_2^2 read q_1^2 = ω_2^2/y^2-1 + q_1⊥^2 ≥ q_1⊥^2 ≥ 0 , q_2^2 = ω_1^2/y^2-1 + q_2⊥^2 ≥ q_2⊥^2 ≥ 0 . The relations (<ref>), (<ref>) imply that 1/y+√(y^2-1)≤ω_1/ω_2≤ y+√(y^2-1) , q_1^2 ≥ω_2^2/y^2-1 , q_2^2 ≥ω_1^2/y^2-1 . In addition, the Schwarz inequality (q_1⊥· q_2⊥)^2≤ q_1⊥^2 q_2⊥^2 is equivalent to 𝒮 = (y^2-1) (q_1^2-q_2^2)^2-4 y ω_1 ω_2 (q_1^2+q_2^2)+4 ω_1^2q_1^2+4 ω_2^2 q_2^2+4 ω_1^2ω_2^2 ≤ 0 . The vector (<ref>) can be rewritten as follows, after imposing the transversality condition (<ref>), ε^μ = c_1 ξ_1^μ + c_2 ξ_2^μ + d_+ (q_1^μ + q_2^μ) in terms of the two transverse vectors ξ_1^μ = u_1^μ - ω_1 q_1^μ-q_2^μ/q_1^2-q_2^2 , ξ_2^μ = u_2^μ - ω_2 q_1^μ-q_2^μ/q_1^2-q_2^2 . The vectors k^μ, ξ_1^μ, ξ_2^μ form a basis of the space of vectors ξ^μ such that k·ξ = 0. All such vectors, except for those aligned with k^μ, are spacelike, as can be easily seen by going to a frame where k^μ = (κ,0,0,κ), where ξ^t=ξ^z and therefore ξ^2 = (ξ^x)^2+(ξ^y)^2≥ 0. We can thus introduce |ξ_1| = √(ξ_1^2)≥ 0 , |ξ_1| = √(ξ_2^2)≥ 0 , Δ = 1 - (ξ_1·ξ_2)^2/ξ_1^2ξ_2^2≥ 0 , where the very last relation is the standard Cauchy–Schwarz inequality. Explicitly, ξ_1^2 = -1 + 4 ω_1^2 q_1^2/(q_1^2-q_2^2)^2 , ξ_1·ξ_2 = -y + 2 ω_1ω_2/(q_1^2-q_2^2)^2 (q_1^2+q_2^2) , ξ_2^2 = -1 + 4 ω_2^2 q_2^2/(q_1^2-q_2^2)^2 and (cf. Eq. (<ref>)) -Δ ξ_1^2 ξ_2^2= y^2-1 + 4(ω_1^2 q_1^2+ω_2^2 q_2^2)-4 y ω_1ω_2(q_1^2+q_2^2)+4 ω_1^2ω_2^2/(q_1^2-q_2^2)^2≤ 0 . The polarization tensor (<ref>) can be made traceless by imposing ε_με^μ = ξ_1^2 c_1^2 + 2 (ξ_2·ξ_2)c_1 c_2 + ξ_2^2 c_2^2= 0 , which we can solve by allowing c_1 and c_2 to take complex values and letting |ξ_1| c_1 = [-(ξ_1·ξ_2)/|ξ_1| |ξ_2| + i √(Δ)] |ξ_2| c_2 , or equivalently |ξ_1| c_1 = i e^iφ_12 |ξ_2| c_2 , φ_12 = arcsin(ξ_1·ξ_2)/|ξ_1| |ξ_2| . One can identify ε^μ = 1/√(2)(ε_1^μ+ i ε_2^ν) , in terms of real orthonormal vectors ε_1^μ, ε_2^μ, ε_i·ε_j=δ_ij , i,j=1,2 , after imposing the normalization condition ε^∗·ε = ξ_1^2 |c_1|^2 + (ξ_1 ·ξ_2) (c_1^∗ c_2 + c_2^∗ c_1) + ξ_2^2 |c_2|^2 = 1 , that is, |ξ_1| |c_1| = 1/√(2Δ) = |ξ_2| |c_2| . Building the standard real polarization tensors, ε_+^μν = ε_1^με_1^ν-ε_2^με_2^ν/√(2) , ε_×^μν = ε_1^με_2^ν+ε_1^νε_2^μ/√(2) , the identification is √(2) Reε^μν = ε_+^μν , √(2) Imε^μν = ε_×^μν . In the main body of the text, we mostly work without explicitly imposing the trace constraint (<ref>) and the normalization conditions (<ref>), treating c_1 and c_2 as formally independent. In order to obtain 𝒜_1^μν from (<ref>), one ought to first impose (<ref>), (<ref>) and then build 𝒜_1^μν = ε^μ (ε^∗_α𝒜_1^αβε_β^∗)ε^ν + ε^∗μ (ε_α𝒜_1^αβε_β)ε^∗ν . § MASTER INTEGRALS In this appendix, we present the master integrals that we have used in order to perform the integration of the one-loop amplitude presented in the main text. As is clear from the drawings in Table <ref>, it is enough to provide the expressions for 9 of them, since the remaining 7 are obtained by interchanging all labels 1 and 2, i.e. applying the permutation σ_4. We also collect their expressions in the ancillary file . I_0,0,1,1,0= [baseline=([yshift=-0.5ex]current bounding box.center),scale=1,node/.style=draw,shape=circle,fill=black,scale=0.4] [draw, ultra thick, green!60!black] (-.65,0)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(.65,1); (0,.97) to[out=-60, in=60] (0,.03); (0,.97) to[out=240, in=120] (0,.03); (0,.97)–(.7,.5); = 1/ +2 - 2 q_2+/12(48-π^2-48 q_2+24 q_2^2 ) +𝒪(ϵ) I_1,0,0,1,0 = [baseline=([yshift=-0.5ex]current bounding box.center),scale=1,node/.style=draw,shape=circle,fill=black,scale=0.4] [draw, ultra thick, green!60!black] (-.65,0)–(-.5,.5)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(-.5,.5)–(.65,1); [draw,thin] (.5,.95)–(.7,.5); (-.5,.5) to[out=-15, in=240] (.5,.95); = 1/q_2(w_1E^2-1)/2 w_1E + q_2 (w_1E^2-1)/w_1E (w_1E-1-1 -w_1E +1 + w_1E +q_2) + q_2 (w_1E^2-1)/24 w_1E (48 + 5 π^2+ 24(w_1E-1 -2 -w_1E +1 + w_1E +q_2) × (-1 +w_1E -w_1E +1 + w_1E + q_2)) +𝒪(ϵ^2) I_0,1,1,1,0 = [baseline=([yshift=-0.5ex]current bounding box.center),scale=1,node/.style=draw,shape=circle,fill=black,scale=0.4] [draw, ultra thick, green!60!black] (-.65,0)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(.65,1); [draw,thin] (0,.97)–(.5,.03); [draw,thin] (0,.97)–(-.5,.03); [draw,thin] (0,.97)–(.7,.5); = π^2/2 q_2 +𝒪(ϵ) The integrals I_0,0,1,1,0, I_1,0,0,1,0 and I_0,1,1,1,0 can be in fact evaluated in generic D=4-2ϵ with elementary methods. However, we opted to present their expansion for small ϵ in the form which is ready-to-use for the analytic continuation discussed in Section <ref>. I_1,0,1,1,0 = [baseline=([yshift=-0.5ex]current bounding box.center),scale=1,node/.style=draw,shape=circle,fill=black,scale=0.4] [draw, ultra thick, green!60!black] (-.65,0)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(.65,1); [draw,thin] (.5,.97)–(0,.03); [draw,thin] (-.5,.97)–(0,.03); [draw,thin] (.5,.97)–(.7,.5); = 2 w_1 E( π^2+6 -1/w_1E +6 1/w_1E+3 w_1E^2 )/3 q_2 (1 + w_1E^2) +𝒪(ϵ) I_1,1,0,1,0= [baseline=([yshift=-0.5ex]current bounding box.center),scale=1,node/.style=draw,shape=circle,fill=black,scale=0.4] [draw, ultra thick, green!60!black] (-.65,0)–(-.5,.5)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(-.5,.5)–(.65,1); [draw,thin] (.5,.95)–(.5,.037); [draw,thin] (.5,.95)–(.7,.5); = 1/x_E x_E/(x_E^2-1)^2 + x_E/6(x_E^2-1)^2 (π^2-12-1/x_E-121/x_E -6 x_E( 2 -1 + w_1E. -. 2 w_1E +2 1 + w_1E - 2 -1 + x_E+3 x_E-1 + x_E +2q_2) ) +𝒪(ϵ) I_1,0,1,1,1 = [baseline=([yshift=-0.5ex]current bounding box.center),scale=1,node/.style=draw,shape=circle,fill=black,scale=0.4] [draw, ultra thick, green!60!black] (-.65,0)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(.65,1); [draw,thin] (.5,.97)–(0,.03); [draw,thin] (-.5,.97)–(0,.03); [draw,thin] (.25,.5)–(.7,.5); =1/^2 w_2E/2 q_2 q_1^2 (-1 + w_1E^2) + 1/w_1E/ q_2 q_1^2 (-1 + w_1E^2)( -w_1E-1+w_1E -1+w_1E+ q_2-2 q_1) + w_1E/8 q_2 q_1^2 (-1 + w_1E^2)(-π^2 + 8 -1 + w_1E^2 +8 ( w_1E -1 + w_1E). . ×( w_1E - 1 + w_1E + 2 q_2 - 4 q_1) . . -16 -1 + w_1E(w_1E -1 + w_1E. . . .+q_2 -2 q_1)+ 64q_1^2 +8q_2(-3 q_2 + 4 q_1^2 -q_2^2) . .-32 q_1q_2 (q_1^2 - q_2^2) +16q_2^2/q_1^2) +𝒪(ϵ) I_1,1,0,1,1= [baseline=([yshift=-0.5ex]current bounding box.center),scale=1,node/.style=draw,shape=circle,fill=black,scale=0.4] [draw, ultra thick, green!60!black] (-.65,0)–(-.5,.5)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(-.5,.5)–(.65,1); [draw,thin] (.5,.95)–(.5,.035); [draw,thin] (.5,.5)–(.7,.5); = 1/^2w_1Ew_2E/q_1q_2 (-1 + w_1E^2) (-1 + w_2E^2) - 1/w_1Ew_2E/q_1q_2 (-1 + w_1E^2) (-1 + w_2E^2)(-1 + w_1E -w_1E. .+ 1 + w_1E + -1 + w_2E - w_2E + 1 + w_2E +q_1 +q_2) +w_1Ew_2E/12 q_1q_2 (-1 + w_1E^2) (-1 + w_2E^2)(- 7π^2-12 x_E^2+24 (log (q_1)+log (w_2E-1) -log (w_2E)+log (w_2E+1)) (log (q_2)+log (w_1E-1)-log (w_1E)+log (w_1E+1)) ) +𝒪(ϵ) I_1,1,1,1,0= [baseline=([yshift=-0.5ex]current bounding box.center),scale=1,node/.style=draw,shape=circle,fill=black,scale=0.4] [draw, ultra thick, green!60!black] (-.65,0)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(.65,1); [draw,thin] (.5,.97)–(.5,.03); [draw,thin] (-.5,.97)–(-.5,.03); [draw,thin] (.5,.97)–(.7,.5); = -x_E log (x_E)/q_2^2 (x_E^2-1) ϵ + x_E/6 q_2^2 (x_E^2-1)[ -12 Li_2(1/x_E)-12 Li_2(-1/x_E) +6 log (x_E) (2 (log (q_2)+log (x_E+1))-2 log (w_1E-1)+2 log (w_1E) -2 log (w_1E+1)+2 log (x_E-1)-3 log (x_E))+π ^2 ]+𝒪(ϵ) I_1,1,1,1,1 = [baseline=([yshift=-0.5ex]current bounding box.center),scale=1,node/.style=draw,shape=circle,fill=black,scale=0.4] [draw, ultra thick, green!60!black] (-.65,0)–(.65,0); [draw, ultra thick, blue] (-.65,1)–(.65,1); [draw,thin] (.5,.97)–(.5,.03); [draw,thin] (-.5,.97)–(-.5,.03); [draw,thin] (.5,.5)–(.7,.5); = c_2/ϵ^2+ c_1/ϵ+c_0+𝒪(ϵ) . We have obtained c_2, c_1 and c_0 by means of dimension shifting identities (see e.g. <cit.>). These express the 6-dimensional pentagon I_1,1,1,1,1^6D, which is finite, as a linear combination of 4-dimensional pentagon and box integrals. Since I_1,1,1,1,1^6D only involves objects of transcendental weight 3, it can only contribute to the 𝒪(ϵ) part of I_1,1,1,1,1 in D=4-2ϵ. Therefore, the “ansatz coefficients” c_2, c_1 and c_0 can be fixed in terms of the box integrals already provided in the previous equations. § TREE-LEVEL AMPLITUDES In this appendix we collect the tree level amplitudes that are useful in order to perform various checks on the 2→3 one-loop amplitude calculated in the text. We start from the tree-level 2→2 amplitude 𝒜_0^(4) involving four massive states, 𝒜_0^(4) = [draw, ultra thick, blue] (-4,2)–(-2,2); [draw, ultra thick, green!60!black] (-4,1)–(-2,1); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); = 4 π G m̅_1^2 m̅_2^2 (8 y^2 (ϵ -1)+4)/q^2 (ϵ -1)-4 π G (m̅_1^2+m̅_2^2)/ϵ -1+π G q^2 (3-2 ϵ )/ϵ -1 . The 2→3 tree level amplitude 𝒜_0^μν involving four massive states and a graviton can be written as follows as the sum of a piece obtained form the double copy minus a piece only including the dilaton exchanges, 𝒜_0^μν = [draw, ultra thick, blue] (-4,2)–(-2,2); [draw, ultra thick, green!60!black] (-4,1)–(-2,1); [draw, red] (-3,1.5)–(-2,1.5); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); = 𝒜_dc^μν - 𝒜_dil^μν , where <cit.> 𝒜_dc^μν =2(8 π G_N)^3/2{(p_4 p_2)(p_3 p_1)(p_4^μ/p_4 k-p_3^μ/p_3 k)(p_2^ν/p_2 k-p_1^ν/p_1 k)+4 q_1^2 q_2^2. ×[q_1^μ(p_1 p_2)-p_2^μ(p_1 k)+p_1^μ(p_2 k)/q_1^2 q_2^2-p_3^μ/2 p_3 k(p_1 p_2/q_1^2+1/2)+p_4^μ/2 p_4 k(p_1 p_2/q_2^2+1/2)] .×[q_1^ν(p_4 p_3)-p_3^ν(p_4 k)+p_4^ν(p_3 k)/q_1^2 q_2^2+p_1^ν/2 p_1 k(p_4 p_3/q_2^2+1/2)-p_2^ν/2 p_2 k(p_4 p_3/q_1^2+1/2)]} and 𝒜_dil^μν/√(2) (π G)^3/2 = 4 (q_1^2-q_2^2) q_1^μ q_1^ν(4 m̅_1^2-q_1^2) (q_2^2-4 m̅_2^2)/q_2^2 (ϵ -1) (-4 ω _1 m̅_1+q_1^2-q_2^2) (4 ω _1 m̅_1+q_1^2-q_2^2) + 4 (q_1^2-q_2^2) q_2^μ q_2^ν(q_1^2-4 m̅_1^2) (q_2^2-4 m̅_2^2)/q_1^2 (ϵ -1) (-4 ω _2 m̅_2+q_1^2-q_2^2) (4 ω _2 m̅_2+q_1^2-q_2^2) -32 ω _2 m̅_2^2 (q_1^2-4 m̅_1^2) (4 m̅_2^2-q_2^2) q_1^(μu_2^ν)/q_1^2 (ϵ -1) (-4 ω _2 m̅_2+q_1^2-q_2^2) (4 ω _2 m̅_2+q_1^2-q_2^2) -32 ω _1 m̅_1^2 (4 m̅_1^2-q_1^2) (q_2^2-4 m̅_2^2) u_1^(μq_2^ν)/q_2^2 (ϵ -1) (-4 ω _1 m̅_1+q_1^2-q_2^2) (4 ω _1 m̅_1+q_1^2-q_2^2) -16 (q_1^2-q_2^2) m̅_1^2 u_1^μ u_2^ν(4 m̅_1^2-q_1^2) (q_2^2-4 m̅_2^2)/q_2^2 (ϵ -1) (-4 ω _1 m̅_1+q_1^2-q_2^2) (4 ω _1 m̅_1+q_1^2-q_2^2) +16 (q_1^2-q_2^2) m̅_2^2 u_2^μ u_2^ν(q_1^2-4 m̅_1^2) (4 m̅_2^2-q_2^2)/q_1^2 (ϵ -1) (-4 ω _2 m̅_2+q_1^2-q_2^2) (4 ω _2 m̅_2+q_1^2-q_2^2) (q_1^2+q_2^2) (q_1^2-4 m̅_1^2) (q_2^2-4 m̅_2^2) η^μν/q_1^2 q_2^2 (ϵ -1) -q_1^(μq_2^ν)/q_1^2 q_2^22 (q_1^2-4 m̅_1^2) (q_2^2-4 m̅_2^2) P_q_1q_2/ (ϵ -1) Q_q_1q_2 with A^(μB^ν) = A^μ B^ν + A^ν B^μ, P_q_1q_2 = 2 q_1^4 (8 ω _1^2 m̅_1^2-8 ω _2^2 m̅_2^2+3 q_2^4)+(q_2^4-16 ω _1^2 m̅_1^2) (16 ω _2^2 m̅_2^2+q_2^4)+q_1^8-4 q_2^2 q_1^6-4 q_2^6 q_1^2 , Q_q_1q_2 = (-4 ω _1 m̅_1+q_1^2-q_2^2) (4 ω _1 m̅_1+q_1^2-q_2^2) (-4 ω _2 m̅_2+q_1^2-q_2^2) (4 ω _2 m̅_2+q_1^2-q_2^2). The last ingredient is the “Compton” amplitude for the scattering of a graviton and a massive particle <cit.> 𝒜^C_ρσ, αβ = [draw, ultra thick, blue] (-4,2)–(-2,2); [draw, thin, red] (-4,1)–(-2,1); [black!20!white, thick] (-3,1.5) ellipse (.5 and .8); [thick] (-3,1.5) ellipse (.5 and .8); at (-4,2)[left]k_1; at (-2,2)[right]k_2; at (-4,1)[left](ρσ) r_1; at (-2,1)[right]r_2 (αβ); which reads 𝒜^C_ρσ, αβ=2 κ^2 r_1·(k_1+r_2) r_1· k_1/r_1· r_2 ×[(k_1+r_2)^ρ k_1^α/r_1·(k_1+r_2)-(k_1+r_1)^α k_1^ρ/k_1 · r_1+η^ρα][(k_1+r_2)^σ k_1^β/r_1 ·(k_1+r_2)-(k_1+r_1)^β k_1^σ/k_1 · r_1+η^σβ]. Both 𝒜_dc^μν, 𝒜_dil^μν and 𝒜_C^ρσ,αβ are gauge invariant, 𝒜_dc^μνk_μ = 0 , 𝒜_dil^μνk_μ= 0 , 𝒜_C^ρσ,αβr_1ρ=0=𝒜_C^ρσ,αβr_2α=0 and can be glued into cuts by replacing the transverse-traceless projector Π^μν,ρσ over intermediate graviton states via Π^μν,ρσ→1/2( η^μρη^νσ + η^μση^νρ - 1/1-ϵ η^μνη^ρσ). It is easy to see that, provided the gravitons have nonzero frequency, 𝒜_ρσ,αβ^C = 𝒜_ρσ,αβ^C[0] + 𝒪(ħ) in the limit (<ref>). The tree-level 2→2 amplitude (<ref>) behaves as ħ^-2 to leading order, and only receives corrections analytic in q^2, 𝒜_0^(4) = 𝒜_0^(4)[-2] + (analytic in q^2) . These corrections become short-range terms the Fourier transform (<ref>) and are thus completely irrelevant to our analysis. The tree-level 2→3 amplitude (<ref>) also behaves as ħ^-2 to leading order, 𝒜_0^μν = 𝒜_0^μν[-2] + 𝒪(ħ^0) and is free of ħ^-1 corrections. The property (<ref>) holds thanks to the choice of variables (<ref>), (<ref>) discussed in Subsection <ref>. The leading order 𝒜_0^μν[-2] coincides with the one given in <cit.>. 10 Damgaard:2021ipf P. H. Damgaard, L. Planté, and P. Vanhove, “On an exponential representation of the gravitational S-matrix,” http://dx.doi.org/10.1007/JHEP11(2021)213JHEP 11 (2021) 213, http://arxiv.org/abs/2107.12891arXiv:2107.12891 [hep-th]. Cristofoli:2021jas A. Cristofoli, R. Gonzo, N. Moynihan, D. O'Connell, A. Ross, M. Sergola, and C. D. White, “The Uncertainty Principle and Classical Amplitudes,” http://arxiv.org/abs/2112.07556arXiv:2112.07556 [hep-th]. DiVecchia:2022piu P. Di Vecchia, C. Heissenberg, R. Russo, and G. Veneziano, “Classical Gravitational Observables from the Eikonal Operator,” http://arxiv.org/abs/2210.12118arXiv:2210.12118 [hep-th]. LIGOScientific:2021djp LIGO Scientific, VIRGO, KAGRA Collaboration, R. Abbott et al., “GWTC-3: Compact Binary Coalescences Observed by LIGO and Virgo During the Second Part of the Third Observing Run,” http://arxiv.org/abs/2111.03606arXiv:2111.03606 [gr-qc]. Buonanno:2022pgc A. Buonanno, M. Khalil, D. O'Connell, R. Roiban, M. P. Solon, and M. Zeng, “Snowmass White Paper: Gravitational Waves and Scattering Amplitudes,” in 2022 Snowmass Summer Study. 4, 2022. http://arxiv.org/abs/2204.05194arXiv:2204.05194 [hep-th]. Kawai:1985xq H. Kawai, D. C. Lewellen, and S. H. H. Tye, “A Relation Between Tree Amplitudes of Closed and Open Strings,” http://dx.doi.org/10.1016/0550-3213(86)90362-7Nucl. Phys. B 269 (1986) 1–23. Bern:1994zx Z. Bern, L. J. Dixon, D. C. Dunbar, and D. A. Kosower, “One loop n point gauge theory amplitudes, unitarity and collinear limits,” http://dx.doi.org/10.1016/0550-3213(94)90179-1Nucl. Phys. B 425 (1994) 217–260, http://arxiv.org/abs/hep-ph/9403226arXiv:hep-ph/9403226. Bern:1994cg Z. Bern, L. J. Dixon, D. C. Dunbar, and D. A. Kosower, “Fusing gauge theory tree amplitudes into loop amplitudes,” http://dx.doi.org/10.1016/0550-3213(94)00488-ZNucl. Phys. B 435 (1995) 59–101, http://arxiv.org/abs/hep-ph/9409265arXiv:hep-ph/9409265. Bern:1995db Z. Bern and A. G. Morgan, “Massive loop amplitudes from unitarity,” http://dx.doi.org/10.1016/0550-3213(96)00078-8Nucl. Phys. B 467 (1996) 479–509, http://arxiv.org/abs/hep-ph/9511336arXiv:hep-ph/9511336. Bern:1998ug Z. Bern, L. J. Dixon, D. C. Dunbar, M. Perelstein, and J. S. Rozowsky, “On the relationship between Yang-Mills theory and gravity and its implication for ultraviolet divergences,” http://dx.doi.org/10.1016/S0550-3213(98)00420-9Nucl. Phys. B530 (1998) 401–456, http://arxiv.org/abs/hep-th/9802162arXiv:hep-th/9802162 [hep-th]. Bern:2008qj Z. Bern, J. J. M. Carrasco, and H. Johansson, “New Relations for Gauge-Theory Amplitudes,” http://dx.doi.org/10.1103/PhysRevD.78.085011Phys. Rev. D 78 (2008) 085011, http://arxiv.org/abs/0805.3993arXiv:0805.3993 [hep-ph]. Bern:2010ue Z. Bern, J. J. M. Carrasco, and H. Johansson, “Perturbative Quantum Gravity as a Double Copy of Gauge Theory,” http://dx.doi.org/10.1103/PhysRevLett.105.061602Phys. Rev. Lett. 105 (2010) 061602, http://arxiv.org/abs/1004.0476arXiv:1004.0476 [hep-th]. Bjerrum-Bohr:2018xdl N. E. J. Bjerrum-Bohr, P. H. Damgaard, G. Festuccia, L. Planté, and P. Vanhove, “General Relativity from Scattering Amplitudes,” http://dx.doi.org/10.1103/PhysRevLett.121.171601Phys. Rev. Lett. 121 (2018) no. 17, 171601, http://arxiv.org/abs/1806.04920arXiv:1806.04920 [hep-th]. Cheung:2018wkq C. Cheung, I. Z. Rothstein, and M. P. Solon, “From Scattering Amplitudes to Classical Potentials in the Post-Minkowskian Expansion,” http://dx.doi.org/10.1103/PhysRevLett.121.251101Phys. Rev. Lett. 121 (2018) no. 25, 251101, http://arxiv.org/abs/1808.02489arXiv:1808.02489 [hep-th]. Bern:2019nnu Z. Bern, C. Cheung, R. Roiban, C.-H. Shen, M. P. Solon, and M. Zeng, “Scattering Amplitudes and the Conservative Hamiltonian for Binary Systems at Third Post-Minkowskian Order,” http://dx.doi.org/10.1103/PhysRevLett.122.201603Phys. Rev. Lett. 122 (2019) no. 20, 201603, http://arxiv.org/abs/1901.04424arXiv:1901.04424 [hep-th]. Bern:2019crd Z. Bern, C. Cheung, R. Roiban, C.-H. Shen, M. P. Solon, and M. Zeng, “Black Hole Binary Dynamics from the Double Copy and Effective Theory,” http://dx.doi.org/10.1007/JHEP10(2019)206JHEP 10 (2019) 206, http://arxiv.org/abs/1908.01493arXiv:1908.01493 [hep-th]. Bern:2021dqo Z. Bern, J. Parra-Martinez, R. Roiban, M. S. Ruf, C.-H. Shen, M. P. Solon, and M. Zeng, “Scattering Amplitudes and Conservative Binary Dynamics at O(G^4),” http://dx.doi.org/10.1103/PhysRevLett.126.171601Phys. Rev. Lett. 126 (2021) no. 17, 171601, http://arxiv.org/abs/2101.07254arXiv:2101.07254 [hep-th]. Bern:2021yeh Z. Bern, J. Parra-Martinez, R. Roiban, M. S. Ruf, C.-H. Shen, M. P. Solon, and M. Zeng, “Scattering Amplitudes, the Tail Effect, and Conservative Binary Dynamics at O(G^4),” http://dx.doi.org/10.1103/PhysRevLett.128.161103Phys. Rev. Lett. 128 (2022) no. 16, 161103, http://arxiv.org/abs/2112.10750arXiv:2112.10750 [hep-th]. Kabat:1992tb D. N. Kabat and M. Ortiz, “Eikonal quantum gravity and Planckian scattering,” http://dx.doi.org/10.1016/0550-3213(92)90627-NNucl. Phys. B388 (1992) 570–592, http://arxiv.org/abs/hep-th/9203082arXiv:hep-th/9203082 [hep-th]. Akhoury:2013yua R. Akhoury, R. Saotome, and G. Sterman, “High Energy Scattering in Perturbative Quantum Gravity at Next to Leading Power,” http://arxiv.org/abs/1308.5204arXiv:1308.5204 [hep-th]. KoemansCollado:2019ggb A. Koemans Collado, P. Di Vecchia, and R. Russo, “Revisiting the second post-Minkowskian eikonal and the dynamics of binary black holes,” http://dx.doi.org/10.1103/PhysRevD.100.066028Phys. Rev. D 100 (2019) no. 6, 066028, http://arxiv.org/abs/1904.02667arXiv:1904.02667 [hep-th]. Cheung:2020gyp C. Cheung and M. P. Solon, “Classical gravitational scattering at 𝒪(G^3) from Feynman diagrams,” http://dx.doi.org/10.1007/JHEP06(2020)144JHEP 06 (2020) 144, http://arxiv.org/abs/2003.08351arXiv:2003.08351 [hep-th]. DiVecchia:2020ymx P. Di Vecchia, C. Heissenberg, R. Russo, and G. Veneziano, “Universality of ultra-relativistic gravitational scattering,” http://dx.doi.org/10.1016/j.physletb.2020.135924Phys. Lett. B 811 (2020) 135924, http://arxiv.org/abs/2008.12743arXiv:2008.12743 [hep-th]. AccettulliHuber:2020oou M. Accettulli Huber, A. Brandhuber, S. De Angelis, and G. Travaglini, “Eikonal phase matrix, deflection angle and time delay in effective field theories of gravity,” http://dx.doi.org/10.1103/PhysRevD.102.046014Phys. Rev. D 102 (2020) no. 4, 046014, http://arxiv.org/abs/2006.02375arXiv:2006.02375 [hep-th]. DiVecchia:2021ndb P. Di Vecchia, C. Heissenberg, R. Russo, and G. Veneziano, “Radiation Reaction from Soft Theorems,” http://dx.doi.org/10.1016/j.physletb.2021.136379Phys. Lett. B 818 (2021) 136379, http://arxiv.org/abs/2101.05772arXiv:2101.05772 [hep-th]. DiVecchia:2021bdo P. Di Vecchia, C. Heissenberg, R. Russo, and G. Veneziano, “The eikonal approach to gravitational scattering and radiation at 𝒪(G^3),” http://dx.doi.org/10.1007/JHEP07(2021)169JHEP 07 (2021) 169, http://arxiv.org/abs/2104.03256arXiv:2104.03256 [hep-th]. Brandhuber:2021kpo A. Brandhuber, G. Chen, G. Travaglini, and C. Wen, “A new gauge-invariant double copy for heavy-mass effective theory,” http://dx.doi.org/10.1007/JHEP07(2021)047JHEP 07 (2021) 047, http://arxiv.org/abs/2104.11206arXiv:2104.11206 [hep-th]. Heissenberg:2021tzo C. Heissenberg, “Infrared divergences and the eikonal exponentiation,” http://dx.doi.org/10.1103/PhysRevD.104.046016Phys. Rev. D 104 (2021) no. 4, 046016, http://arxiv.org/abs/2105.04594arXiv:2105.04594 [hep-th]. Bjerrum-Bohr:2021vuf N. E. J. Bjerrum-Bohr, P. H. Damgaard, L. Planté, and P. Vanhove, “Classical gravity from loop amplitudes,” http://dx.doi.org/10.1103/PhysRevD.104.026009Phys. Rev. D 104 (2021) no. 2, 026009, http://arxiv.org/abs/2104.04510arXiv:2104.04510 [hep-th]. Bjerrum-Bohr:2021din N. E. J. Bjerrum-Bohr, P. H. Damgaard, L. Planté, and P. Vanhove, “The amplitude for classical gravitational scattering at third Post-Minkowskian order,” http://dx.doi.org/10.1007/JHEP08(2021)172JHEP 08 (2021) 172, http://arxiv.org/abs/2105.05218arXiv:2105.05218 [hep-th]. Brandhuber:2021eyq A. Brandhuber, G. Chen, G. Travaglini, and C. Wen, “Classical gravitational scattering from a gauge-invariant double copy,” http://dx.doi.org/10.1007/JHEP10(2021)118JHEP 10 (2021) 118, http://arxiv.org/abs/2108.04216arXiv:2108.04216 [hep-th]. DiVecchia:2022nna P. Di Vecchia, C. Heissenberg, R. Russo, and G. Veneziano, “The eikonal operator at arbitrary velocities I: the soft-radiation limit,” http://dx.doi.org/10.1007/JHEP07(2022)039JHEP 07 (2022) 039, http://arxiv.org/abs/2204.02378arXiv:2204.02378 [hep-th]. Amati:1987uf D. Amati, M. Ciafaloni, and G. Veneziano, “Classical and Quantum Gravity Effects from Planckian Energy Superstring Collisions,” http://dx.doi.org/10.1142/S0217751X88000710Int. J. Mod. Phys. A3 (1988) 1615–1661. Amati:1987wq D. Amati, M. Ciafaloni, and G. Veneziano, “Superstring Collisions at Planckian Energies,” http://dx.doi.org/10.1016/0370-2693(87)90346-7Phys. Lett. B197 (1987) 81. Amati:1990xe D. Amati, M. Ciafaloni, and G. Veneziano, “Higher Order Gravitational Deflection and Soft Bremsstrahlung in Planckian Energy Superstring Collisions,” http://dx.doi.org/10.1016/0550-3213(90)90375-NNucl. Phys. B347 (1990) 550–580. Amati:1992zb D. Amati, M. Ciafaloni, and G. Veneziano, “Planckian scattering beyond the semiclassical approximation,” http://dx.doi.org/10.1016/0370-2693(92)91366-HPhys. Lett. B289 (1992) 87–91. Amati:1993tb D. Amati, M. Ciafaloni, and G. Veneziano, “Effective action and all order gravitational eikonal at Planckian energies,” http://dx.doi.org/10.1016/0550-3213(93)90367-XNucl. Phys. B403 (1993) 707–724. Ciafaloni:2014esa M. Ciafaloni and D. Colferai, “Rescattering corrections and self-consistent metric in Planckian scattering,” http://dx.doi.org/10.1007/JHEP10(2014)085JHEP 1410 (2014) 85, http://arxiv.org/abs/1406.6540arXiv:1406.6540 [hep-th]. Kosower:2018adc D. A. Kosower, B. Maybee, and D. O'Connell, “Amplitudes, Observables, and Classical Scattering,” http://dx.doi.org/10.1007/JHEP02(2019)137JHEP 02 (2019) 137, http://arxiv.org/abs/1811.10950arXiv:1811.10950 [hep-th]. Herrmann:2021lqe E. Herrmann, J. Parra-Martinez, M. S. Ruf, and M. Zeng, “Gravitational Bremsstrahlung from Reverse Unitarity,” http://dx.doi.org/10.1103/PhysRevLett.126.201602Phys. Rev. Lett. 126 (2021) no. 20, 201602, http://arxiv.org/abs/2101.07255arXiv:2101.07255 [hep-th]. Herrmann:2021tct E. Herrmann, J. Parra-Martinez, M. S. Ruf, and M. Zeng, “Radiative classical gravitational observables at 𝒪(G^3) from scattering amplitudes,” http://dx.doi.org/10.1007/JHEP10(2021)148JHEP 10 (2021) 148, http://arxiv.org/abs/2104.03957arXiv:2104.03957 [hep-th]. Cristofoli:2021vyo A. Cristofoli, R. Gonzo, D. A. Kosower, and D. O'Connell, “Waveforms from amplitudes,” http://dx.doi.org/10.1103/PhysRevD.106.056007Phys. Rev. D 106 (2022) no. 5, 056007, http://arxiv.org/abs/2107.10193arXiv:2107.10193 [hep-th]. Britto:2021pud R. Britto, R. Gonzo, and G. R. Jehu, “Graviton particle statistics and coherent states from classical scattering amplitudes,” http://dx.doi.org/10.1007/JHEP03(2022)214JHEP 03 (2022) 214, http://arxiv.org/abs/2112.07036arXiv:2112.07036 [hep-th]. Adamo:2022rmp T. Adamo, A. Cristofoli, and A. Ilderton, “Classical physics from amplitudes on curved backgrounds,” http://dx.doi.org/10.1007/JHEP08(2022)281JHEP 08 (2022) 281, http://arxiv.org/abs/2203.13785arXiv:2203.13785 [hep-th]. Adamo:2022qci T. Adamo, A. Cristofoli, A. Ilderton, and S. Klisch, “All-order waveforms from amplitudes,” http://arxiv.org/abs/2210.04696arXiv:2210.04696 [hep-th]. Carrasco:2021bmu J. J. M. Carrasco and I. A. Vazquez-Holm, “Extracting Einstein from the loop-level double-copy,” http://dx.doi.org/10.1007/JHEP11(2021)088JHEP 11 (2021) 088, http://arxiv.org/abs/2108.06798arXiv:2108.06798 [hep-th]. Ciafaloni:2015xsr M. Ciafaloni, D. Colferai, F. Coradeschi, and G. Veneziano, “Unified limiting form of graviton radiation at extreme energies,” http://dx.doi.org/10.1103/PhysRevD.93.044052Phys. Rev. D93 (2016) no. 4, 044052, http://arxiv.org/abs/1512.00281arXiv:1512.00281 [hep-th]. Ciafaloni:2018uwe M. Ciafaloni, D. Colferai, and G. Veneziano, “Infrared features of gravitational scattering and radiation in the eikonal approach,” http://dx.doi.org/10.1103/PhysRevD.99.066008Phys. Rev. D99 (2019) no. 6, 066008, http://arxiv.org/abs/1812.08137arXiv:1812.08137 [hep-th]. Addazi:2019mjh A. Addazi, M. Bianchi, and G. Veneziano, “Soft gravitational radiation from ultra-relativistic collisions at sub- and sub-sub-leading order,” http://dx.doi.org/10.1007/JHEP05(2019)050JHEP 05 (2019) 050, http://arxiv.org/abs/1901.10986arXiv:1901.10986 [hep-th]. Weinberg:1965nx S. Weinberg, “Infrared photons and gravitons,” http://dx.doi.org/10.1103/PhysRev.140.B516Phys. Rev. 140 (1965) B516–B524. Luna:2017dtq A. Luna, I. Nicholson, D. O'Connell, and C. D. White, “Inelastic Black Hole Scattering from Charged Scalar Amplitudes,” http://dx.doi.org/10.1007/JHEP03(2018)044JHEP 03 (2018) 044, http://arxiv.org/abs/1711.03901arXiv:1711.03901 [hep-th]. Weinberg:1964ew S. Weinberg, “Photons and Gravitons in S-Matrix Theory: Derivation of Charge Conservation and Equality of Gravitational and Inertial Mass,” http://dx.doi.org/10.1103/PhysRev.135.B1049Phys. Rev. 135 (1964) B1049–B1056. Strominger:2014pwa A. Strominger and A. Zhiboedov, “Gravitational Memory, BMS Supertranslations and Soft Theorems,” http://dx.doi.org/10.1007/JHEP01(2016)086JHEP 01 (2016) 086, http://arxiv.org/abs/1411.5745arXiv:1411.5745 [hep-th]. Strominger:2017zoo A. Strominger, Lectures on the Infrared Structure of Gravity and Gauge Theory. Princeton University Press, 2018. <https://arxiv.org/abs/1703.05448>. Cristofoli:2020uzm A. Cristofoli, P. H. Damgaard, P. Di Vecchia, and C. Heissenberg, “Second-order Post-Minkowskian scattering in arbitrary dimensions,” http://dx.doi.org/10.1007/JHEP07(2020)122JHEP 07 (2020) 122, http://arxiv.org/abs/2003.10274arXiv:2003.10274 [hep-th]. Mougiakakos:2021ckm S. Mougiakakos, M. M. Riva, and F. Vernizzi, “Gravitational Bremsstrahlung in the post-Minkowskian effective field theory,” http://dx.doi.org/10.1103/PhysRevD.104.024041Phys. Rev. D 104 (2021) no. 2, 024041, http://arxiv.org/abs/2102.08339arXiv:2102.08339 [gr-qc]. Riva:2021vnj M. M. Riva and F. Vernizzi, “Radiated momentum in the post-Minkowskian worldline approach via reverse unitarity,” http://dx.doi.org/10.1007/JHEP11(2021)228JHEP 11 (2021) 228, http://arxiv.org/abs/2110.10140arXiv:2110.10140 [hep-th]. Manohar:2022dea A. V. Manohar, A. K. Ridgway, and C.-H. Shen, “Radiated Angular Momentum and Dissipative Effects in Classical Scattering,” http://dx.doi.org/10.1103/PhysRevLett.129.121601Phys. Rev. Lett. 129 (2022) no. 12, 121601, http://arxiv.org/abs/2203.04283arXiv:2203.04283 [hep-th]. DiVecchia:2022owy P. Di Vecchia, C. Heissenberg, and R. Russo, “Angular momentum of zero-frequency gravitons,” http://dx.doi.org/10.1007/JHEP08(2022)172JHEP 08 (2022) 172, http://arxiv.org/abs/2203.11915arXiv:2203.11915 [hep-th]. Jakobsen:2021smu G. U. Jakobsen, G. Mogull, J. Plefka, and J. Steinhoff, “Classical Gravitational Bremsstrahlung from a Worldline Quantum Field Theory,” http://dx.doi.org/10.1103/PhysRevLett.126.201103Phys. Rev. Lett. 126 (2021) no. 20, 201103, http://arxiv.org/abs/2101.12688arXiv:2101.12688 [gr-qc]. Blanchet:1992br L. Blanchet and T. Damour, “Hereditary effects in gravitational radiation,” http://dx.doi.org/10.1103/PhysRevD.46.4304Phys. Rev. D 46 (1992) 4304–4319. Blanchet:1993ec L. Blanchet and G. Schaefer, “Gravitational wave tails and binary star systems,” http://dx.doi.org/10.1088/0264-9381/10/12/026Class. Quant. Grav. 10 (1993) 2699–2721. Blanchet:2013haa L. Blanchet, “Gravitational Radiation from Post-Newtonian Sources and Inspiralling Compact Binaries,” http://dx.doi.org/10.12942/lrr-2014-2Living Rev. Rel. 17 (2014) 2, http://arxiv.org/abs/1310.1528arXiv:1310.1528 [gr-qc]. Bini:2022enm D. Bini, T. Damour, and A. Geralico, “Radiated momentum in gravitational two-body scattering including time-asymmetric effects,” http://arxiv.org/abs/2210.07165arXiv:2210.07165 [gr-qc]. Laddha:2018vbn A. Laddha and A. Sen, “Observational Signature of the Logarithmic Terms in the Soft Graviton Theorem,” http://dx.doi.org/10.1103/PhysRevD.100.024009Phys. Rev. D100 (2019) no. 2, 024009, http://arxiv.org/abs/1806.01872arXiv:1806.01872 [hep-th]. Sahoo:2018lxl B. Sahoo and A. Sen, “Classical and Quantum Results on Logarithmic Terms in the Soft Theorem in Four Dimensions,” http://dx.doi.org/10.1007/JHEP02(2019)086JHEP 02 (2019) 086, http://arxiv.org/abs/1808.03288arXiv:1808.03288 [hep-th]. Saha:2019tub A. P. Saha, B. Sahoo, and A. Sen, “Proof of the classical soft graviton theorem in D = 4,” http://dx.doi.org/10.1007/JHEP06(2020)153JHEP 06 (2020) 153, http://arxiv.org/abs/1912.06413arXiv:1912.06413 [hep-th]. Sahoo:2021ctw B. Sahoo and A. Sen, “Classical soft graviton theorem rewritten,” http://dx.doi.org/10.1007/JHEP01(2022)077JHEP 01 (2022) 077, http://arxiv.org/abs/2105.08739arXiv:2105.08739 [hep-th]. Brandhuber:2023hhy A. Brandhuber, G. R. Brown, G. Chen, S. De Angelis, J. Gowdy, and G. Travaglini, “One-loop Gravitational Bremsstrahlung and Waveforms from a Heavy-Mass Effective Field Theory,” http://arxiv.org/abs/2303.06111arXiv:2303.06111 [hep-th]. Donal Co A. Elkhidir, D. O'Connell, M. Sergola, and I. Vazquez-Holm, “Radiation and reaction at one loop.” To appear. Herderschee:2023fxh A. Herderschee, R. Roiban, and F. Teng, “The Sub-Leading Scattering Waveform from Amplitudes,” http://arxiv.org/abs/2303.06112arXiv:2303.06112 [hep-th]. BrownTalk G. Brown, “Gravitational bremsstrahlung from a heavy-mass effective field theory.” <https://indico.phys.ethz.ch/event/22/contributions/193/attachments/140/201/Graham RoibanTalk R. Roiban, “Gravitational waves through the Amplitudes lens.” <https://indico.phys.ethz.ch/event/22/contributions/142/attachments/142/223/Roiban_Talk.pdf>. SergolaTalk M. Sergola, “Radiation and reaction at one loop.” <https://indico.phys.ethz.ch/event/22/contributions/219/attachments/171/244/matteo Lee:2012cn R. N. Lee, “Presenting LiteRed: a tool for the Loop InTEgrals REDuction,” http://arxiv.org/abs/1212.2685arXiv:1212.2685 [hep-ph]. Lee:2013mka R. N. Lee, “LiteRed 1.4: a powerful tool for reduction of multiloop integrals,” http://dx.doi.org/10.1088/1742-6596/523/1/012059J. Phys. Conf. Ser. 523 (2014) 012059, http://arxiv.org/abs/1310.1145arXiv:1310.1145 [hep-ph]. Panzer:2014caa E. Panzer, “Algorithms for the symbolic integration of hyperlogarithms with applications to Feynman integrals,” http://dx.doi.org/10.1016/j.cpc.2014.10.019Comput. Phys. Commun. 188 (2015) 148–166, http://arxiv.org/abs/1403.3385arXiv:1403.3385 [hep-th]. Tarasov:1996br O. V. Tarasov, “Connection between Feynman integrals having different values of the space-time dimension,” http://dx.doi.org/10.1103/PhysRevD.54.6479Phys. Rev. D 54 (1996) 6479–6490, http://arxiv.org/abs/hep-th/9606018arXiv:hep-th/9606018. Lee:2009dh R. N. Lee, “Space-time dimensionality D as complex variable: Calculating loop integrals using dimensional recurrence relation and analytical properties with respect to D,” http://dx.doi.org/10.1016/j.nuclphysb.2009.12.025Nucl. Phys. B 830 (2010) 474–492, http://arxiv.org/abs/0911.0252arXiv:0911.0252 [hep-ph]. Lee:2010wea R. N. Lee, “Calculating multiloop integrals using dimensional recurrence relation and D-analyticity,” http://dx.doi.org/10.1016/j.nuclphysbps.2010.08.032Nucl. Phys. B Proc. Suppl. 205-206 (2010) 135–140, http://arxiv.org/abs/1007.2256arXiv:1007.2256 [hep-ph]. Ware:2013zja J. Ware, R. Saotome, and R. Akhoury, “Construction of an asymptotic S matrix for perturbative quantum gravity,” http://dx.doi.org/10.1007/JHEP10(2013)159JHEP 10 (2013) 159, http://arxiv.org/abs/1308.6285arXiv:1308.6285 [hep-th]. Goldberger:2016iau W. D. Goldberger and A. K. Ridgway, “Radiation and the classical double copy for color charges,” http://dx.doi.org/10.1103/PhysRevD.95.125010Phys. Rev. D 95 (2017) no. 12, 125010, http://arxiv.org/abs/1611.03493arXiv:1611.03493 [hep-th]. Jakobsen:2021lvp G. U. Jakobsen, G. Mogull, J. Plefka, and J. Steinhoff, “Gravitational Bremsstrahlung and Hidden Supersymmetry of Spinning Bodies,” http://dx.doi.org/10.1103/PhysRevLett.128.011101Phys. Rev. Lett. 128 (2022) no. 1, 011101, http://arxiv.org/abs/2106.10256arXiv:2106.10256 [hep-th]. Parra-Martinez:2020dzs J. Parra-Martinez, M. S. Ruf, and M. Zeng, “Extremal black hole scattering at 𝒪(G^3): graviton dominance, eikonal exponentiation, and differential equations,” http://dx.doi.org/10.1007/JHEP11(2020)023JHEP 11 (2020) 023, http://arxiv.org/abs/2005.04236arXiv:2005.04236 [hep-th]. Anastasiou:2002qz C. Anastasiou, L. J. Dixon, and K. Melnikov, “NLO Higgs boson rapidity distributions at hadron colliders,” http://dx.doi.org/10.1016/S0920-5632(03)80168-8Nucl. Phys. B Proc. Suppl. 116 (2003) 193–197, http://arxiv.org/abs/hep-ph/0211141arXiv:hep-ph/0211141. Anastasiou:2002yz C. Anastasiou and K. Melnikov, “Higgs boson production at hadron colliders in NNLO QCD,” http://dx.doi.org/10.1016/S0550-3213(02)00837-4Nucl. Phys. B 646 (2002) 220–256, http://arxiv.org/abs/hep-ph/0207004arXiv:hep-ph/0207004. Anastasiou:2003yy C. Anastasiou, L. J. Dixon, K. Melnikov, and F. Petriello, “Dilepton rapidity distribution in the Drell-Yan process at NNLO in QCD,” http://dx.doi.org/10.1103/PhysRevLett.91.182002Phys. Rev. Lett. 91 (2003) 182002, http://arxiv.org/abs/hep-ph/0306192arXiv:hep-ph/0306192. Anastasiou:2015yha C. Anastasiou, C. Duhr, F. Dulat, E. Furlan, F. Herzog, and B. Mistlberger, “Soft expansion of double-real-virtual corrections to Higgs production at N^3LO,” http://dx.doi.org/10.1007/JHEP08(2015)051JHEP 08 (2015) 051, http://arxiv.org/abs/1505.04110arXiv:1505.04110 [hep-ph]. Donnay:2022ijr L. Donnay, E. Esmaeili, and C. Heissenberg, “p-Forms on the Celestial Sphere,” http://arxiv.org/abs/2212.03060arXiv:2212.03060 [hep-th]. Dlapa:2021npj C. Dlapa, G. Kälin, Z. Liu, and R. A. Porto, “Dynamics of binary systems to fourth Post-Minkowskian order from the effective field theory approach,” http://dx.doi.org/10.1016/j.physletb.2022.137203Phys. Lett. B 831 (2022) 137203, http://arxiv.org/abs/2106.08276arXiv:2106.08276 [hep-th]. Mougiakakos:2022sic S. Mougiakakos, M. M. Riva, and F. Vernizzi, “Gravitational Bremsstrahlung with Tidal Effects in the Post-Minkowskian Expansion,” http://dx.doi.org/10.1103/PhysRevLett.129.121101Phys. Rev. Lett. 129 (2022) no. 12, 121101, http://arxiv.org/abs/2204.06556arXiv:2204.06556 [hep-th]. Riva:2022fru M. M. Riva, F. Vernizzi, and L. K. Wong, “Gravitational bremsstrahlung from spinning binaries in the post-Minkowskian expansion,” http://dx.doi.org/10.1103/PhysRevD.106.044013Phys. Rev. D 106 (2022) no. 4, 044013, http://arxiv.org/abs/2205.15295arXiv:2205.15295 [hep-th]. Heissenberg:2022tsn C. Heissenberg, “Angular Momentum Loss Due to Tidal Effects in the Post-Minkowskian Expansion,” http://arxiv.org/abs/2210.15689arXiv:2210.15689 [hep-th]. Dlapa:2022lmu C. Dlapa, G. Kälin, Z. Liu, J. Neef, and R. A. Porto, “Radiation Reaction and Gravitational Waves at Fourth Post-Minkowskian Order,” http://arxiv.org/abs/2210.05541arXiv:2210.05541 [hep-th]. Damour:2020tta T. Damour, “Radiative contribution to classical gravitational scattering at the third order in G,” http://dx.doi.org/10.1103/PhysRevD.102.124008Phys. Rev. D 102 (2020) no. 12, 124008, http://arxiv.org/abs/2010.01641arXiv:2010.01641 [gr-qc]. >>
http://arxiv.org/abs/2303.07361v1
20230313180001
Static Black Binaries in de Sitter
[ "Oscar J. C. Dias", "Gary W. Gibbons", "Jorge E. Santos", "Benson Way" ]
gr-qc
[ "gr-qc", "astro-ph.HE", "hep-th" ]
APS/123-QED ojcd1r13@soton.ac.uk STAG research centre & Mathematical Sciences, University of Southampton, Highfield Campus, UK gwg1@maths.cam.ac.uk DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, UK jss55@cam.ac.uk DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, UK benson@icc.ub.edu Departament de Física Quàntica i Astrofísica, Institut de Ciències del Cosmos Universitat de Barcelona, Martí i Franquès, 1, E-08028 Barcelona, Spain We construct the first four-dimensional multi-black hole solution of general relativity with a positive cosmological constant. The solution consists of two static black holes whose gravitational attraction is balanced by the cosmic expansion. These static binaries provide the first four-dimensional example of non-uniqueness in general relativity without matter. Static Black Binaries in de Sitter Benson Way March 30, 2023 ================================== Introduction. Black holes are famously featureless. This idea is embodied by the no-hair theorems, which state in essence that stationary black holes are uniquely characterized by their mass, angular momentum, and charge <cit.>. It should be noted that there are many situations where black hole uniqueness, as we have expressed it, is known to be violated. A well-known example involves multi-horizon configurations of charged, extremal black holes <cit.>. Other examples include higher dimensions <cit.>, anti-de Sitter asymptotics <cit.>, or exotic matter like classical Yang-Mills fields, complex scalars and Proca fields <cit.>. Additionally, there are some mathematical gaps in fully establishing black hole uniqueness, even in the more limited case of four-dimensional pure gravity in flat space. Indeed, asymptotically flat multi-Kerr black holes, where their gravitational attraction might be balanced by spin-spin interactions, have not been ruled out (see e.g. <cit.> for attempted constructions that yield singular configurations). Though for static solutions, a classic theorem due to <cit.> precludes the existence of regular asymptotically flat multi black holes. Despite these (and potentially more) counterexamples, there is currently no experimental or observational evidence that black hole non-uniqueness can be realized in astrophysical or cosmological contexts. Indeed, the no-hair theorems are fully consistent with observational results from the LIGO consortium <cit.>. However, the no-hair theorems assume that spacetime is asymptotically flat, a feature which is violated in our universe at the longest scales by the presence of a cosmological constant <cit.>. The resulting cosmic expansion might balance out the gravitational attraction of two or more black holes, allowing multiple black holes to exist in static equilibrium. Such a configuration would share the same mass and angular momentum as some single-horizon black hole and therefore serve as a more realistic counterexample to black hole uniqueness. The aim of this Letter is to demonstrate that such a multi-horizon configuration indeed occurs within general relativity. We will focus on the simplest case with two equal-mass black holes that do not rotate nor contain charge, but our results and methods can be straightforwardly generalized. We will first show that these black binaries can be anticipated using intuition from Newton-Hooke theory, and then construct these solutions by solving the Einstein equation numerically. Finally, we study the properties of these binaries in detail. Our results, along with physical intuition, suggest that the static de Sitter binaries are dynamically unstable. Nevertheless, there remains a possibility that they can be stabilized with the introduction of charge or angular momentum. We will comment on this and other matters in the conclusions. Before we continue, we mention some closely related work. Dynamical (i.e. out of equilibrium) multi-black holes in Einstein-Maxwell theory with a positive cosmological constant were found in <cit.>. The “rod-structure" corresponding to our static binaries were anticipated and examined in detail in <cit.>. In <cit.>, a novel mechanism for balancing multi-black holes was proposed. These constructions provide Ricci-flat, closed-form solutions for static binaries supported by expanding bubbles of nothing. Mechanically, these solutions behave similarly to the static binaries we find. Finally, we mention the mathematical papers <cit.>, which might seem to rule out the existence of static black binaries in de Sitter. We will show that the assumptions made in <cit.> do not apply, and that (for technical reasons) this conclusion from <cit.> is not correct. Newton-Hooke. Let us first set out to see if the aforementioned multi-black hole configurations are allowed within Newtonian gravity. We adopt geometrized units in which c=G=k_B=ħ=1. Consider a configuration of N black holes with masses m_a, with a=1,…,N. For the Newtonian approximation to be valid, we assume that the distances between the black holes are much larger than their masses. We now include the effects of the cosmological constant Λ≡ 3/ℓ^2>0, where ℓ is the de Sitter length scale. Accordingly, we assume that the entire configuration of black holes lies within a distance much smaller than ℓ and consider the Newton-Hooke equations of motion <cit.> m_a d^2𝐱_a/dt^2-m_a 𝐱_a/ℓ^2=-∑_b≠ a^b=N m_a m_b(𝐱_a-𝐱_b)/|𝐱_a-𝐱_b|^3 , where 𝐱_a are the positions of the black holes. Static solutions exist when 𝐱_a/ℓ^2=∑_b≠ a^b=N m_b(𝐱_a-𝐱_b)/|𝐱_a-𝐱_b|^3 . Such solutions are known as central configurations and provide homothetic solutions of the Newtonian N-body problem which has applications to Newtonian cosmology. The equation (<ref>) can also be obtained from the Dmitriev-Zeldovich equations <cit.> by using the scale factor S(t) = e^t/ℓ, corresponding to a de Sitter background in “stead-state" coordinates <cit.>. Consider a central configuration with two equal mass black holes aligned along the z axis and separated by a distance d. That is, N=2, 𝐱_1=-𝐱_2=d/2 𝐞_z, and m_a=m_b=M. Then (<ref>) imposes d^3/ℓ^3=r_+/ℓ where r_+≡ 2M is the Schwarzschild radius. The requirements that the Newton-Hooke approximation should be valid and that the black holes are inside a single cosmological event horizon amount to r_+≪ d , d≪ℓ and r_+≪ℓ . If the distance between the black holes is given as in (<ref>), then we see that the first two conditions above are satisfied if we assume the third, i.e. if the black holes are small enough. We therefore conclude that static de Sitter binaries with small black holes are consistent with Newton-Hooke theory. For later use, we introduce the event horizon Hawking temperature T_+= (4 π r_+)^-1 and rewrite (<ref>) as d/ℓ = 1/(4 πℓ T_+)^1/3 . We will confirm that our numerical solutions to the Einstein equation satisfy this scaling in the appropriate limit. Numerical construction. We now construct static binaries in general relativity by numerically solving the Einstein equation with a positive cosmological constant: R_ab=3/ℓ^2 g_ab , where R_ab is the Ricci tensor and g_ab is the metric tensor. We use the DeTurck method, first introduced for general relativity in <cit.> and reviewed in <cit.>. This method provides a convenient way of addressing the issue of gauge invariance, which ultimately causes the Einstein equation (<ref>) to yield a set of ill-posed, non-elliptic PDEs. The DeTurck method involves choosing any reference metric g̅ with the same symmetries and causal structure as the solution we seek. In this case, our reference metric is static, contains two identical black holes, a cosmological horizon, and is axisymmetric. There is therefore a discrete ℤ_2 symmetry, as well as two Killing vector fields k=∂/∂ t and m=∂/∂ϕ. We further assume that the black holes and cosmological horizon are Killing horizons generated by k. Our specific choice of reference metric involves a combination of the Israel-Khan solution <cit.> and the static patch of de Sitter space. Its design is detailed in the Supplementary Material. We then write down the most general metric ansatz g that respects the desired symmetries and causal structure. In this case, the metric ansatz depends non-trivially on two coordinates (i.e. it is cohomogeneity-two, and will yield two-dimensional PDEs). We then solve the Einstein-DeTurck equation R_ab-∇_(aξ_b)=3/ℓ^2g_ab , where ξ^a ≡ g^bc[Γ^a_bc(g)-Γ^a_bc(g̅)], and Γ(𝔤) is the metric-preserving Christoffel connection associated to a metric 𝔤. Unlike the Einstein equation, the Einstein-DeTurck equation (<ref>) yields a set of elliptic PDEs <cit.>, which gives a well-posed boundary-value problem with appropriate physical boundary conditions. The Einstein-DeTurck equation (<ref>) is solved numerically. One complication is that the integration domain contains five boundaries: the ℤ_2 reflection surface, two disconnected symmetry axes, the black hole horizons, and the cosmological horizon. We handle this domain using patching techniques. This and other numerical methods we use are described in <cit.> and detailed in the Supplementary Material. After solving (<ref>), we must verify that the solution actually solves the Einstein equation, i.e. that ξ=0, and is therefore not a Ricci soliton (for which ξ≠0). Under many circumstances <cit.>, it can be proved that these unwanted Ricci solitons do not exist. Unfortunately, the present case is not one of these circumstances. Indeed, with a positive cosmological constant, Ricci solitons are known to exist (see e.g. <cit.>). Nevertheless, ellipticity guarantees local uniqueness. That is, solutions with ξ=0 cannot be arbitrarily close to solutions with ξ≠0, and thus the norm ξ^aξ_a can be monitored to identify whether our numerical discretization converges in the continuum to a Ricci soliton or to a true solution of the Einstein equation. In the Supplementary Material, we provide ample evidence that the numerical solutions we construct are not Ricci solitons. Results. Having numerical solutions corresponding to static black binaries in de Sitter, we can now describe their properties and compare the numerical results to Newton-Hooke theory when the latter is valid. We expect to find agreement with Newton-Hooke theory when the black holes become sufficiently small, or alternatively, when the black hole temperature becomes sufficiently large T_+ ℓ≫ 1. In FIG. <ref>, we provide a log-log plot of the proper distance between the horizons of the two black holes along the symmetry axis 𝒫_ϕ/ℓ, as a function of temperature 4 π T_+ℓ. The solid black line is the scaling (<ref>), and the blue dots are the numerical data. The agreement at large values of T_+ℓ shows the validity of the Newton-Hooke analysis and corroborates our numerical construction. We have not managed to find solutions with large black holes (small 4π T_+ ℓ). Because our solutions do not have regions of large curvature, there might be a “turning point" to a new branch of solutions. A similar phenomenon occurs for localized Kaluza-Klein black holes when the black holes are large relative to the Kaluza-Klein circle <cit.>. We leave the exploration of this region of parameter space for future work. Let us now discuss black hole thermodynamics. For a central configuration containing N black holes inside the static patch of de Sitter, the covariant phase space formalism <cit.> shows that the following form of the first law of black hole mechanics holds ∑_i=1 ^NT^(i)_+ dS^(i)_+ = -T_c dS_c , where T_c is the temperature of the cosmological horizon, and S_c is its entropy (i.e horizon area). T^(i)_+ and S_+^(i) are the same quantities, respectively, for the i-th black hole. With N=2 and equal-mass black holes, we find 2 T_+ dS_+ = -T_c dS_c . We have checked that our data satisfies this form of the first law to within 0.01%. Following <cit.>, we now consider the entropy, which must increase during time evolution. The blue dots in FIG. <ref> show the entropy of the static binary as a function of the entropy S_c of the cosmological horizon. The black curve shows the entropy for the single Schwarzschild-de Sitter black hole (also known as the Kottler black hole). We see that for any given S_c, the single Schwarzschild black hole has higher entropy than the binary. This indicates that the binary can evolve towards the single black hole but not the other way around. The static black binary is therefore thermodynamically unstable. The fact that (at least) two solutions exist for a given cosmological horizon entropy implies that the Schwarzschild-de Sitter black hole is not unique. This is the first counterexample to the no-hair conjecture <cit.> for pure gravity with a positive cosmological constant. We now comment on the uniqueness theorems for de Sitter black holes <cit.> which would, under certain assumptions, rule out the existence of static de Sitter binaries. In <cit.>, the level sets of the lapse function N≡√(-g_tt) are assumed to be surface forming. In particular, this means that the level sets must consist only of 2D surfaces. In <cit.>, the set MAX(N)={x∈ℳ:N(x)=N_max}, where N_max is the maximum value of N in the manifold ℳ, is assumed to disconnect ℳ into an inner region ℳ_- and an outer region ℳ_+ with the same virtual mass. Our static binaries do not satisfy either of these assumptions. Indeed, in FIG. <ref> we show the level sets N in our domain of integration for a typical solution (all of our solutions show the same qualitative behavior). The coordinates (r,z) are defined in the Supplemental Material. The cosmological horizon is represented by the outer solid black semicircle, the two black hole horizons are marked by solid magenta lines along the horizontal axis, and the inner and outer axes are given by the dashed horizontal line. Finally, the green square marks the location of the maximum of N in ℳ. This maximum represents an S^1 on the manifold, which is not a 2D surface, and it also does not partition the manifold into two regions. Therefore, our static binaries fail to satisfy the assumptions in <cit.>. Finally, we comment on <cit.>. We believe that this work is not correct for a rather technical reason. Beginning with the Schwarzschild-de Sitter black hole, the authors in <cit.> argue that they can construct an asymptotically flat metric that is conformal to the original one, is topologically S^1× S^2 deprived of one point, and has zero ADM mass. If that were true, the rigidity statement in the positive mass theorem <cit.> would not only imply that the original metric is conformally flat, but also that S^1× S^2 with one point removed is diffeomorphic to ℝ^3, which is impossible. Conclusions. We constructed the first example of a multi-black hole solution within general relativity with a positive cosmological constant and established that the leading behavior of these solutions agrees (for small black holes) with estimates from Newton-Hooke theory. Based on thermodynamic considerations, we argued that these solutions are thermodynamically unstable. Because the configuration requires a delicate balance between gravitational attraction and cosmic expansion, we expect these solutions to also be dynamically unstable. We have focused on the static configuration of two identical black holes, but our results and methods can be generalized. First, consider the case where the black holes have different masses. When one of the black holes is much smaller than the other, one can use the geodesic approximation to predict the existence of such a configuration. Indeed, one can easily confirm the existence of static orbits for timelike particles on a Schwarzschild-de Sitter black hole background, thus providing further evidence for the existence of this more general central configuration. Note that if <cit.> were correct, this asymmetric binary would also not exist. We can also include rotation, which will introduce spin-spin interaction of the black holes. This opens the possibility of continuous non-uniqueness. Consider, for example, the case with two identical black holes rotating in opposite directions along the axis of symmetry. This configuration will have vanishing total angular momentum, and will thus be in the same class as the Schwarzschild-de Sitter black hole. Work in this direction is underway. Perhaps more interestingly, because spin-spin interactions act on shorter length scales, they could provide a mechanism for stabilizing the binary. This possibility resembles the mechanism that provides stability for molecules. Work in this direction is underway. We could also consider central configurations containing N>2 static black holes in the static patch of de Sitter. These configurations can show interesting properties within the Newton-Hooke approximation. For instance, when N≥13, minimal energy central configurations do not lie on a regular polyhedron <cit.>. We thus expect the equivalent property within general relativity. The study of these configurations is within the reach of the numerical methods employed in this Letter. The authors would like to thank Stefano Borghini, Lorenzo Mazzieri and Ryan Unger for valuable discussions and correspondence regarding <cit.>. J. E. S. would like to thank Jay Armas and Troels Harmark for mentioning this interesting problem to him in 2012 at the 28th Pacific Coast Gravity Meeting, held at University of California, Santa Barbara and Don Marolf for discussions on the microcanonical properties of black holes contained inside the static patch of de Sitter. O. C. D. acknowledges financial support from the STFC “Particle Physics Grants Panel (PPGP) 2018" Grant No. ST/T000775/1. J. E. S. has been partially supported by STFC consolidated grant ST/T000694/1. B. W. would like to thank Roberto Emparan for fruitful discussions and acknowledges support from ERC Advanced Grant GravBHs-692951 and MEC grant FPA2016-76005-C2-2-P. The authors acknowledge the use of the IRIDIS High Performance Computing Facility, and associated support services at the University of Southampton, for the completion of this work. utphys-modified § SUPPLEMENTARY MATERIAL § THE ISRAEL-KHAN SOLUTION The Israel-Khan solution <cit.> is an exact solution that describes two asymptotically flat black holes separated by a conical strut. Because it is an exact multi-horizon solution, it will be useful for our numerical construction of static de Sitter binaries. Here, we review this solution and describe some of its coordinate representations that we use. Aside from the conical strut, the Israel-Khan spacetime is completely regular outside the horizons. Here, we are only concerned with the case where both black holes are equal. The solution is often presented in Weyl coordinates: s^2=ℓ^2[-f t^2+λ^2/f[h( r^2+ z^2)+r^2ϕ^2]] , where f=(k(R_++r_+)-(1-k)/k(R_++r_+)+(1-k))(k(R_-+r_-)-(1-k)/k(R_-+r_-)+(1-k)) , h =(r^2+(z+1/k)(z+1)+R_+r_+/2R_+r_+)(r^2+(z-1/k)(z-1)+R_-r_-/2R_-r_-) ×(r^2+z^2-1+r_+r_-/r^2+(z-1/k)(z+1)+r_+R_-)(r^2+z^2-(1/k^2)+R_+R_-/r^2+(z+1/k)(z-1)+R_+r_-) , with R_±=√(r^2+(z±1/k)^2) , r_±=√(r^2+(z±1)^2) , and where ℓ is an arbitrary length scale that we have introduced for later use in de Sitter. The solution is parametrized by λ∈(0,∞) and k∈(0,1). The temperature of the black holes is given by T = 1/2π4λ(1-k)/k(1+k) . A peculiarity of the Weyl form is that the axes and horizons of the solution are all located at r=0, and so is described as a “rod structure." At r=0, the horizons lie in the regions z∈ (1,1/k) and z∈ (-1/k,-1), with the inner axis between the black holes in the region z∈(-1,1), and the outer axes in z∈(1/k,∞) and z∈(-∞,-1/k). The inner axes contains a conical singularity which holds the two black holes apart. The Weyl form is useful for obtaining this solution as it provides a means of simplifying the Einstein equation into an integrable form. But in order to accommodate the rod structure, the coordinates cannot be smooth along the line r=0 (there are coordinate singularities at the “joints" between rods), making the Weyl form ill-suited for our numerical purposes. We therefore seek a coordinate transformation that maps the outer axes, inner axis, and horizons into a coordinate rectangle. This can be accomplished by a conformal Schwarz-Christoffel transformation. The standard formulas for this type of transformation will give mappings that use Jacobi Elliptic functions, but here we convert these functions to a more algebraic form. The mappings we use are defined by z=x√(2-x^2)√((1-y^2)^2+k^2y^2(2-y^2))/(1-y^2)^2+k^2x^2(2-x^2)y^2(2-y^2) , r=(1-x^2)√(1-k^2x^2(2-x^2))y√(2-y^2)(1-y^2)/(1-y^2)^2+k^2x^2(2-x^2)y^2(2-y^2) . Lines of constant x and y, along with the rod structure of Israel-Khan are shown in FIG. <ref>. With this coordinate transformation, the Israel-Khan solution takes the form s^2=ℓ^2{-f t^2+λ^2/m^2 Δ_xy^2[w^2(4 x^2/(2-x^2)Δ_x+4 y^2/(2-y^2)Δ_y)+y^2(2-y^2)(1-y^2)^2ϕ^2]} , where in these coordinates f=(1-x^2)^2Δ_x m^2 and Δ_x=1-k^2x^2(2-x^2) , Δ_y=1-(1-k^2)y^2(2-y^2) , Δ_xy=(1-y^2)^2+k^2x^2(2-x^2)y^2(2-y^2) , w=k/(1+k)^2(1+√(Δ_y))^2 , m=k[1-(1-k)y^2(2-y^2)+√(Δ_y)]/(1-k)Δ_x(1-y^2)^2+(k+√(Δ_y))[Δ_x+(1-k)(√(Δ_xy)-1)] . The horizons are at x=± 1, the inner axis is at y=0, and the outer axes are at y=1. There is also a ℤ_2 symmetry about x=0. All functions Δ_x, Δ_y, w, and m are smooth and positive definite in the domain. Δ_xy vanishes at (x,y)=(0,1) (asymptotic infinity), and is positive and smooth otherwise. Eventually, we wish to join the Israel-Khan solution with a de Sitter horizon. In anticipation of doing so, we present the Israel-Khan solution in polar-Weyl coordinates defined by z=ρξ√(2-ξ^2) , r=ρ(1-ξ^2) , where the Israel-Khan solution takes the form s^2=ℓ^2{-f t^2+λ^2h/f[ρ^2+ρ^2(4ξ^2/2-ξ^2+(1-ξ^2)^2/hϕ^2)]} , with f and h also transformed accordingly. For later use, we find it convenient to express f and h as functions of ρ and z=ρξ√(2-ξ^2): f=(k(R_++r_+)-(1-k)/k(R_++r_+)+(1-k))(k(R_-+r_-)-(1-k)/k(R_-+r_-)+(1-k)) , h =(ρ^2+1k[1+(1+k)z]+R_+r_+/2R_+r_+)(ρ^2+1k[1-(1+k)z]+R_-r_-/2R_-r_-) ×(ρ^2-1+r_+r_-/ρ^2-1k[1+(1-k)z]+r_+R_-)(ρ^2-(1/k^2)+R_+R_-/ρ^2-1k[1-(1-kz)]+R_+r_-) , with R_±=√(ρ^2+1/k^2±2z/k) , r_±=√(ρ^2+1±2z) , Note that h and f approach unity when ρ→∞, where the spacetime becomes asymptotically flat. From (<ref>) and (<ref>), we can derive an explicit coordinate transformation between the Schwarz-Christoffel (x,y) coordinates and the polar-Weyl (ρ,ξ) coordinates: ρ =√(y^2(2-y^2)+x^2(2-x^2)(1-y^2)^2)/√((1-y^2)^2+k^2x^2(2-x^2)y^2(2-y^2)) , ξ =√(1-(1-x^2)y√(2-y^2)(1-y^2)√(1-k^2x^2(2-x^2))/√(y^2(2-y^2)+x^2(2-x^2)(1-y^2)^2)√((1-y^2)^2+k^2x^2(2-x^2)y^2(2-y^2))) . Like the original Weyl coordinates, these polar-Weyl coordinates are not smooth along ξ=± 1. This will not be an issue for us as we will only use these coordinates in our numerical construction for sufficiently large ρ, where the coordinates are smooth. § DESIGNING THE REFERENCE METRIC FOR EINSTEIN-DETURCK Our strategy for designing a reference metric for the Einstein-DeTurck problem (described in the main text) is to attach a de Sitter horizon to the Israel-Khan solution. De Sitter space in four dimensions is most commonly written in the form s^2=-(1-R^2/ℓ^2)τ^2+ R^2/1-R^2/ℓ^2+r^2(θ^2+sin^2θϕ^2) , where ℓ is the de Sitter length scale. De Sitter can also be written in isotropic coordinates with the transformation R/ℓ=λρ/1+λ^2ρ^2/4 , sinθ=1-ξ^2 , τ=ℓ t , which yields s^2=ℓ^2/g_+^2{-g_-^2 t^2+λ^2[ρ^2+ρ^2(4ξ^2/2-ξ^2+(1-ξ^2)^2ϕ^2)]} , where g_±=1±λ^2ρ^2/4 . In these coordinates, the de Sitter horizon has a constant temperature of 1/2π. λ is a gauge parameter that merely scales the radial coordinate ρ. There is an origin at ρ=0, the de Sitter horizon is located at ρ=2/λ, there is an axis of symmetry at ξ=±1 and a ℤ_2 symmetry at ξ=0. This form of de Sitter is suggestively close to the Israel-Khan solution in polar-Weyl form (<ref>). Aside from some factors of f and h (which approach unity at large ρ), the only differences are that de Sitter in isotropic coordinates has an overall conformal factor of 1/g_+^2 and a factor of g_-^2 in the t^2 term whose zero defines the de Sitter horizon. We will make use of these similarities in our construction. Now to begin engineering a reference metric, we make some slight modifications to the Israel-Khan solution (<ref>) and (<ref>): s^2_ref =ℓ^2/g_+^2{-fg_-^2 F t^2+λ^2/m^2 Δ_xy^2[w^2(4 x^2/(2-x^2)Δ_x+4 y^2/(2-y^2)Δ_y)+y^2(2-y^2)(1-y^2)^2Sϕ^2]} =ℓ^2/g_+^2{-fg_-^2 F t^2+λ^2h/f[ρ^2+ρ^2(4ξ^2/2-ξ^2+(1-ξ^2)^2/hSϕ^2)]} . Here, S=1-α(1-y^2)^2 , where α is a new parameter, F is a complicated function that we will describe later in (<ref>), and equality between the first and second lines of (<ref>) (here and in the remainder of this section) is understood to be through the coordinate transformation (<ref>). We will use (x,y) coordinates in the region near the black holes and inner axis, and the (ρ,ξ) coordinates near the cosmological horizon. We only made three changes to the Israel-Khan solution to arrive at the reference metric (<ref>). The first is the inclusion of a conformal factor 1/g_+^2 to facilitate the matching to de Sitter. The second is a factor of S in the ϕ^2 term, which we will use to remove the conical singularity in the inner axis by adjusting the parameter α. The conical singularity is removed when α takes the value α =(1-k)^2 (k^2+6 k+1)/(k+1)^4 . The last change is a factor of g_-^2 F in the t^2 term which introduces a cosmological horizon. We have freedom to choose the function F, but the choice is a delicate matter. For numerical purposes, we wish for F to be smooth in (x,y) or (ρ,ξ) coordinates, depending on where the coordinates are being used. The DeTurck method also requires that F be chosen to preserve the regularity of both the cosmological horizon and of the black hole horizons <cit.>. That is, F must be positive definite and satisfy F|_x=±1=1/g_-^2|_x=± 1 , F|_ρ=2/λ=h/f^2|_ρ=2/λ , where we have chosen equality in the above instead of proportionality in order to preserve the de Sitter and Israel-Khan temperatures. In order to make it easier to find a solution in a Newton-Raphson algorithm (see e.g. <cit.>), we should also choose F to match physical expectations in certain limits. Specifically, we expect that when the cosmological horizon is large compared to other length scales (i.e. λ≪1), the spacetime near the cosmological horizon should approach de Sitter and the spacetime closer to the origin should be approximately described by the Israel-Khan solution (when α=0). The cosmological horizon is already accommodated by the fact that f and h approach unity for large ρ. That is, by requiring (<ref>), we already have F≈1 near the cosmological horizon ρ≈2/λ when λ is small. As for near the origin, we add the requirement that F|_y=0=1/g_-^2|_y=0 , which is consistent with (<ref>). If we set α=0, then when λ and ρ are small, g_±≈ 1, and the metric approaches that of the Israel-Khan solution as desired. All of these requirements can be satisfied by choosing F to take the form F=G/f+g_-^2G-fg_-^2G , with G=ĥf̂(1-x^2)y^2(2-y^2)+g_-^2/(1-x^2)y^2(2-y^2)+g_-^4 , where f̂ and ĥ are any smooth, positive definite functions that agree with f and h, respectively at ρ=2/λ. To choose f̂ and ĥ, we first take the expressions for f and h as written in (<ref>) and (<ref>), and treat them as functions f(ρ,z) and h(ρ,z). We then set f̂(ρ,ξ)=f(2/λ,ρξ√(2-ξ^2)) and similarly for ĝ. Note that we cannot use a choice like f̂(ρ,ξ)=f(2λ,2λξ√(2-ξ^2)) as it is not smooth in the (x,y) coordinates at x=0,y=1. The entire Einstein-DeTurck reference metric is parametrized by k, λ, and α. On the desired solution that is free of conical singularities, α is fixed according to (<ref>). Because the de Sitter horizon temperature is held fixed, the only remaining physical parameter is the black hole horizon temperature, which is given by (<ref>). Any k and λ that give the same black hole temperature are physically equivalent. To collect all our numerical data, we have fixed λ=1/10 and used k to parametrize our solutions. We have tried different values of λ, but after trial and error, this value generated the best numerical results. § PATCHING AND NUMERICAL METHODS In this section we explain how we partition the domain of integration using patching techniques (see e.g. <cit.>). As mentioned in the main text, the solution we seek contains five boundaries: the inner axis (∂_ϕ^ in), the black hole horizon (ℋ^+), the outer axis (∂_ϕ^ out), the cosmological horizon (ℋ^c) and the plane of ℤ_2 symmetry. We numerically solve the Einstein-DeTurck equations with the boundary conditions of regularity at each of our five boundaries. To do so, we use both the coordinates (ρ,ξ) and (x,y) of the preceding section. Near the black hole event horizon we use (x,y) coordinates, while near the cosmological horizon we use (ρ,ξ) coordinates. We used a total of three patches - I, II and III - with each of these having four boundaries: see FIG. <ref>. Patches I and II are defined in (x,y) coordinates, and patch III in (ρ,ξ) coordinates. The patching boundary between the patch I and II (dashed line in FIG. <ref>) is given by x=x_0 y√(2-y^2), with y∈(0,1). The patching boundary between patch II and patch III is simply given by ρ=ρ_0. Furthermore, we fix ρ_0 and x_0 through ρ_0=2/3(2/λ-1/k)+1/k and x_0=1/2(1-√(1-√(1-1/k^2 ρ _0^2)))+√(1-√(1-1/k^2 ρ _0^2)) , so that the only free parameters are k,λ, and α. Note that for non-singular solutions we require α to be given by (<ref>) and, as described in the end of the previous section, we fix λ=1/10 for numerical convenience. We now apply the numerical methods detailed in <cit.>, and discretize each of our patches on a N× N Chebyshev-Gauss-Lobatto grid using transfinite interpolation and pseudospectral collocation, for a total grid size of (N+N+N)× N. The discretized Newton-Raphson equation reduces to an iteration of linear matrix problems, which we solve by LU decomposition. To find the first solution (which is always the trickiest step of the Newton-Raphson method), we have set λ = 1/10, k=1/2 and used a Newton-Raphson algorithm with a judiciously chosen damping factor. Additionally, we used what we call the “δ-trick" as explained in section VII.A of <cit.>. § CONVERGENCE TESTS In this section, we show that the norm χ≡ξ^a ξ_a of the DeTurck vector vanishes in the continuum limit, as expected for a solution of the Einstein-DeTurck equation that is not a Ricci soliton (i.e. that is instead a true solution to the Einstein equation). Additionally, we find exponential convergence, which is consistent with the use of pseudospectral collocation methods. Let χ^(N) be χ computed on a (3-patched) grid with (N+N+N)× N spectral collocation points. For concreteness we take k=1/2, λ=1/10 and α as given in (<ref>). In FIG. <ref> we show ‖χ^(N)‖_∞ as a function of N in a log-plot. The solid black line shows the best χ^2-fit to a straight line in the log-plot, and yields f(N)=27.89409 - 0.79076 N . The exponential trend is clear and confirms that the Einstein-DeTurck solution is converging to a true solution of the Einstein equation (and not to a Ricci soliton).
http://arxiv.org/abs/2303.06652v1
20230312125429
Interpreting Hidden Semantics in the Intermediate Layers of 3D Point Cloud Classification Neural Network
[ "Weiquan Liu", "Minghao Liu", "Shijun Zheng", "Cheng Wang" ]
cs.CV
[ "cs.CV" ]
wqliu@xmu.edu.cn Xiamen University Xiamen China 361005 23020191153186@stu.xmu.edu.cn Xiamen University Xiamen China 361005 zhengshijun@stu.xmu.edu.cn Xiamen University Xiamen China 361005 cwang@xmu.edu.cn Xiamen University Xiamen China 361005 Although 3D point cloud classification neural network models have been widely used, the in-depth interpretation of the activation of the neurons and layers is still a challenge. We propose a novel approach, named Relevance Flow, to interpret the hidden semantics of 3D point cloud classification neural networks. It delivers the class Relevance to the activated neurons in the intermediate layers in a back-propagation manner, and associates the activation of neurons with the input points to visualize the hidden semantics of each layer. Specially, we reveal that the 3D point cloud classification neural network has learned the plane-level and part-level hidden semantics in the intermediate layers, and utilize the normal and IoU to evaluate the consistency of both levels' hidden semantics. Besides, by using the hidden semantics, we generate the adversarial attack samples to attack 3D point cloud classifiers. Experiments show that our proposed method reveals the hidden semantics of the 3D point cloud classification neural network on ModelNet40 and ShapeNet, which can be used for the unsupervised point cloud part segmentation without labels and attacking the 3D point cloud classifiers. [500]Computing methodologies Computer vision [300]Theory of computation Theory of computation [100]Networks Network design principles, Network reliability Interpreting Hidden Semantics in the Intermediate Layers of 3D Point Cloud Classification Neural Network Cheng Wang* =========================================================================================================== § INTRODUCTION Nowadays, deep neural network (DNN) models have outstanding performance in various tasks, especially classification problems. However, the classifier acts as a black box, and it is not clear what the black box learns inside. Containing obscure features with high dimensions, it is difficult to understand the decision basis and process of 3D point cloud DNNs. The obscurity impedes the manipulation and promotion of DNNs, so interpreting what the DNNs learn inside has become an important research field. Currently, interpreting the hidden semantics of DNNs give a deeper insight into such a black box. As an intuitive, effective and comprehensive interpretation, hidden semantics shows the activation of neurons or layers inside the network, and associate the activation with the entities, such as lines, surfaces or parts of the input instance. The explicit hidden semantics clarifies the meaning of each neuron and layer, which helps to strengthen the trust of human beings for the network<cit.>, clarify the decision-making path of the network <cit.>, diagnose the disentangled representation of the network <cit.>, and promote the researches in other fields, such as transfer learning <cit.>, semi-supervised learning <cit.>. Interpreting hidden semantics is associating the abstract concepts with the activation of some hidden neurons or layers <cit.>, driven from grandmother cell hypothesis<cit.>. It hypothesizes that the grandmother cell, "a hypothetical neuron that represents a complex but specific concept or object" is activated when a person "sees, hears, or otherwise sensibly discriminates" <cit.> a specific entity, such as their grandmother. Similarly, the interpretation of hidden semantics is to build the relation between the activation of neurons or layers and some kind of entities. The most direct way to interpret the hidden semantics is by visualizing what the neuron or layer is "looking for" with a saliency map, as shown in Figure <ref>. Although there is some interpretable works on 2D image classifier, it lacks complete research on 3D point cloud classifier. <cit.> showed the corner points contribute more to the classification output, but ignored the interpretation for the intermediate layers, which is the key to open the network black box and represent the learning process of each layer. Besides, current researches are impeded by the unsystematic evaluation criteria for interpretability. <cit.> evaluated the interpretability on internal and external consistency, however, both of them only focus on the max-pooling layer, ignoring a large number of convolutional layers, which is crucial for interpretation. In this case, we study on the interpretation and evaluation of hidden semantics in 3D point cloud classifier intermediate layers. In this paper, we propose Relevance Flow to interpret the hidden semantics of each intermediate layer. Inspired by LRP <cit.> and FLOWN <cit.>, we construct a path from output to the input, allowing the Relevance, a value decomposed from the prediction, flows backward, so each activated neurons related to the prediction has a Relevance value. We firstly group the neurons with Relevance value and associate the grouped neurons in same layer to the input points, then visualize the result of each intermediate layer using saliency map. Specifically, from the saliency map, we find the plane-level and part-level salient region of hidden semantics appear at intermediate layer in 3D point cloud classifier consistently. We propose utilizing the variance of the salient points normals and the point intersection over union (IoU) of the salient points to evaluate the consistency on the intermediate layers. In addition, to represent the application of 3D point cloud hidden semantics, we part the segmentation of 3D point cloud sample in an unsupervised manner. We train the 3D point cloud classifiers with class labels only, and use the consistent plane and part level hidden semantics to construct part detector and realize part segmentation. Besides, we generate the adversarial samples by moving the salient regions of hidden semantics to attack 3D point cloud classifiers. Experimental results show that our proposed method reveals the the hidden semantics of intermediate layer in 3D point cloud classifier. We conduct the experiments with PointNet<cit.>, PointNet++<cit.>, and PointConv<cit.> framework on the ModelNet10<cit.> and ModelNet40 <cit.> datasets. We also evaluate both plane-level and part-level hidden semantics of the intermediate layers in PointNet++ on ModelNet40 and ShapeNet<cit.> datasets. Besides, experiments show that our method achieves the 71.3% mIoU on the ShapeNet part dataset, and the attack success rate of PointNet is the highest, followed by PointConv and PointNet++. Our contributions are as follows: * We propose Relevance Flow to interpret the hidden semantics of the intermediate layer in 3D point cloud classification neural networks. * We propose the plane-level and part-level criteria to evaluate the consistency of the hidden semantics, which qualitatively descripts the interpretability of the 3D point cloud classification neural networks. * Experiments show that the interpreted hidden semantics can be employed for unsupervised part segmentation task and adversarial sample generation task. § RELATED WORK §.§ Interpretation of 2D image classifiers The interpretation of 2D image classifiers usually based on attribution, hidden semantics and decision. Attribution studies the impact of the input on the prediction, and uses a saliency map, a mask of the same size of the input image, to visualize the contribution value of the pixels.  <cit.> used the gradient value as the basis of the score, and back propagate it from the output.  <cit.> transformed the gradient value to get better performance. These type of methods are easy for people to understand, but lack of the analysis on the network itself. Hidden Semantics aims to explore the activation of the hidden neurons and layers. To explore the hidden semantics in 2D image classifiers, the most direct way is visualizing the semantics appeared in the neurons by training the input image. <cit.> visualized the appearance that maximized the activation of the given neurons. <cit.> refined the appearance into edges, textures, patterns, parts and objects. Due to the severe deformation, the appearance is unrecognizable for human beings. Instead of training the input images, <cit.> preserved readability in some way by blurring the input image, but it is still not intuitive. <cit.> is an activation method to show the explicit semantics by masking the filters, and <cit.> gave the application about the semantics. However, both of them rely on the interpretability of the original network. Decision represents the decision path of the 2D image classifiers, usually by graph<cit.> or decision tree <cit.>. <cit.> proposed the method visualizing the saliency map of each layers by constructing an activation path from the output to the input, and constructed the decision path. Compared with other methods based on decision, <cit.> is relatively simple, and shows the semantics of the hidden layers, which is easy to understand for human beings. Inspired by it, we propose the Relevance Flow to interpret the hidden semantics of the 3D point cloud classifiers. §.§ Interpretation for 3D point cloud classifiers At present, there are few works interpreting the 3D point cloud classification neural networks. <cit.> analyzed the sensitivity of the network to the input 3D point cloud based on the gradient value. It points out that the network pays more attention to corner points, but the conclusion is only at the input level and lacks inter-layer research. Although <cit.> defined the inter and outer consistency for 3D point cloud classification neural network, but it lacks an in-depth interpretation to answer what have been learned in the intermediate layers and how the network makes its decision. In this paper, we explore the answer by interpreting the hidden semantics in the intermediate layers. In addition, to test the vulnerability of 3D point cloud classifiers, PointGuard<cit.> attacked the network by adding, deleting, and modifying the input points. However, it requires a lot of calculations on looking for the modified points, and the principle is relatively complicated, which is not suitable for real application. <cit.> used Shaply Value to study the sensitivity of the network to the input regions, which is more intuitive and concise than PointGuard, but it mainly focuses on the single sample, lack of quantified research on the class-level, such as which category is more likely to be attacked. § METHOD §.§ Overview Hidden semantics is designed to associate abstract concepts with the activation of some hidden neurons <cit.>, described in mathematical language as r: act(x; θ) ∼ x where x is the input, and act(x; θ) represents the activation of the neurons or layers in the network. ∼ denotes the association between the activation and input, and r means the consistency of the association. We manifest the interpreted hidden semantics of each intermediate layer of 3D point cloud classifier by saliency map, as shown in Figure <ref>. Sample operation samples the input data as X_center = s(X), where the input data of size N × d denoted as X={x_1, x_2, ⋯, x_n}∈ R^N, and X_center means the sampled data with the size of C × d, where C represents the number of sampling. Group operation combines the center and its neighbors, so that the data is divided into several local regions. It conducts as X_c^' = g (X_center, X_c), where X_c = {x_c^1, x_c^2, ⋯, x_c^K}, and K is the number of neighbors. For each of the x_c^k ∈ X_c, g conducts as x_c^k-x_center. Conv operation convolves each Group separately as H_c = h (X_c^'), where the size of H_c is K × d^', and d^' depends on the depth of the convolution. Moreover, h concerns three operations: conv1D, conv2D, conv3D. Pooling operation compress all the data in each group and use less data for representation, following X^' = p (H_c), where x^' with the size of d^'. The operations above are concluded as X^' = p ( h ( g(s(X),X) )), which conducted by a trained 3D point cloud classifier. Our method is also applicable to other modules of the 3D point cloud neural network, such as T-Net<cit.> and Attention module<cit.>. In order to demonstrate the principle of the method, we take the PointNet++ module as an example to illustrate. §.§ Relevance Flow As shown in the Figure <ref>, the path constructed by the red arrow represent a process that Relevance flows from output to input. At first, we decompose the prediction into a vector as the manner of LRP<cit.> (decomposing the prediction of a deep neural network down to the relevance scores, which is a [0,1,0,0] vector, and only the position where the predicted value is largest with value 1, the rest are 0). Then starting from the output layer, the Relevance flows to the activated neurons in the previous layer FC (Fully Connected Layer) as the back propagation manner, but the propagated value is no longer the gradient (The propagated value is calculated with the formula detailed in the following paragraphs). Finally, the activated neurons relevant to the prediction have the Relevance value in FC layer. By analogy, the Relevance flows at input layer, and all activated neurons related to the predict have Relevance value. The Relevance value between the activated neurons and output prediction is represented as R. If the R value of a neuron is larger, it means that the neuron is more related to the output prediction. The R is calculated with the formula: R_i = ∑_0^ja_iw_ij/∑_0^ia_iw_ijR_j where a_i is the activation value of the neuron_i, and w_ij is the weight of the neuron_i to the neuron_j in next layer. R_i is the relevance value of the neurons in current layer, and R_j is the relevance value of the neurons in next layer. ∑ means the current relevance of the activated neurons relies on all the activated neurons related to it. The w_ij is further described in the following paragraphs. For a trained 3D point cloud classifier, the formulas of Relevance Flow are as follows: In Sample operation, showing in the Figure <ref>, w_ij=1, so R_i = R_j In Group operation, the grouped data is related to the value of center and the value of itself before grouping, with the condition a_i-a_center=a_j, the weight of a_i to a_j is 1, and the weight of a_center to a_j is -1. So the formula is R_i = ∑_0^ja_center/a_center-a_iR_j In Conv operation R_i = ∑_0^ja_iw_ij/∑_0^ia_iw_ijR_j Maxpooling can be regarded as a fully connected layer, only the pooled data weights 1, and the rest is 0, following R_i = { 0 , j ≠ index R_j , j = index . §.§ Evaluation of Hidden Semantics Through the saliency map of the interpreted hidden semantics, we find that there are plane-level and part-level hidden semantics appeared in the Intermediate layers of the 3D point cloud networks consistently. Therefore, in each of the layers separately, we ultimate the normals and IoU of the salient points to measure the consistence of the plane-level and part-level hidden semantics. To evaluate the consistency of the plane-level hidden semantics, we ultimate the normals of the salient points in the salient maps of each layer, following C_p = n_p/n_t n_p = 𝕀_var(N_i)<γ where n_p means the number of qualified objects, which measured by the variance of the salient point normals N_i with a thread τ. n_t is the number of the total object in the same class. C_p represents the score of the plane-level consistency. To evaluate the consistency of the part-level hidden semantics, we take the IoU as the criterion. Different from the segmentation task, we trained the network with class labels, and test the IoU using segmentation labels. The formula is IoU = n_cor/n_cls + n_seg - n_cor where n_cor means the numbers of points with the correct match. n_cls represents the total numbers of the salient points, and n_seg represents the numbers of the points in the part segmentation area. §.§ Unsupervised Part Segmentation Using Hidden Semantics To reduce the dependence on the label, we implement unsupervised 3D point cloud part segmentation using the hidden semantics, as shown in Figure <ref>. First, we train the 3D point cloud DNNs with class-level labels. Secondly, we use Relevance Flow to obtain the hidden semantics of the intermediate layers, and select qualified part-level hidden semantics as part detector. Finally, we combine each part detector to realize unsupervised part segmentation of 3D point cloud samples. §.§ Generation of Adversarial Attack Samples To explore the robustness and vulnerability of the 3D point cloud DNNs, we generate adversarial attack samples and attack the network, making the output wrong. At first, we sort the salient points according to their salient value w derived from Relevance Flow. Secondly, we pick up the top N points as the centers, and group their K neighbors to form the attacked regions. Then, we generate the adversarial attack samples by moving the attacked regions to the non-salient area. Finally, we input the adversarial attack sample to the network, and obtain the new classification results. If the result is inconsistent with the original category, the attack succeeds, otherwise it fails. The attack progress is shown in Algorithm <ref>. § EXPERIMENT §.§ Hidden Semantics of the Intermediate Layer In this section, we represent the hidden semantics of PointNet<cit.>, PointNet++<cit.> and PointConv<cit.> frameworks using our proposed Relevance Flow method on ModelNet10<cit.> and ModelNet40<cit.> dataset. The saliency map of the hidden semantics in the intermediate layer is shown in Figure <ref>. The salient values are divided into three levels ordered the given interval with [0, 1/3d, 2/3d, d], where d means the difference between maximum and minimum of the salient value. In Figure <ref>, the blue region is insignificant, the pink is more significant, and the red is the most significant. The network is trained strictly as the original setting, due to the space limitation, we only display the hidden semantics of the layers in PointNet++ with radius 0.1, more details are shown in the supplementary material. From the learning process of hidden semantics, PointNet++ focuses on different parts of the instance while the attention become concentrated. From Figure <ref>, we can see that the attention of the shallow layer close to the input is scattered, such as the SA1-conv2 (the second convolutional layer in first sample and group module<cit.>). The network learns the surface structure, such as the top plane of table and guitar, as well as the top surface of lamp holder in the SA1-conv3. In the deeper layer, the focus of the classifier on the objects tends to be concentrated, like SA2-conv1 and SA3, focusing on a region, like chair seat, chair leg, table leg, guitar body, and lamp holder. However, in Figure <ref>, PointNet and PointConv focus on the similar parts of the instance with the progress of strengthening the concentration from shallow layer to deep layer. In PointConv network, the attentions of conv1 to conv3 in SA1 module are more scattered, while focused in SA2 and SA3 modules. For example, the class "guitar", the pink and red dots locate at the its body and neck in SA1 module, but in SA2 the number of red dots is increase, and in SA3 module the red dots mainly locate at its neck. §.§ Comparison of Salient Region We compare the trend of the proportion of salient regions with different thresholds on PointNet, PointNet++, and PointConv network, as show in Figure <ref>. From the aspect of trend, the proportion of PointNet salient region is decreased, and the proportion of PointConv salient region is increased under different thresholds setting. The proportion of PointNet++ salient region fluctuates, especially in the SA3 module, the proportion jumps significantly. Concerned about the diversity of hidden semantics, PointNet++ has diverse hidden semantic, containing different structures and parts of the instance in different layers, that is the reason we choose this framework to conduct the rest experiments on Section 4.3 and Section 4.4. §.§ The Consistency of Hidden Semantics Through the experiments, we find the salient regions of different sample in same category appear consistently in some layers. Especially, we find PointNet++ has learned the plane-level and part-level consistent hidden semantics on ModelNet40, as shown in Figure <ref> and Figure <ref>. §.§ Evaluation of Consistency Discovering the plane and part level hidden semantics, we evaluates the semantics at both levels separately on ModelNet40<cit.> and ShapeNet<cit.> part datasets. As shown in Table <ref>, we evaluate the plane-level consistency of PointNet++ on ModelNet40 dataset. We choose the thread τ as 0.15, which can detect the plane structure with a fine range. Because of the limit of paper, we display the maximum C_p in each of the layer, which mainly comes from the SA1-layer3, and the whole data is detailed in the supplementary material. Table <ref> shows the part-level hidden semantics of the intermediate layers in PointNet++ framework on ShapeNet . We only trained the network with the 16 class labels represented in first row, and test the IoU with the 49 segmentation labels partially represented in second row, detailed in the supplementary material. §.§ Unsupervised Part Segmentation Using Hidden Semantics We achieve unsupervised part segmentation using the plane-level hidden semantics of PointNet++ on ModelNet40. After getting the salient region, composed by the salient points, the bounding box of the salient segmentation is attained. Utilizing the bounding box, as a 3D-mask, it easy to divide the object into different parts, as shown in Figure <ref>. We also conduct the part segmentation experiment on the ShapeNet part dataset. We trained the PointNet++ models without the segmentation lables, and feed the category labels only. Then we get the salient map as the part detector, as shown in Figure <ref>, of each layers by interpreting the hidden semantics of the network using our proposed Relevance Flow. Using the part detector of each layer, it is feasible to realize part segmentation. We calculate the mIoU of each category with the original sementation labels, as shown in Table <ref>. Compared with the state-of-the-art in point cloud part segmentation, our method get lowwer mIoU. The reason is that our method relies on the quality of the hidden semantics, however, without any part-level supervised learning, obtained from classification network, the hidden semantics is not a truly segmentation mask, as shown in Figure <ref>. The better effect requires subsequent improvements and restrictions on the training process. §.§ Adversarial Attack Based on Hidden Semantics Success Rate and Time of Attack We conduct adversarial attack experiments on PointNet, PointNet++, and PointConv networks with dataset ModelNet10 and ModelNet40. The result is show in Table <ref>, 'Ours' means using our method to pick up the centers of attacked regions, and 'Random' means picking up the centers of attacked regions randomly. It shows that 'Ours' has higher success rate and lower time time consume than 'Random'. In terms of attack success rate, PointNet has the highest attack success rate, followed by PointConv, and PointNet++ is the lowest. It means that PointNet++ and PointConv networks are more robust and more resistant to avoid attack than PointNet. In terms of attack time, the time to attack PointNet is the shortest, followed by PointConv, and PointNet++ is the longest, because PointNet++ has the highest network complexity and the longest forward propagation time. Table <ref> shows the attack success rate and time in each of the class on PointNet. The number of regions is 5, and the number of neighbor points is 40. The 'Accuracy' refers to the classification accuracy of target category. 'Ours' means using our method to pick up the centers of attacked regions, and 'Random' means picking up the centers of attacked regions randomly. "Rate" means the success rate of adversarial attack, and 'time' refers to the time to generate an attack sample and attack the network at once. Table <ref> also shows the better performance of our method in attack success rate and efficiency. The Impact of the Set of Attack Region We explore the impact of the number of attack region and the range of neighborhood on the attack result of PointNet network. Figure <ref>. shows the success rate varies with different attack region number N with the value: 1, 5, 10, 15, and 20. The abscissa in the figure represents number of regions, and the ordinate means the value of success rate, and different colors represent with different neighborhood range. In general, The Figure <ref> shows that the attack success rate of PointNet increases with the increase of the number of attack region and the range of neighborhood. § CONCLUSION In this paper, the Relevance Flow, an interpretation method for 3D point cloud classification neural network, is proposed to interpret hidden semantics of the intermediate layers, and the saliency map is used to show the hidden semantics. Our proposed method reveals a explicit hidden semantics of different layers in PointNet, PointNet++ and PointConv frameworks. Particularly, we reveal the plane and part level hidden semantics in the intermediate layers of 3D point cloud classification neural network on the ModelNet40 and ShapeNet datasets. We use the normals and the IoU of salient points to evaluate the consistency of hidden semantics at both plane and part level. Beside, we part the segmentation of 3D point cloud using the hidden semantics in the intermediate layers with unsupervised manner, and generate the adversarial samples to attack the 3D point cloud DNNs. Experiment shows that the plane-level and part-level hidden semantics can be retrofitted for unsupervised point cloud part segmentation with the trained classification neural network, and the attack success rate of PointNet is the highest, followed by PointConv and PointNet++. ACM-Reference-Format
http://arxiv.org/abs/2303.07083v1
20230313130802
Exploring phonon-like interactions in one-dimensional Bose-Fermi mixtures
[ "Axel Gagge", "Th. K. Mavrogordatos", "Jonas Larson" ]
cond-mat.quant-gas
[ "cond-mat.quant-gas", "quant-ph" ]
Department of Physics, Stockholm University, SE-106 91 Stockholm, Sweden Department of Physics, Stockholm University, SE-106 91 Stockholm, Sweden ICFO – Institut de Ciències Fotòniques, The Barcelona Institute of Science and Technology, 08860 Castelldefels (Barcelona), Spain [e-mail address: ]Jonas.Larson@fysik.su.se Department of Physics, Stockholm University, SE-106 91 Stockholm, Sweden With the objective of simulating the physical behaviour of electrons moving in a dynamical background, we study a cold atomic Bose-Fermi mixture in an optical lattice potential felt only by the bosons. The bosons, assumed to be in the deep superfluid regime, inherit the periodicity of the optical lattice and subsequently act as a dynamical potential for the polarized fermions. Due to the atom-phonon interaction between the fermions and the condensate, the coupled system displays a Berezinskii-Kosterlitz-Thouless transition from a Luttinger liquid to a Peierls phase. For sufficiently strong Bose-Fermi interaction, however, the Peierls phase becomes unstable and is succeeded by either a collapsed or a separated phase. We find that the main role of the optical lattice amounts to stabilizing the Peierls phase. Furthermore, the presence of a confining harmonic trap leads to a rich physical behaviour beyond what is observed for either bosons or fermions separately trapped. In particular, for an attractive Bose-Fermi interaction, the insulating phase may develop a fermionic wedding-cake like configuration reflecting the dynamical nature of the underlying lattice potential. For repulsive interaction, on the other hand, we conclude that the trap destabilizes the Peierls phase and the two species separate. 05.30.Rt, 42.50.Ct, 75.10.Kt Exploring phonon-like interactions in one-dimensional Bose-Fermi mixtures Jonas Larson March 30, 2023 ========================================================================= § INTRODUCTION Over the past decades, we have witnessed a rampant growth of experimental methods devised to cool and control dilute gases. The attainment of Bose-Einstein condensates (BECs) <cit.> was soon to be followed by in-depth explorations of BEC dynamics in light-induced periodic potentials <cit.>, paving the way for the groundbreaking demonstration of the Mott-superfluid phase transition. This exemplary quantum phase transition was predicted by the Bose-Hubbard model <cit.> for an atomic gas loaded into an optical lattice <cit.>. Since then, trapped and cooled dilute atomic gases have developed into a versatile laboratory where quantum matter can be studied in a controlled and detailed fashion, and constitute one of the most promising platforms for the realization of analog quantum simulators <cit.>. Many of the open questions in the filed of quantum phase transitions – especially those revolving around the formation and characterization of exotic quantum phases of matter – cannot, however, be directly addressed by the Bose-Hubbard model per se. Even though the classical laser field forming the optical lattice is in principle dynamical, the back-action between the trapped particles (modelled as beam splitters) and the lattice is normally very weak <cit.>, and one may, to a very good approximation, treat the lattice as the outcome of applying a periodic static potential. Certainly, this approximation would be sufficient to emulate many paradigmatic lattice models. However, such classical potentials do not take into account any back-action between the lattice and the conducting matter, which we know is essential to explain several phenomena like the Peierls distortion <cit.> [see Figs. <ref> (a) and (b)] and superconductivity <cit.>. In solids, effects of that kind result from electron-phonon interactions emerging from the very nature of a dynamical lattice. The assignment of tractable degrees of freedom to the lattice renders its description dynamical and enables the simulation of some analogue of phonon-like interactions. One possibility is to couple the atoms to the light field of an optical resonator <cit.>, where substantial Stark shifts are observed already in the presence of a few photons. However, in current experiments only a few modes of the resonator actively participate in the light-matter interaction, and it is therefore not possible to locally modify the dynamical lattice. One must instead turn to multi-mode cavities <cit.>, which still pose difficulties in reaching configurations similar to those encountered in real solids <cit.>. A viable alternative arises when we consider atoms directly interacting with an ionic crystal <cit.>. Here, harmonically trapped ions form a Wigner crystal, while additional neutral atoms move within this lattice. This ion-atom system bears obvious similarities to a real solid, albeit experimentally challenging. In fact, the crystalline structure is not necessary for exploring phonon-like interactions. In mixtures of different atomic species — either different atoms or different internal states of the same atomic species — the interplay between subsystems can lead to intriguing effects. As for single atomic species, the use of Feshbach resonances allows experimenters to control the strength, and even the sign, of all involved interactions <cit.> in order to probe the resulting phase diagram. In mixtures of bosons and spin-polarized fermions (hereinafter referred to as BF mixtures), it is well known that an attractive BF interaction leads to a so-called pairing phase in the strongly correlated regime. This has been studied for weak BF interactions g_bf in one dimension (1D) <cit.>, as well as in two <cit.> and three dimensions <cit.>. The phase in question collapses if the interaction becomes too strong, resulting in a clumping of the atoms and breaking of the translational invariance. The effect of optical lattices on BF mixtures has also been investigated in <cit.>. For deep lattices and/or for very strong interaction, such systems can be described by a BF Hubbard model as they enter an insulating phase of composite fermions <cit.>. The physical behaviour is typically described within a Wannier-basis expansion for both species, where the bosons can be construed as agents of effective onsite energy shifts for the lighter fermions. The imposed approximations in such a scheme omit certain back-action between the two subsystems in comparison to the self-consistent analysis we employ here. It is, nevertheless, still possible to encounter Peierls phases, supersolids, and charge density waves <cit.>. Furthermore, if the repulsive boson-boson interaction is weak, the system can enter a regime of phase separation where the bosons and fermions completely avoid each other <cit.>. On the experimental front, an early study focused on how the coherence of an atomic condensate – held in place by a cubic optical lattice – is affected by the presence of fermionic atoms <cit.>. Quantum degeneracy for both bosons and fermions was attained in Ref. <cit.>, where the two species were treated on equal footing, a tendency followed in a series of subsequent papers <cit.>. Further experimental investigations have also considered the regime emerging for a condensate in weak contact with much lighter fermionic atoms <cit.>. Here, the fermions effectively induce a so-called Ruderman–Kittel–Kasuya–Yosida (RKKY) long-range boson-boson interaction <cit.>. For attractive Bose-Fermi interaction it was demonstrated that a self-sustained trap may emerge for those fermions located inside the bosonic condensate <cit.>, an effect which may as well lead to the formation of soliton trains <cit.>. The fermion-mediated spin-spin interaction in a spinor condensate has also been recently observed be means of microwave spectroscopy <cit.>. In this article, we investigate a 1D atomic BF mixture where only the bosons are subject to an optical lattice. The motivation for considering such a situation is drawn from the resemblance to an actual solid – the optical lattice orders the bosons in a crystalline structure. Our spin-polarized fermions experience only the periodic potential arising from the boson atomic density but for no externally imposed static potential, with the occasional exception of a harmonic trap. A similar idea, although experimentally more challenging, was proposed in Ref. <cit.>, where the crystalline order for the bosons was established from a rapidly rotating condensate which created a triangular Abrikosov vortex lattice. We focus on the limit of a weak boson-boson (BB) interaction, and an optical lattice of amplitude ≤ 20 E_R (E_R is the recoil energy), where the bosonic gas is expected to form a superfluid, see Fig. <ref>(c). In this regime, we can work within a mean-field approximation for the condensed bosons, which act as a classical dynamical lattice felt by the fermions. The coupled system is solved self-consistently such that all back-action, at the mean-field level, is taken into account (without imposing, for intsance, any single-band nor tight-binding approximations). At this hybrid mean-field level, the mixture displays a rich phase diagram. For strong BF interaction, with coupling rate g_bf, the system either experiences a collapse (g_bf≪0), in which the two species overlap and populate only a small fraction of the lattice, or a separation (g_bf≫0) where instead the two species avoid each other and populate different parts of the lattice. These are first-order transitions, even though the translational invariance is spontaneously broken in both cases. For a non-zero interaction beyond a critical coupling g_bf=g_c, an instability occurs such that the period of the state is different from that of the underlying lattice, e.g. for half filling a periodic doubling is found. The system then transitions from a Luttinger liquid (LL) phase into a Peierls phase via a Berezinskii-Kosterlitz-Thouless (BKT) transition. The Peierls phase manifests itself through a non-zero gap Δ_P at the Fermi wavenumber k_F, i.e. Δ_P ≠ 0 for g_bf beyond the critical interaction strength g_c. We further present an analysis of the effects arising due to the presence of a confining harmonic trap. For sufficiently strong repulsive boson-fermion interaction it has already been shown that, at the mean-field level, the trap induces a separation of the two species <cit.>. This fact suggests ruling out a Peierls like phase when a trap breaks the translational invariance. Inside a trap, the atomic densities vary in space, which in a local density approximation translates to a local Fermi wavenumber. A spatially varying wavenumber has a direct impact on the phases, e.g. by smoothing the discontinuous transition between the (possible) Peierls and collapsed/separated phases. Naturally, the presence of a trap entails a larger number of involved wavenumbers and thereby a broadening of the Bragg peaks in a time-of-flight detection. In addition, we find that the interplay between the trap, the dynamical boson field, and the fermions results in an insulator baring a clear fermionic “wedding cake structure”, which differs from the density profile obtained for a static periodic potential. Our narrative is structured as follows. Sec. <ref> introduces the Bose-Fermi system and the model we employ for its description. There we also discuss some basic concepts and known results pertaining to the properties of the involved phases. The numerical methods are developed in Sec. <ref>, while the associated results are presented in Sec. <ref>, first for the translationally invariant case <ref>, and then in the presence of a harmonic trap  <ref>. Concluding remarks in Sec. <ref> close our paper out, while the two appendices present two possible paths to the derivation of effective model Hamiltonians taking quantum fluctuations into account for both species, alongside some details underlying the employed hybrid mean-field method. § BACKGROUND: MODEL HAMILTONIAN AND PHASES §.§ The Hamiltonian We consider a mixture of two atomic gases, one bosonic and one fermionic. By the use of a tight transverse confinement (in the sense of ω_⊥≫ω_∥), excited states of the transverse modes can be neglected and the low-energy physical description is quasi-one dimensional <cit.>. To begin with, we will take the gas to be of infinite extent in the longitudinal direction, and later consider the effect of a trap. We work with dimensionless quantities, where energies are scaled by the boson recoil energy, E_R = ħ^2 k^2 / 2 m_b with k the lattice wavenumber and m_b the atomic boson mass, such that half the optical lattice wavelength sets the characteristic length scale of the problem. The physical behaviour of such a system is captured by the Hamiltonian [ ℋ̂ = ∫ dx ψ̂_b^†( - ∂^2/∂ x^2 + V_b(x) + g_b/2ψ̂_b^†ψ̂_b ) ψ̂_b; ; +∫ dx ψ̂_f^†( -1/r∂^2/∂ x^2 + V_f(x) + g_bfψ̂_b^†ψ̂_b ) ψ̂_f, ] where r = m_f/m_b is the mass ratio, g_b is the effective 1D boson-boson (BB) interaction strength, and g_bf is the effective 1D BF interaction strength. For the case discussed later, we will assume the bosons to be harmonically confined and subjected to an optical lattice, while the fermions will be harmonically confined but assumed to have a negligible interaction with the optical lattice, V_b(x) = 12ω_b^2 x^2 + V_0 sin^2(x), V_f(x) = r 12ω_f^2 x^2. At first we remove the harmonic confinement and keep only the periodic optical lattice. To let the lattice single the bosonic atoms out, the light frequency should be such that it is not quasi resonant with any of the dipole transitions – dictated by selection rules – of the fermionic atoms. The atomic field operators ψ̂_b,f(x) and ψ̂_b,f^†(x) obey the standard commutation relations for bosonic and fermionic creation and annihilation operators. Note that the Hamiltonian commutes with both particle number operators (α = b, f), N̂_α = ∫ dx ψ̂_α^†(x) ψ̂_α(x). For further use, we define the average linear density of bosons/fermions as n̅_α = lim_L →∞1/L∫_-L/2^L/2 dx ⟨ψ̂_α^†(x) ψ̂_α(x) ⟩, and ν_α = n̅_α /π as the filling of bosons/fermions. In this article, we will consider the bosonic gas to be dense enough to form a (quasi) condensed state, but not so dense that the interaction energy becomes dominant. In terms of the 1D and 3D scattering lengths a_s,1D and a_s,3D this implies a_s,3D≪ξ≪ a_s,1D, where the healing length of the condensate is defined as ξ = (8 π a_s,3Dρ_b)^-1/2, with ρ_b the condensate density. Furthermore, our approximations are consistent with limiting out attention to optical lattice strengths satisfying V_0 ≲ 20 E_R. We take the fermions to be lighter than the bosons, i.e. r = m_f / m_b < 1, which is typically the case for the relevant experiments, e.g. for a Li^6-Li^7 mixture <cit.> one has r=0.86 and for a Li^6-Cs^133 mixture <cit.> one instead gets r ≈ 0.04. We will assume g_b > 0 but allow any sign and magnitude of g_bf. Both the BB and BF interactions should be possible to vary in the experiment be deploying Feshbach resonances <cit.> §.§ Pairing phase and Peierls instability For low bosonic densities, the occurrence of a so-called pairing phase for BF mixtures with attractive BF interaction is well known. For weak interaction strength and light fermions, the development of modulated densities can be understood from the fact that the fermion-mediated long-range interaction between two bosons is an ultracold atomic analog to the RKKY interaction <cit.>. These spatial modulations of the boson density alter the potential landscape for the fermions, and subsequently instigate back-action between the two species. The spatial modulations will occur at the wavenumber 2 k_F if we assume a RKKY interaction from a “flat” background of fermions with a Fermi wavevector k_F. In  <cit.>, a 1D BF mixture without optical lattice was investigated using bosonization and a transition was identified between a two-component gapless LL phase and a gapped pairing phase with periodic density modulations. The transition was found to “flow” towards the BKT fixed point with the gap opening as Δ∼exp(-1/√(|g_bf - g_c|))Θ(g_bf-g_c), where Θ(x) is the Heaviside step function, and g_c is the critical coupling. A study using discretization of the spatial coordinate and the numerical DMRG method also predicted a stable LL phase for small negative g_bf <cit.>. For repulsive interaction (g_bf > 0), the aforementioned studies found no pairing phase. However, in <cit.> a pairing phase was indeed reported upon employing the method of a random phase approximation. A gap opening at 2 k_F and the corresponding periodic modulation in the density are reminiscent of the Peierls distortion. As first demonstrated by Peierls <cit.>, a metal is unstable towards lattice distortions – a small displacement of the atoms. The phenomenon can be understood by treating the atomic displacements on the mean-field level in the well-known SSH model. Opening up a gap Δ_P in the fermion dispersion at the Fermi wavevector k_F, as depicted in Fig. <ref> (a), lowers the total energy and corresponds to a lattice modulation of wavenumber k_P = 2 k_F, sketched in Fig. <ref> (b). There are however also some discrepancies. The gap Δ_P was derived from a mean-field treatment of the ions, while the pairing gap Δ is the gap of excitations in the full quantum system. Still, it is interesting to observe that the gap in the SSH model also has an exponential form similar to (<ref>). Moreover, in the original work of Peierls the instability was demonstrated for any non-zero interaction <cit.>, while the effect of pairing arises as a consequence of a phase transition occurring at finite interaction strength. An optical lattice is, on intuitive grounds, expected to stabilize the pairing phase against a collapse, since it renders the bosons less mobile by generating a larger effective mass. On the other hand, using the same argument, the lattice may also extend a possible metallic phase to larger regions in the phase diagram. We may note that for BF mixtures where both species are subject to an optical lattice, it has been reported that the pairing phase appears for both repulsive as well as attractive BF interactions <cit.>. Furthermore, one could in principle expect a beating between the involved length scales, the Fermi wavenumber k_F and the optical lattice wavenumber k, that could, in principle, give rise to so-called Devil's staircase structures <cit.>. A last remark on the periodically modulated Peierls phase is in order. We have envisioned the boson superfluid as the agent creating a dynamical lattice for the fermions. We may consider the opposite viewpoint of a condensate living in a partially dynamic background. Within this perspective, the Peierls phase is reminiscent of a supersolid <cit.>, i.e. a superfluid state that has spontaneously broken the periodicity of the Hamiltonian. Somewhat similar scenarios have been studied in atomic condensates confined within optical resonators <cit.>. §.§ Stability of the Bose-Fermi mixture For sufficiently strong BF interaction, the system is unstable towards long-wavelength fluctuations. The stability of BF mixtures without an optical lattice has already been investigated in e.g. <cit.>. Applying a hydrodynamic (mean-field) description of both fermions and bosons, a linear stability analysis yields the condition n̅_f≥g_bf^2/2 g_f g_b, where g_f = π^2 / r. The fact that a high fermion density stabilizes the mixture is particular to the 1D case. Attractive interaction leads to a collapse of both species, while a repulsive interaction induces a phase separation where the bosons and fermions either avoid each other or lump together to form BF soliton mixtures <cit.>. More precisely, for repulsive boson-fermion interaction the bosons can form a dark soliton (density dip), filled by a bright fermionic soliton. For attractive interaction both species form a bright soliton. This is reminiscent of the Townes solitons predicted for electromagnetic waves <cit.>, and recently demonstrated in ultracold atomic Bose-Bose mixtures <cit.>. Soliton solutions are known to be unstable beyond the mean-field approach <cit.> but BF mixtures can form stable self-bound systems (e.g., in <cit.>,) which in 1D are stable within the mean-field approximation as well as to higher order <cit.>. In the course of our analysis, we will find out that an optical lattice increases the range of g_bf values for which the mixture is stable. § METHODS §.§ A hybrid mean-field approximation To investigate the pairing phase, we employ a “hybrid” approach that intertwines quantum and classical dynamics, an approach which has already been followed in <cit.>. We note that this method bears similarities to the mean-field approximation employed to derive the SSH model. It is also similar to the DFT method <cit.>. Due to the similarity with the SSH model, we will refer to the gapped phase in the hybrid approximation as the Peierls phase. For the ground state we adopt the ansatz | Ψ⟩ = | ϕ_b ⟩⊗ | Ψ_f ⟩, where | Ψ_f ⟩ is a general state of N_f fermions, and | ψ_b ⟩ is a (generalized) coherent state of the bosons satisfying <cit.> ψ̂_b(x) | ψ_b ⟩ = ψ_b(x) |ψ_b ⟩, with the complex variable ψ_b(x) called the condensate wavefunction or order parameter. We assume the normalization ∫_0^L dx |ψ_b(x)|^2 = 1 for a finite system and thereby factor out the total boson number N_b. If m_f / m_b = r ≪ 1, it is justified to assume an adiabatic approximation where the lighter fermions follow the heavier bosons. Under such conditions, any gauge potential <cit.>, characterizing non-adiabatic corrections and arising due to back-action between the condensate and the fermions, can be neglected. The fermionic part of the Hamiltonian can then be diagonalized while keeping the bosonic degrees of freedom fixed, thus acting as an “adiabatic potential”. The approximation is equivalent to replacing the bosonic field operators by the condensate wavefunction in the Hamiltonian, yielding the hybrid operator ℋ̂[ψ_b] = ℰ_b[ψ_b] + ∑_n ϵ_f,nψ̂_f,n^†ψ̂_f,n, where the mean-field energy functional of the bosonic part is ℰ_b[ψ_b] = N_b ∫_0^L dx ψ_b^* ( -∂^2/∂ x^2 + V_b + g_b N_b/2 |ψ_b|^2 ) ψ_b, and the second part is just the fermionic part of the Hamiltonian written in diagonal form, ϵ_f,n being the eigenvalues of the Hartree equation for the fermion orbitals, ( -1/r∂^2/∂ x^2 + g_bf N_b |ψ_b|^2 ) ϕ_f,n = ϵ_f,nϕ_f,n. Note that the solution of this Hartree equation exhibits a functional dependence on the boson density, hence hereinafter we will write ϵ_f,n = ϵ_f,n[ψ_b]. From Eq. (<ref>), a nonlinear Schrödinger equation for ψ_b can be derived, i ψ̇_b = ( -∂^2/∂ x^2 + V_b + g_b N_b |ψ_b|^2 + g_bf n_f ) ψ_b, where the expectation value of the fermion density can be calculated as n_f(x) = ⟨ψ̂_f^†(x) ψ̂_f(x) ⟩ = ∑_n=1^N_f |ϕ_f,n(x)|^2. To find the ground state, we resort to Eq. (<ref>) to numerically propagate an initial condensate wavefunction in imaginary time, employing the split-operator method <cit.>, which amounts to solving the eigenvalue problem (<ref>) at each time step. To investigate the Peierls phase for a system of infinite extent, we will use the following prescription: Assume a filling ν_f = 1/2, so that we expect density modulations with a period of two sites. Since the modulations are commensurate with the optical lattice, the entire problem is periodic and the solutions of the Hartree equation are Bloch waves, with a reduced unit cell in reciprocal space due to the doubled periodicity in the Peierls phase. Again, for the system evolution we propagate in imaginary time, solving the Hartree equation at each time instant. The case of incommensurate fermion filling is interesting on its own, as it may lead to coexisting spatially separated regions of commensurable and incommensurate phases <cit.>. However, our method does not permit an incommensurate filling at present, hence we leave the problem aside for later investigation. For the Peierls phase, we appeal to the same order parameter as in the SSH model, namely the energy gap of fermionic excitations above the Fermi surface, Δ_P := lim_ϵ→ 0^+( E_f(k_F + ϵ) - E_f(k_F - ϵ) ), which in turn is identical to the gap of the hybrid Hamiltonian (<ref>). As we discuss in section <ref>, this quantity should approximate the excitation gap of the entire system. §.§ Thomas-Fermi approximation for the fermions To detect the transition to the collapsed or separated phases, we resort to a Thomas-Fermi approximation for the fermions, as was done in <cit.>. We define a classical field ψ_f(x) = √(n_f(x)), called the Thomas-Fermi wavefunction, where n_f(x) is the ground state expectation value of the fermion density. The Thomas-Fermi energy functional is ℰ[ψ_b, ψ_f] = ℰ_b[ψ_b] + ℰ_f[ψ_b, ψ_f] where the first term on the right is given by (<ref>) and the second by [ ℰ_f[ψ_b, ψ_f] = N_f ∫ dx ( π^2 N_f^2/3 r |ψ_f|^6 + 1/r|∂ψ_f/∂ x|^2; ; + g_bf N_b |ψ_b|^2 |ψ_f|^2 ), ] again assuming the normalization ∫ dx |ψ_α|^2 = 1. Taking the functional derivative, we find an equation of a two-component Gross-Pitaevskii type, [ i ∂_t ψ_b = ( -∂^2/∂ x^2 + V_OL + g_b N_b |ψ_b|^2 + g_bf N_f |ψ_f|^2 ) ψ_b,; ; i ∂_t ψ_f = ( -1/r∂^2/∂ x^2 + π^2 N_f^2/r |ψ_f|^4 + g_bf N_b |ψ_b|^2 ) ψ_f. ] Using again the split-operator method <cit.>, we then evolve an initial state in imaginary time to find the ground state. Due to the mass separation between the two species, one may argue that an adiabatic elimination of the fermion field should be justified. This would result in an effective bosonic model where the fermion mediated RKKY-like boson-boson interactions would appear. Such an approximation, however, has a negligible benefit to the numerical solution, whence we solve the full mean-field model expressed by Eqs. (<ref>). § RESULTS §.§ Translation-invariant BF mixture We first focus on the periodic case in the absence of a trap, where we set V_trap = 0. This idealization represents the thermodynamic limit of the system, which is useful to study universal properties of the occurring phase transitions. A Bose-Fermi mixture with no lattice was studied in <cit.>, where it was reported that, for negative g_bf, a BKT transition separates a LL from a Peierls phase; the gap had the form of Eq. (<ref>). In the upper two frames of Fig. <ref>, we depict the numerically extracted phase diagrams; frame (a) shows a region in the (g_bf, g_b) plane when keeping V_0 = 0 and r = 0.04 constant, while frame (b) displays a region in the (g_bf, V_0) plane for g_b = 0.4 and r = 0.04 constant. Both (a) and (b) show the region of stability of the Peierls phase towards collapse or separation (black solid lines), located via a calculation using the Thomas-Fermi approximation and compared to the mean-field prediction (<ref>) (black dotted lines). The transition is identified by detecting the discontinuity in the overlap between boson and fermion densities. The LL-to-Peierls transition (red solid lines) is calculated via the hybrid method, and the critical coupling g_c is obtained from a least square fit of the expression (<ref>) to the numerical data. From frame (a) we can conclude that the region of stability has an extent which abides by the inequality (<ref>), but more importantly that our method predicts a Peierls (i.e. pairing) phase for g_bf > 0, in disagreement with <cit.>. The reason for such a disparity could be simply attributed to the fact that the hybrid method entails the unphysical assumption that the solution is periodic, which makes the detection of a long-wavelength fluctuations difficult. From the literature on Bose-Fermi-Hubbard systems, where both gases are subject to an optical lattice, we however expect an optical lattice to stabilize the Peierls phase for repulsive interaction <cit.> and from frame (b) we infer that this is indeed the case: the optical lattice stabilizes the Peierls phase beyond the boundary set by condition (<ref>) for a homogeneous configuration. More precisely, the extent of this phase is growing with the optical lattice potential while the LL, collapsed, and separated phases are shrinking for the shown parameter ranges. Furthermore, the Peierls gap also grows with increasing lattice amplitude, meaning that it should be easier to observe in an experiment with a stronger optical lattice, provided the full system does not enter an insulating phase due to the inclusion of an optical lattice. To illustrate the type of transition occurring between the LL and Peierls phases, Fig.Fig. <ref>(c) shows three examples of the Peierls gaps as a function of g_bf, for V_0 = 0, 4, and 8, keeping g_b = 0.4 constant. As demonstrated by the dotted curves, close to the critical value, the numerically extracted gaps fit very well the analytical expression (<ref>) for the gap of a BKT transition. Away from the critical point, there is a notable “knee” feature, which occurs when the bosons only populate every other site, and solely for V_0 ≠ 0. We have also studied the fermion one-particle density matrix for this state (not displayed) on either side of the knee. It displays an exponential decay, as we expect for a gapped system, however we find different density oscillations superimposed on top of each other in the Peierls phase. Beyond the knee, these oscillations vanish and the decay rate is increased, which we believe could signal the presence of a possible BF insulating phase. To confirm such statement one should preferably go beyond the hybrid mean-field ansatz. Fig. <ref>(d) displays the density of bosons and fermions within the unit cell, as a typical example for a particular point picked in the phase diagram: V_0 = 1, g_b = 0.4, and g_bf = -1. The doubling of the periodicity is in evidence. Contrary to most earlier studies, our method is capable of capturing both amplitude and phase modulations, however we only find modulations in amplitude. For the repulsive case, g_bf>0, the situation is similar to that shown in (d), but with the two densities being “out-of-phase” instead. In order to experimentally probe the phase diagram, one must detect the order parameter or any other quantity capable of telling the different phases apart. The gap could, in principle, be extracted via pump-probe experiments <cit.>, while one could also imagine transport experiments to differentiate insulating and conduction phases, i.e. Peierls vs. LL. As will be evident in the next section, the trap induces a varying Fermi wave number k_F which makes the Peierls gap opening not that pronounced. In a time-of-flight detection, for instance, the Bragg peaks are smeared out, and the particular one corresponding to the gap is almost invisible. Hence, in a realistic setup, including the trap, time-of-flight measurements might not turn out to be the most optimal scheme. Instead, the onsite densities, which display alternating variations, could be accessed via single-site resolution detection <cit.>. This technique has been successfully implemented for cold fermionic gases, including even detection of higher order correlators <cit.>. §.§ BF mixture in a harmonic trap Current experiments rely on harmonic potentials for the attainment of sufficiently long trapping times. However, the trap may have a relatively small frequency yet still confine the atoms, such that the system locally experiences a periodic potential. To study these more realistic situations, we include a harmonic trap into our analysis, but still consider a very tight transverse confinement and consequently a quasi-1D configuration. We have used the hybrid method to investigate the different phases in the aforementioned setup. Figure <ref> presents the numerical results obtained for the densities – in the upper row we give the real-space densities and in the lower row the fermion density per site, which could be in principle accessed in an experiment as we mentioned in the last section. Depicted in the left column, we find a new insulating state which is not present in the translationally invariant system. We call this a wedding cake in analogy to the wedding cake-like structure found in the harmonically confined Bose-Hubbard model <cit.> but also in fermionic systems <cit.>. Here, the fermions form plateaus (“layers of the cake”) with an integer number of fermions per site. In the figure, there is a plateau of three fermions per site in the center of the trap, changing in a step-like fashion to two and finally one fermion per site as we move further out from the center. The wedding cake results from an interplay between kinetic, potential and interaction energies, and only appears when an optical lattice is present. It cannot be modelled using a local density approximation due to the abrupt changes in the density. In the central column of Fig. <ref>, we detail the correspondence to the Peierls phase occurring in the absence of a trap. In general, the boson and fermion clouds form a region of a size determined by the trapping strength alongside the BB and BF interactions. The optical lattice leads to a spatial variation of the bosonic profile, imparted to the fermions via the BF interaction. The Friedel oscillations of the fermions in this potential are then imprinted on the bosons via the RKKY interaction. Because the Peierls phase is a compressible supersolid, the wavelength varies continuously over the width of the trap. Therefore, in the trapped system, the Peierls modulations are generally not commensurate with the lattice. These modulations may be detected using single-site addressing, leading to a spatial variation in density that cannot be attributed to the profile of the trap or that of the optical lattice. We note here that the beating between the fermion and the optical lattice wavenumbers may give rise to local commensurate-incommensurate transitions in which the fermionic wavenumber of an atomic density wave spatially adjusts to the optical lattice period <cit.>. For any positive value of g_bf, and any strength of the optical lattice, we have found that the system phases separate. The rightmost column of Fig. <ref> shows the separated state, where the heaviest atoms occupy the center of the trap, surrounded by regions of the lighter species. Perhaps the most surprising feature of Fig. <ref> is the appearance of the wedding cake phase where we would expect a collapsed phase. The integer filling per site clearly indicates a fermionic Mott insulator state <cit.>. One way to investigate whether this instance is something more than a coincidence is to look at the off-diagonal elements of the one-particle density matrix, reading ⟨ψ̂_f^†(x) ψ̂_f(x') ⟩ = ∑_n=0^N_fϕ_f,n^*(x) ϕ_f,n(x'). An isolating state is expected to have an exponentially decaying one-particle density matrix <cit.>. In Fig. <ref>, we focus on a further comparison between the wedding cake (left column) and Peierls (right column) phases. In the upper row, we plot the fermion number per optical lattice site, while in the lower row, we display the corresponding one-body density matrix. We observe that the wedding cake is distinct by having an integer number of fermions per site. We have numerically verified that both phases are characterized by an exponential decay of the one-particle density matrix, which is typically what one expects for insulators. From the figure it is clear that this decay is much more pronounced for the wedding-cake state – deduced from the smallness of the non-diagonal matrix elements – a feature which in turn signals the opening of a more pronounced gap in the spectrum. § CONCLUDING REMARKS We have investigated a dilute mixture of two gases, one fermionic and one bosonic. The gases are confined in a cylindrical trap so that the low-energy physical behaviour of the system is effectively one-dimensional. An optical lattice was considered in order to imprint a period structure onto the bosonic gas. We have focused on a weak optical lattice and a high density of bosons, such that the bosons form a condensate. We confirmed that a Peierls instability, manifested via a BKT-type phase transition to a Peierls phase, persists when an optical lattice potential is applied solely to the bosons. Moreover, the presence of this phase was found to stabilize the system against collapse and separation, as well as to enhance the significance of the Peierls effect, a property which is highly desirable for experimental explorations of related phonon-like physics. The presence of the Peierls phase was confirmed upon developing and applying a hybrid mean-field method. It is interesting to note that such a method is able to reveal the BKT nature of the phase transition, as well as the similarity to the SSH model of the Peierls instability. The crucial scaling is captured by the method we have developed owing to the fact that we take the deformation of the Fermi surface into account, while we also retain the quantum degrees of freedom for the fermions albeit within an adiabatic approximation. The natural step forwards would be to take quantum fluctuations of the boson degrees of freedom into account. This entails the development of a formulation and related numerical methods manifestly beyond any mean-field reduction, and to that aim we outline possible directions for deriving the corresponding many-body Hamiltonian in App. <ref> below. Another promising direction for future research concerns the investigation of fermion fillings incommensurate with the optical lattice as well as studying the quenched time-evolution problem of a single fermion in a dynamical bosonic potential. Furthermore, an interesting extension replaces the optical lattice with a BB mixture, using either trapped ions or dipole bosons. Finally, such systems could be analyzed in greater detail using matrix product states or bosonization techniques. § ROUTES TOWARDS KNOWN QUANTUM MANY-BODY MODELS In section <ref>, we reported on the presence of a Peierls phase at a hybrid mean-field level. We argue that this incorporates the pairing effect in a qualitative way. However, there are clear limitations with such an approach. Effectively, the model is a free fermion theory and as long as there is a finite Peierls gap, Δ≠0, we find a trivial insulator with exponentially decaying order. This is not what one expects from a BKT transition where one phase should exhibit algebraic decay. Furthermore, the classical field stemming from the boson condensation cannot build up quantum correlations with the fermions, while a quantum field can. To quantitatively analyze such situations one must go beyond mean-field. In this appendix we outline, without going into details, two possible approaches in order to derive effective Hamiltonians for which both species are treated quantum mechanically. In <cit.>, the condensate wavefunction was calculated for zero interaction between the species, and subsequently Bogoliubov excitations around the mean-field response were taken into account, arising from a small interaction. Due to the presence of a deep external lattice potential in their model, a Hubbard-Holstein model is obtained which can be understood in terms of polarons. In our case, we instead find the fermion-phonon Hamiltonian ℋ̂ = ℋ̂_f + ∑_μω_μ∫ dx ( M_μb̂_μ + M_μ^* b̂_μ^†) ρ̂_f + g_bf∫ dx |ϕ_b|^2 ρ̂_f + ∑_μω_μb̂_μ^†b̂_μ, where M_μ(x) = u_μ(x) - v_μ(x) are given in terms of the u_μ(x), v_μ(x) of the Bogoliubov transformation and ω_μ are the energies of the Bogoliubov modes. The third term will confine the fermions to their lowest Bloch band if the interaction is strong enough, and in this limit the model approaches the Hubbard-Holstein model of <cit.>. However, the approach above would have to be modified since it rests on the assumption that g_bf is weak. For a deep optical lattice one could come up with another method: expand the boson field in the corresponding Wannier functions, w_j(x) localized at site j, as <cit.> ψ̂_b(x)=∑_jâ_jw_j(x). If we expand the fermion field as ψ̂_f(x)=∑_kĉ_ke^ikx and impose the single-band and tight-binding approximations, we arrive at the many-body Hamiltonian ℋ̂_mb = ℋ̂_BH +∑_kk^2/rĉ_k^†ĉ_k +N̂_b∑_k,k'[D(k-k')ĉ_k^†ĉ_k'+h.c.], where ℋ̂_BH =-J∑_j(â_j^†â_j+1+h.c.) +U/2∑_jn̂_j(n̂_j-1), is the Bose-Hubbard Hamiltonian, with J and U the tunneling rate and onsite interaction strengths, respectively, n̂_j=â_j^†â_j, and D(k-k') is the overlap integral (which is Gaussian in the harmonic approximation). Since N̂_b is preserved, the quadratic fermionic Hamiltonian can be readily diagonalized, and we find no back-action on the bosons due to the fermions. To incorporate such effects one would need to go beyond the single-band or tight-binding approximations. Alternatively, the approximations may be kept but other additional degrees of freedom should be introduced corresponding to the phonon modes. For heavy bosons one can follow the idea of <cit.> to allow a variation in the position of the centers, jπ, of the Wannier functions, but keeping the shape of the functions intact. Thus, we associate a quantized shift δ̂_j with each Wannier function, w_j(x)→ w_j(x-δ̂_j). Assuming small shifts δ̂ ̂x̂_j≪1 one may then expand to linear order in the shifts and derive an effective Fröhlich-like Hamiltonian <cit.> ℋ̂_Fr=ℋ̂_mb+ℋ̂_BP+ℋ̂_FBP, where the boson-phonon interaction is given by [ ℋ̂_BP = -J_1∑_j(δ̂_j+1-δ̂_j)(â_j^†â_j+1+h.c.); ; +U_1/2∑_jδ̂_jn̂_j(n̂_j-1). ] If we introduce the local phonon annihilation/creation operators d̂_j/d̂_j^†, the phonon displacement is expressed as δ̂_j=(d̂_j+d̂_j^†)/2, while the fermion-boson-phonon interaction term takes the form ℋ̂_FBP=μN̂_d+∑_j∑_k,k'n̂_jD_1(k-k')δ̂_jĉ_k^†ĉ_k', with the first term being the bare phonon energy (μ is the characteristic frequency and N̂_d=∑_jd̂_h^†d̂_j). In principle, within the harmonic approximation, the coefficients J_1, U_1 and D_1 can be analytically determined. Both ℋ̂_BP and ℋ̂_FBP describe phonon-assisted tunneling, either between neighbouring lattice sites (bosons) or between different momentum modes (fermions). It may be noted that if g_bf=0, then D(k-k')=D_1(k-k')=0 and N̂_d=0 such that ℋ̂_BP=0. § THE HYBRID MEAN-FIELD–QUANTUM METHOD In this appendix we provide some further details about the employed hybrid mean-field ansatz. As already mentioned in section <ref>, a gap of the form (<ref>) opens up in the pairing phase. A superfluid of bosons is gapless and, to lowest order, is described by the condensate wavefunction ψ_b(x) – the mean-field order parameter. We define the generalized coherent state |ψ_b⟩ = exp( ∫ dx ψ_b(x) ψ̂_̂b̂^†(x) - h.c.) |0⟩, where |0⟩ is the bosonic vacuum. Taking the expectation value of the time-dependent Schrödinger equation, we obtain an effective hybrid Hamiltonian ℋ̂_eff = ℰ_b[ψ_b] + ℋ̂_f[ψ_b] - i ψ_b∂_tψ_b, where the first term is given by (<ref>), the second term is ℋ̂_f[ψ_b] = ∫ dx ψ̂_f^†( -1/r∂^2/∂ x^2 + V_f + g_bf |ψ_b|^2 ) ψ̂_f, and the third term is the Berry connection <cit.>. We will assume the condensate to change slowly so that this term can be neglected. The above is equivalent to a product-state ansatz for the ground state |Ψ_0⟩ = |ψ_b⟩⊗|Ψ_f⟩, where |Ψ_f⟩ is a general fermion state of N_f fermions. Such an ansatz neglects any entanglement built between the bosons and fermion subsystems; correlations may actually arise within the non-condensed fraction of bosons and, more importantly, different configurations of the condensate may get entangled with the fermions. In general, such mixed quantum-classical dynamics is interesting in a much wider context in condensed matter physics, high-energy physics and quantum gravity, and has been investigated in detail in  <cit.>. In <cit.>, a multi-configurational mean-field approximation based on hybrid quantum-classical theory was developed, with the central object being the quantum-classical distribution function – a map from the classical phase space to the set of quantum density operators, defined as ρ̂(𝐪, 𝐩) = ∑_ijϱ_ij |Ψ_i⟩⟨Ψ_j | δ(𝐪 - 𝐪_ij) δ(𝐩 - 𝐩_ij), where 𝐪, 𝐩 are the classical generalized coordinates and momenta, and | ψ_i ⟩ is a basis state of the quantum subsystem. In this formalism, “non-diagonal” contributions correspond to the quantum subsystem generating a coupling between different trajectories of the classical subsystems. When considering only a single trajectory, the quantum-classical distribution function can be written as a single delta-function term, ρ̂[ψ_b'] = |Ψ_f⟩⟨Ψ_f | δ[ψ_b - ψ_b'], where the brackets indicate a functional dependence. In other words, the system is represented by a single point in classical phase space, evolving with a quantum density matrix of a pure state. We find the ground state of Ĥ_eff self-consistently first observing that it can be readily diagonalized by selecting ψ̂_f(x) = ∑_n ϕ_f,n(x) ψ̂_n, where the orbitals are solutions of the Hartree (single-particle) equation ( -1/r∂^2/∂ x^2 + g_bf N_b |ψ_b|^2 ) ϕ_f,n = ϵ_f,nϕ_f,n. Second, we define a non-linear Schrödinger equation for the condensate, [ i ψ̇_b = δ/δψ_b^*Ψ_fĤ_effΨ_f; ; = ( -∂^2/∂ x^2 + V_b + g_b N_b |ψ_b|^2 + g_bf n_f ) ψ_b, ] where n_f(x) = Ψ_fψ̂_f^†(x) ψ̂_f(x)Ψ_f = ∑_n |ϕ_f,n(x)|^2 depends explicitly on the bosons through (<ref>). The ground state of (<ref>) is found from imaginary time propagation utilizing the split-operator method <cit.>. As mentioned in section <ref>, the above method can also be easily adapted to study a translationally invariant system of infinite extent for fermion filling ν_f = 1/2. In this case, we assume a periodic solution ψ_b(x + 4 π) = ψ_b(x). The solutions of the Hartree equations are then Bloch waves e^i q x/2 u_f,n(q, x). Due to the assumed double periodicity of 4 π, the first Brillouin zone is halved and the fermionic filling is in direct correspondence to the edges of the Brillouin zone. It is straightforward to find the fermion density as the integral n_f(x) = ∫_1BZ dq |u_f,0(q, x)|^2. Another important difference here is that we have to diagonalize the Bloch/Hartree equation for each quasi-momentum – in practice for a number of sampled values. Apart from these discrepancies between the two methods, the solution to Eq. (<ref>) is also found using imaginary time propagation. We thank Maciej Lewenstein, Hannes Conners, and Christophe Salomon for helpful discussions and comments. We acknowledge financial support from VR-Vetenskapsrådet (The Swedish Research Council), and KAW (The Knut and Alice Wallenberg foundation). Th. K. M. acknowledges support from: ERC AdG NOQIA; Ministerio de Ciencia y Innovation Agencia Estatal de Investigaciones (PGC2018-097027-B-I00/10.13039/501100011033, CEX2019-000910-S/10.13039/501100011033, Plan National FIDEUA PID2019-106901GB-I00, FPI, QUANTERA MAQS PCI2019-111828-2, QUANTERA DYNAMITE PCI2022-132919, Proyectos de I+D+I “Retos Colaboración” QUSPIN RTC2019-007196-7); MICIIN with funding from European Union NextGenerationEU(PRTR-C17.I1) and by Generalitat de Catalunya; Fundació Cellex; Fundació Mir-Puig; Generalitat de Catalunya (European Social Fund FEDER and CERCA program, AGAUR Grant No. 2021 SGR 01452, QuantumCAT U16-011424, co-funded by ERDF Operational Program of Catalonia 2014-2020); Barcelona Supercomputing Center MareNostrum (FI-2022-1-0042); EU Horizon 2020 FET-OPEN OPTOlogic (Grant No 899794); EU Horizon Europe Program (Grant Agreement 101080086 — NeQST), National Science Centre, Poland (Symfonia Grant No. 2016/20/W/ST4/00314); ICFO Internal “QuantumGaudi” project; European Union's Horizon 2020 research and innovation program under the Marie-Skłodowska-Curie grant agreement No 101029393 (STREDCH) and No 847648 (“La Caixa” Junior Leaders fellowships ID100010434: LCF/BQ/PI19/11690013, LCF/BQ/PI20/11760031, LCF/BQ/PR20/11770012, LCF/BQ/PR21/11840013). Views and opinions expressed in this work are, however, those of the author(s) only and do not necessarily reflect those of the European Union, European Climate, Infrastructure and Environment Executive Agency (CINEA), nor any other granting authority. Neither the European Union nor any granting authority can be held responsible for them. unsrtnat
http://arxiv.org/abs/2303.06854v1
20230313044946
Robust Contrastive Language-Image Pretraining against Adversarial Attacks
[ "Wenhan Yang", "Baharan Mirzasoleiman" ]
cs.CV
[ "cs.CV", "cs.CL", "cs.CR", "cs.LG" ]
[ Robust Contrastive Language-Image Pretraining against Adversarial Attacks equal* Wenhan Yangequal,yyy Baharan Mirzasoleimanequal,yyy yyyDepartment of Computer Science, University of California, Los Angeles Wenhan Yanghangeryang18@g.ucla.edu Baharan Mirzasoleimanbaharan@cs.ucla.edu Machine Learning, ICML 0.3in ] Contrastive vision-language representation learning has achieved state-of-the-art performance for zero-shot classification, by learning from millions of image-caption pairs crawled from the internet. However, the massive data that powers large multimodal models such as CLIP, makes them extremely vulnerable to various types of adversarial attacks, including targeted and backdoor data poisoning attacks. Despite this vulnerability, robust contrastive vision-language pretraining against adversarial attacks has remained unaddressed. In this work, we propose , the first effective method for robust pretraining and fine-tuning multimodal vision-language models. effectively breaks the association between poisoned image-caption pairs by considering a pool of random examples, and (1) matching every image with the text that is most similar to its caption in the pool, and (2) matching every caption with the image that is most similar to its image in the pool. Our extensive experiments show that our method renders state-of-the-art targeted data poisoning and backdoor attacks ineffective during pre-training or fine-tuning of CLIP. In particular, decreases the poison and backdoor attack success rates down to 0% during pre-training and 1%-4% during fine-tuning, and effectively improves the model's performance. § INTRODUCTION Recent large-scale vision-language models pre-trained on millions of image-captions pairs crawled from the internet has gained an unprecedented success. This is evident by their impressive zero-shot transferability of the model to downstream tasks, where natural language is used to describe visual concepts <cit.>. Contrastive pre-trained vision-language models such as CLIP <cit.> and ALIGN <cit.> are trained using a multimodal contrastive loss which pulls the representations of every image-caption pair together while pushing those of different pairs apart. This alleviates the need for expensive labeling of training examples, and enables scaling up the training data to millions of examples. However, the massive data that powers such large models also makes them extremely vulnerable to various types of adversarial attacks <cit.>. =-1 In particular, targeted data poisoning attacks on multimodal models add mismatched image-captions pairs to the pre-training data, to change the prediction of particular images at the test time. Similarly, backdoor attacks overlay a small patch on a subset of training data to cause the model to misclassify test images with the same patch. Notably, poisoning just 0.0001% of the pre-training examples can lead to success of a targeted poisoning attack. Similarly, poisoning 0.01% of pre-training examples can makes a backdoor attack successful <cit.>. Compared to clean-label data poisoning and backdoor attacks in the supervised settings which require poisoning on average 1% of training data <cit.>, attacking multimodal contrastive models requires orders of magnitude fewer poisoned examples. Interestingly, the larger the model, the more vulnerable it is against adversarial attacks <cit.>. Despite this vulnerability, robust pre-training of multimodal vision-language models has remained unaddressed. Recent work of <cit.> studied poison identification during fine-tuning CLIP, by using another trusted pre-trained CLIP to remove dissimilar image-caption pairs. This approach, however, assumes the knowledge of the similarity distribution of the clean and poisoned image-caption pairs, to be able to distinguish them based on a threshold. However, the similarity distribution of poisoned pairs is not available in practice, especially when the exact form of the attack is unknown. The similarity distribution of a backdoor attack is different from a poisoning attack, and specific settings like the patch size of the backdoor can also influence the similarity of poisoned pairs, making it impossible to determine the similarity distribution before training. Importantly, this approach is not applicable to pre-training the model on poisoned data, which is much more vulnerable to adversarial attacks than fine-tuning on a smaller dataset. In this work, we propose the first effective method, namely , for robust training of multimodal vision-language models such as CLIP, against adversarial attacks. Our approach is based on the following key observation: while the similarity between the image-caption pairs of clean examples increases rapidly during the training, similarity between poisoned image-caption pairs grows slowly. As a result, poisoned images and captions are not close to the groups of similar images and captions in the representation space, during the training. To break the association between poisoned image-caption pairs, our main idea is to keep a relatively large and varying pool of randomly selected image-caption pairs. Then, we (1) match every image with the text that is most similar to its caption in the pool, and (2) match every caption with the image that is most similar to its image in the pool. This effectively prevents the attack by breaking the association between poisoned image-caption pairs. Leveraging image and text augmentations, we can effectively defend the model and even improves its performance significantly. Our extensive experiments show that our method renders state-of-the-art targeted data poisoning and backdoor attacks ineffective during pre-training or fine-tuning. In addition, our method leads to an increase of linear probe accuracy by up to 14% and zero-shot accuracy by up to 10 %. We note that is the only effective defense method against state-of-the-art attacks that can efficiently scale to pre-training large-scale vision-language models such as CLIP. § RELATED WORK Contrastive Representation Learning. Contrastive learning was originally proposed for self supervised representation learning from unimodal data. Self-supervised contrastive learning works by maximizing agreement between differently augmented views of the same example and minimizing agreement between differently augmented views of different examples <cit.>. Several works improved the performance of contrastive-learning on downstream tasks by imposing additional constraints to remove redundancy between components of the representation vectors and prevent collapse of the representations <cit.>, or using nearest-neighbor as positive pairs in the contrastive loss <cit.>. =-1 Contrastive Language-Image Pretraining. Multimodal vision-language models like CLIP <cit.> and ALIGN <cit.> are pre-trained on 400M/1B image-text pairs, by maximizing the agreement between representations of matched image-caption pairs and minimizing those of non-matched pairs. A recent line of work aims at improving the data efficiency and quality of CLIP representations, by leveraging image and text augmentations. DeCLIP <cit.> improves data-efficiency of CLIP by maximizing the similarity between two augmented image features using SimSiam <cit.>, two augmented text features using Masked Language Modeling (MLM) <cit.>, and matching augmented image features with their augmented text pairs and other similar text features. SLIP <cit.> improves the performance by maximizing the agreement between two augmented image features using SimCLR <cit.>, and matching the augmented image features with their text pair. CyCLIP <cit.> improves the representations by symmetrization of the similarity between the two mismatched image-text pairs, as well as the similarity between the image-image pair and the text-text pair. Finally, FILIP <cit.> uses transformer-based encoders for both modalities to learn more fine-grained features. Adversarial Attacks on CLIP. Contrastive pretrained language-image models are extremely vulnerable to various types of data poisoning attacks <cit.>. In particular, targeted data poisoning attacks fool the model to misclassify a particular test example as an adversarial label. Backdoor attacks overlay a small patch on a subset of training data, and cause the model to misclassify test images with the same patch. CLIP has been also shown to be vulnerable to data poisoning attacks during fine-tuning <cit.>. Despite this vulnerability, designing effective defenses has remained unaddressed. <cit.> proposed a pre-processing and a post-processing defense for fine-tuning. The pre-processing requires a clean pre-trained CLIP to remove examples with low cosine similarity between image and their corresponding text representation. This requires knowledge of the similarity distribution between clean and poisoned examples, which is not available in particular when the exact form of the attack is not known. The post-processing fine-tunes the poisoned model on another clean dataset of the same scale as the fine-tuning data. This is clearly not applicable to pre-training, due to the very high data and computational requirements. In contrast, we propose a highly effective defense method that can be applied during pre-training or fine-tuning CLIP, without the need for pre- or post-processing. =-1 Defense Strategies in Supervised Setting. Defense against data poisoning attacks has been extensively studied in the supervised settings. Supervised defenses can be divided into data sanitization and robust training. Data sanitization eliminates anomalies that fall outside a spherical radius in feature space <cit.>, activation space <cit.>, spectrum of feature covariance matrix <cit.>, gradients <cit.> or based on nearest neighbors <cit.>. Such methods do not scale to multimodal pre-training on millions of examples. Robust training relies on strong data augmentation <cit.>, randomized smoothing <cit.>, model ensembling <cit.>, bounding gradients <cit.>, adding noise <cit.>, or adversarial training <cit.>. Such methods are not applicable to multimodal models like CLIP, and are often prohibitively slow, or drastically degrade the performance, even in the supervised setting. § PRELIMINARY §.§ Contrastive Language-Image Pre-training (CLIP) CLIP is trained on millions of images caption pairs scraped from the web. Formally, we consider a dataset ⊆× consisting of pairs (_j^I, _j^T) where _j^I∈ is a raw image and _j^T∈ is a text caption. The CLIP architecture consists of an image encoder f_I:→ℝ^d that encodes the raw image x_i^I into an embedding vector _i^I, and a text encoder f_T:→ℝ^d that encodes the raw text _i^T into an embedding vector _i^T of the same dimension. Then projected image and text embeddings _i^I, _i^T are obtained by passing the encoded image and text _i^I, _j^T through their corresponding projection heads. The projected representations are normalized to have unit ℓ_2-norm. Finally, the InfoNCE loss <cit.> is applied to pull the projected embeddings of every image and its corresponding caption together while pushing apart the projected embeddings of the image from other captions in the same mini-batch. Formally, for a mini-batch of N image-captions pairs {(_j^I,_j^T)}_j=1^N, and their projected embeddings {(_j^I,_j^T)}_j=1^N, the CLIP loss is defined as: ℒ_CLIP = -1/2N∑_j=1^N log [ exp(<_j^I,_j^T>/τ)/∑_k=1^N exp(<_j^I,_k^T>/τ) ] -1/2N∑_k=1^N log [ exp(<_k^I,_k^T>/τ)/∑_j=1^N exp(<_j^I,_k^T>/τ) ], where <.,.> represents the inner product, and τ is a trainable temperature parameter. We evaluate CLIP pre-trained with our method using both zero-shot and linear probe methods, as discussed below. Zero-shot classification. Pre-trained Language-Image models such as CLIP enable zero-shot transfer of the model to downstream tasks, i.e., classifying test images by labels not seen at training time. To do so, the downstream labels can be transformed into suitable captions using the provided engineered prompts templates, e.g. “”. Then, the cosine similarity of the test image to each caption is computed, and the model predicts the label with the highest image-caption similarity. Linear probe. For a labeled image dataset, CLIP image representations can also be evaluated by training a linear classifier on the image representations obtained from the pre-trained CLIP image encoder and the corresponding labels. Pre-trained Language-Image models such as CLIP enable zero-shot transfer of the model to downstream tasks, i.e., classifying test images by labels not seen at training time. To do so, the downstream labels can be transformed into suitable captions using the provided engineered prompts templates, e.g. “”. Then, the cosine similarity of the test image to each caption is computed, and the model predicts the label with the highest image-caption similarity. §.§ Poisoning and Backdoor Attacks Let 𝒟 = {(_i^I, _i^T)}_i=1^n be the set of all training examples. Poisoning attacks <cit.> inject a small subset of poisoned examples 𝒟_p to the original training dataset 𝒟, such that when the model is trained on the poisoned training data {𝒟∪𝒟_p}, its prediction on particular test examples are changed to the adversarial label y_adv. At the same time, the poisoned model performs normally on other test examples. In this work, we consider both targeted poisoning and backdoor attacks as we discuss next. Targeted Image attacks. In a targeted attack, the adversary aims to change the prediction of one particular test examples _t^I to the adversarial label y_adv. Targeted poisoning attacks can be crafted following <cit.>, by constructing a caption set _adv of potential text descriptions related to the label y_adv, and making poisons by assigning captions in _adv to every target _t^I, i.e., 𝒟_p={(_t^I, _c^T): _c^T ∈_adv}. For constructing the caption set _adv, one can either search the training dataset for all sequences that contain this label string, and use these sequences as the caption set. Alternatively, one can use the set of 80 different “prompt-engineered” text descriptions provided by CLIP for classification, and either use a subset or repeat them as necessary. The number of captions in _adv determines the number of generated poisons per target. To evade automated cleaning algorithms (e.g., removing duplicated images), tiny Gaussian noise can be added to the image, or the captions can be modified by substituting or adding words, without degrading the attack success rate. A diverse caption set ensures that the image encoder is poisoned instead of the projection layers. Targeted class attacks (fine-tuning). This attack is similar to the targeted poisoning attack, with the difference that instead of a particular _t^I, the adversary aims to change the prediction of an entire target class _t to the adversarial label y_adv during fine-tuning <cit.>. Note that labels of the training examples are available and can be replaced in engineered prompts for fine-tuning CLIP. Having an adversarial caption set _adv as explained above, the poisons are made by assigning captions in _adv to multiple images in the target class _i^I∈_t, i.e., 𝒟_p={(_t^I, _c^T): _c^T ∈_adv, _i^I ∈_t}. Backdoor attacks. In a targeted attack, the adversary attaches a small trigger patch to the poisoned images that are paired with adversarial captions _adv related to y_adv. In doing so, all the test images with the trigger patch will be misclassified as y_adv. Similar to the targeted label attack, instead of using a particular _t^I, we use different images _i^I∈, and add the trigger patch to them. Specifically, we define 𝒟_p = {(_i^I ⊕patch, _c^T): _c^T ∈_adv, _i^I ∈}. The caption set can be constructed in a similar manner to targeted attacks using captions found in the training data. In general, while injecting poisoned examples in curated datasets used for supervised learning might be difficult, such poisons can be easily injected in uncurated datasets used by large multimodal models. This makes such models highly vulnerable to adversarial attacks. § ROBUST TRAINING OF MULTIMODAL MODELS In this section, we first study the effect of data poisoning attacks on multimodal models. Then, we present our method for robust training of such models against data poisoning attacks. §.§ Effect of Data Poisoning Attacks on CLIP By minimizing the CLIP contrastive loss in Eq. (<ref>), the model changes such that every image representation _j^I moves towards its caption representation _j^T and gets far away from other (dissimilar) caption representations _k^T. This makes corresponding categories of image and text (e.g. category of “Cat" or “Dog" in the image and text modality) to get closer to each other and get distant from other categories, during the training. Crucially, as image-caption pairs belonging to a particular category are relatively similar to each other, their gradients have a large alignment with other examples in the same category. Therefore, categories of similar image-caption pairs insert a large cumulative gradient on the model and change the model relatively quickly to get close to their pairs in the other modality. The blue line in Fig. <ref> confirms that the average cosine similarity between image-caption representations of the clean examples increases rapidly during the initial phase of training. On the other hand, image-caption pairs of poisoned examples are not similar to the other clean examples in the data. Hence, their gradient does not align well with the gradient of the clean examples. As the number of poisoned examples is small, such examples introduce a much smaller cumulative gradient on the model. Hence, image-caption pairs of poisoned examples move toward each other at a considerably lower speed. The orange line in Fig. <ref> shows the average cosine similarity between 5 targeted poisoned image-caption pairs of a truck image _t^I poisoned as deer {(_t^I, _c^T): _c^T∈_deer}. We see that the average cosine similarity between poisoned image-caption pairs is smaller than that of clean examples, in particular after a few training epochs. Crucially, this implies that the poisoned images are not very close to the group of similar images, and poisoned captions are not very close to the group of similar captions in the representation space. §.§ Robust Training with To prevent an attack from being successful, we aim to break the association between the poisoned image-caption pairs. If this can be done, the poisoned image and caption representations do not get close enough to each other during training and the attack does not succeed. To achieve this, we rely on our key observation in Sec. <ref>: poisoned images and captions are not close to groups of similar images and captions in the representation space. To break the association between poisoned image-caption pairs, our main idea is to keep a relatively large and varying pool of randomly selected image-caption pairs. Then, we (1) match every image with the text that is most similar to its paired caption in the pool, and (2) match every caption with the image that is most similar to its paired image in the pool. In doing so, we match the poisoned images with a different text than the adversarial caption and match the poisoned caption with a different image than the poisoned image. Fig. <ref> illustrates our method. Note that the randomly selected set of examples in the pool change over time, and the poisoned examples need to be trained on for multiple iterations for the attacks to succeed. Since the number of poisoned examples is small, the probability of more than one poisoned image being in the pool during several iterations is negligible. Therefore, a poisoned caption is not matched to a poisoned image multiple times to be learned. At the same time, as the pool is relatively large, matching the images with a similar caption and matching the captions with similar images do not considerably hurt the performance. Therefore, our method is able to disassociate the poisoned image-caption pairs and effectively break the poisoning attacks, while preserving the superior accuracy of the model. As shown in Fig. <ref>, throughout the training, majority of the clean images and captions are paired with captions and images in the same category. On the other hand, poisoned images and captions are paired with captions and images in other categories. Hence, they cannot poison the model to associate the adversarial text category to the target images. Fig. <ref> shows nearest neighbors of image and caption of a clean and a poisoned example during the training. In addition, to further prevent the poisoned samples from being paired with other poisoned samples that potentially exist in the pool, we use various image and text augmentations. Finding nearest neighbors based on augmented image and text representations further prevent poisoned images and text to match with other poisoned text or images. In particular, we use random image cropping, horizontal flipping, color jittering <cit.>, grayscale conversion <cit.>, and blurring <cit.> in our image augmentation policies. For the text augmentation, we use the EDA proposed by <cit.>, which includes synonym replacement, random swap, and random deletion as its augmentation policies. Each text will randomly select one policy for augmentation. The combination of NN and data augmentation not only defends the model against data poisoning and backdoor attack but also significantly improves the performance of the model, as shown in Table <ref>. We formally present our method below. First, we sample a pool of P image-caption pair representations 𝒫={(_i^I,_i^T)}_i=1^P as the representative of the distribution of data representations. During training, for every example (_j^I,_j^T) in the mini-batch, we first augment its image and text with our augmentation policies, and then match its augmented image representation _j^I with the augmented caption representation in the pool that is most similar to _j^T, i.e., _nn(j)^T=min__p^T∈𝒫_j^T-_p^T_2. Effectively, we form the positive image-caption representation pair (_j^I,_nn(j)^T) and use it instead of (_j^I,_j^T). Similarly, for the caption _j^T, we find the most similar image representation to _j^I in the pool, i.e., _nn(j)^I=min__p^I∈𝒫_j^I-_p^I_2 and form the positive image-caption representation pair (_nn(j)^I,_j^T) to use instead of (_j^I,_j^T). Similar to the CLIP loss, we obtain the negative pairs from the mini-batch. That is, for a mini-batch of N image-captions pairs {(_j^I,_j^T)}_j=1^N, and their projected embeddings {(_j^I,_j^T)}_j=1^N, the loss is defined as: =-1 ℒ_= -1/2N∑_j=1^N log [ exp(<_j^I,_nn(j)^T>/τ)/∑_k=1^N exp(<_j^I,_nn(k)^T>/τ) ] -1/2N∑_k=1^N log [ exp(<_nn(k)^I,_k^T>/τ)/∑_j=1^N exp(<_nn(j)^I,_k^T>/τ) ], For the pool 𝒫, we consider a first-in-first-out queue, which is initialized with P randomly selected image-caption pairs. We chose P large enough so that it represents the full image-caption distribution in the representation space. After training on every mini-batch, we update 𝒫 by taking the image and caption representations of the N examples in the mini-batch and concatenating them at the end of the queue. We discard the oldest N elements from the queue. § EXPERIMENTS In this section, we evaluate the effectiveness of our method in breaking targeted data poison and backdoor attacks while maintaining the model's performance. We evaluate our method for defending against various data poisoning and backdoor attacks, described in Sec. <ref>, during pre-training and fine-tuning CLIP. §.§ Datasets We use Conceptual Captions 3M (CC3M) <cit.> as our pre-training dataset and MSCOCO <cit.> as our fine-tuning dataset. Due to limited computational resources, for pre-training we randomly sampled 1M image-caption pairs from CC3M as our training dataset. For MSCOCO, we used the 25% split proposed by <cit.>. We assess our method on 10 more downstream datasets introduced by <cit.>, the detail of which can be found in Table <ref>. §.§ Training We evaluate during pre-training and fine-tuning CLIP. For pre-training, we use an open-source implementation of CLIP as our model, with default ResNet-50 as the image encoder and Transformer as the text encoder. Each experiment is run with a batch size of 512 for 30 epochs. For fine-tuning, we use the Open AI's released ViT-B/32 parameters to initialize our pre-trained model. Each experiment is run with a batch size of 128 for 30 epochs. The hyperparameter settings follow the one used by the original CLIP paper <cit.>. §.§ Attack Methods We consider targeted image attacks, targeted class attacks, and backdoor attacks, discussed in Sec. <ref>. Targeted Image Attacks The goal of the targeted image attacks is to poison the model to classify a particular image _t^I into the adversarial label y_adv without harming the performance of the model on other images. As shown empirically in <cit.>, 3 poisoned samples out of 3 million examples are enough to fool the model into misclassifying the target image by the adversarial label. We evaluate against targeted image attacks during pre-training and fine-tuning CLIP. In our pre-training experiment, we choose a random target image _t from the conceptual captions validation set, and then choose a random target class from the ImageNet test set to generate a set of |_adv|=15 adversarial captions. Note that, <cit.> pre-trained 32 CLIP models and measured the attack success rate as the fraction of positioned models. This requires 3200 GPU hours. To reduce the computation, we poisoned 32 different random images by generating 15 adversarial captions related to a label selected at random from ImageNet. Then, we report the attack success rate as the number of images that are classified as the adversarial label, in a single pre-training run. In doing so, the attack success will be at least as high as <cit.>. In addition, note that attacking our smaller dataset of 1M examples also results in a higher attack success rate compared to that of 3M used by <cit.>. In our fine-tuning experiment, we follow the same procedure as <cit.>. We select two random classes from MSCOCO, and poison 100 images from each class by replicating each image 3 times, and using an adversarial label for them. We use two adversarial labels selected at random from MSCOCO. In total, 600 poisoned images are injected to the training set. Targeted Class Attacks (fine-tuning) The goal of the targeted class attacks is to make the model miclassify an entire class of images _t by the adversarial label y_adv, without harming its performance on other classes. Note that this attack is specific to fine-tuning on a labeled dataset, since image-caption datasets like CC3M do not have class information. We select two random classes from MSCOCO as the adversarial labels and chose 100 images from each class as our target images. Since misclassifying the whole class demands stronger poison, each poisoned image is replicated 5 times as opposed to 3 in the targeted image attack, so there are in total 1000 poisoned images injected to the training set. We measure the attack success rate on the validation set of the poisoned classes. Backdoor Attacks The goal of the backdoor attacks is to make the model misclassify any image with the backdoor patch to the desired class label. We use the public Hidden Trigger Backdoor Attacks (HTBA) patches <cit.>, that are square triggers generated by drawing a random 4x4 matrix of colors and resizing it to the desired patch size using bilinear interpolation. We use a resized 16x16 patch and put it consistently on the left top corner of the image. We evaluate the effectiveness of backdoor attacks during pre-training and fine-tuning. As shown empirically in <cit.>, a 0.01% poison ratio is enough to create a backdoor in the CLIP model trained on 3M data. Thus, we used 0.01% backdoor ratio for both our pre-training and fine-tuning experiments. In our pre-training experiments, we randomly select 100 images from the CC3M dataset and pair them with adversarial captions related to a random target class from ImageNet. To evaluate the effectiveness of the backdoor attacks, we select 100 random images from the ImageNet validation set and patch them in the left top corner. For fine-tuning, we randomly select 15 images from the MSCOCO dataset and label them as a another random target class from MSCOCO. For evaluation, we select 100 random images from ImageNet validation set and patch them in the left top corner to measure the attack success rate. §.§ robustly Pre-trains CLIP First, we evaluate the effectiveness of our method, , against poisoning and backdoor attacks during the pretraining phase. We present our result in Table <ref>. We define the attack success rate as the fraction of poisoned or backdoored images successfully classified as the desired label. We see that without any defense, 45% of the total poisoned images are classified to the desired target class. Moreover, the 52% of the total backdoored images unseen in the training set are classified to the desired target class. On the other hand, is able to fully defend the attack and reduce the attack success rate to 0% for both the backdoor and the poisoning attacks. This clearly confirms the effectiveness of in breaking various types of data poisoning and backdoor attacks on CLIP during pre-training. §.§ Robustly Fine-tunes CLIP Next, we evaluate how effective is against data poisoning and backdoor attacks during the fine-tuning phase. We present our result in Table <ref>. Since every example in MSCOCO has a caption and a class label, we use text retrieval as our downstream evaluation task. Following <cit.>, we construct our test set by selecting 50 image-caption pairs from each of the 78 classes of the MSCOCO dataset, excluding the two classes that have fewer than 50 instances. To do text retrieval, we calculate the similarity between the representation of test image and the the representations of all the captions from the test set. Then, we select the topk captions with the highest similarity as our retrieved captions. We use hit@k ratio as our retrieval metrics, defined as the fraction of poisoned images whose topk retrieved captions include the captions from the target label. A higher hit@k ratio indicates a higher fraction of images being successfully poisoned. We consider 3 commonly used values for k∈{1,3,5}. As shown in Table <ref>, all three attacks are highly effective, which is indicated by their high hit@k ratios on CLIP. The Hit@5 ratio on targeted image attack is 80% (compared to 12.5% on clean model). The targeted class attack is 16% (compared to 7.5% on clean model), and the backdoor attack Hit@1 is 85% (compare to 1% on clean model). On the other hand, is able to effectively defend the attacks and provide a similar or even lower hit@k ratio than that of the clean model on all k∈{1,3,5} and all attacks. This clearly confirms the effectiveness of in breaking various types of data poisoning and backdoor attacks on CLIP during fine-tuning. Note that the Hit@k ratio is not 0 even for the CLIP model trained on clean dataset. This is also confirmed by <cit.>. §.§ Does not Hurt the Performance Last but not least, we evaluate if negatively impacts the model performance. We assess the performance of on a variety of datasets introduced by <cit.>, the detail of which can be found in Table <ref>. We evaluate with both zero-shot and linear-probe methods and compare its performance with the standard pretrained CLIP. Both and CLIP are trained on the clean 1M CC from scratch. Each experiment is run with a batch size of 512 for 30 epochs. We present our result in Table <ref>. As shown, our method does not harm the overall model performance. In contrast, effectively improves the classification performance across all ten datasets on both zero-shot and linear probing, up to 10% on Caltech101 on zero-shot and 14% on DTD. § CONCLUSION We proposed RoCLIP, an effective method for robust training multimodal vision-language models such as CLIP against data poisoning and backdoor attacks. Our method utilizes the nearest neighbor as well as random data augmentation to break the associations between the poisoned image and caption pairs, thus effectively defending the models. Through extensive experiments, we demonstrated that our proposed method drops the attack success rate down to 0% on both image target attack and backdoor attack and 2.5% on label target attack. At the same time, it improves the model's performance by up to 12% compared to the baseline CLIP model. icml2022
http://arxiv.org/abs/2303.07072v1
20230313124815
A two-stage speaker extraction algorithm under adverse acoustic conditions using a single-microphone
[ "Aviad Eisenberg", "Sharon Gannot", "Shlomo E. Chazan" ]
cs.SD
[ "cs.SD", "eess.AS" ]
Spatial Attention and Syntax Rule Enhanced Tree Decoder for Offline Handwritten Mathematical Expression Recognition Zihao Lin1 Jinrong Li2 Fan Yang1Shuangping Huang13Xu Yang4 Jianmin Lin2Ming Yang2 March 30, 2023 =================================================================================================================== In this work, we present a two-stage method for speaker extraction under reverberant and noisy conditions. Given a reference signal of the desired speaker, the clean, but the still reverberant, desired speaker is first extracted from the noisy-mixed signal. In the second stage, the extracted signal is further enhanced by joint dereverberation and residual noise and interference reduction. The proposed architecture comprises two sub-networks, one for the extraction task and the second for the dereverberation task. We present a training strategy for this architecture and show that the performance of the proposed method is on par with other SOTA methods when applied to the WHAMR! dataset. Furthermore, we present a new dataset with more realistic adverse acoustic conditions and show that our method outperforms the competing methods when applied to this dataset as well. Speaker extraction, Dereverberation § INTRODUCTION Extracting a desired speaker from a mixture of overlapping speakers using only a single microphone is a cumbersome task, particularly in noisy and reverberant environments. In this paper, we address this challenge by focusing on the extraction of a single participant from a mixture of two speakers acquired by a single microphone, given a prerecorded utterance of the speaker to be extracted. There has been significant progress in the single-microphone BSS domain in the past years. The Conv-Tasnet <cit.> and the DPRNN <cit.>, are both applied in the time domain with similar encoder-masking-decoder architecture. Other works that followed this approach were presented <cit.>, demonstrating a considerable improvement in the separation results. The SepFormer was introduced in <cit.> leveraging the benefits of the attention layers, which led to a significant improvement in performance and to SOTA results. An efficient CNN-based model, denoted Sudo rm-rf, was presented in <cit.> and demonstrated high separation capabilities. Most of the above-mentioned BSS models were trained and tested on clean and anechoic mixtures. Such acoustic conditions can hardly be met in reality. Several algorithms <cit.> were also trained on reverberant data without any changes in their architecture. Cord-Landwehr et al. showed in <cit.> that despite the significant improvement achieved in clean conditions, only marginal improvements can be obtained in realistic reverberant and noisy conditions. Given a reference signal of the desired speaker turns the BSS problem into an extraction problem, in which the permutation problem is alleviated. The SpeakerBeam algorithm, introduced in <cit.>, estimates a mask for the desired speaker in the spectral domain using the spectrum of the reference signal. While magnitude-domain processing might be sufficient in clean and anechoic conditions, it might be insufficient in noisy and reverberant conditions. In <cit.>, this model was improved by using the time-domain signal, as it allows the exploitation of the entire signal information. A similar approach was presented in <cit.>, where the i-vector <cit.> of the reference signal was used as the embedding of the desired speaker. In <cit.>, a multi-task training procedure was proposed in which a speaker classification task is carried out in parallel for improving the embedding of the desired speaker. Time domain processing, despite the above advantages, ignores the time-frequency patterns typical to speech signals. In our prior work, <cit.>, a fully convolutional Siamse-Unet architecture was proposed. The algorithm is applied in the STFT domain to the Real-Imaginary (RI) representation of the signals while the loss is applied in the time-domain, exploiting the entire signal, on the one hand, and leveraging its spectral patterns, on the other hand. Yet, the performance of this approach is insufficient in adverse acoustic conditions. In the current contribution, we present a two-stage algorithm to extract a desired speaker from a mixture of two signals under reverberant and noisy conditions. We split the extraction task into two stages. In the first stage, given the noisy and reverberant mixture and the reference signals, a Siamse-Unet architecture is applied to extract the reverberant desired speaker. The encoders used for both the mixture and the reference signals are identical, thus the resulting outputs have matching dimensions. While the mixture encoder preserves the frame dimensions, which is essential for the mixture processing, the reference encoder aims to exclusively represent the desired speaker's identity while ignoring the content of the utterance. To achieve this outcome, we average the reference embedding over the frame dimension. The reference embedding vector is finally multiplied with each of the frames in the mixture embedding. The outcome of this multiplication is used as an input to the decoder, which in turn extracts the reverberant desired speaker. We show that training this stage in an iterative manner is beneficial. In the second stage, an additional Unet model is applied to dereverberate and enhance the output of the first stage. Similarly, the encoder output preserves the frame size of its input signal. The resulting embedding is multiplied by the embedding of the reference from the first stage. The second decoder is finally applied to extract the desired clean and dereverberated signal. Furthermore, in this paper, we introduce a new simulated dataset with more realistic conditions than the WHAMR! dataset, and show that our model outperforms other SOTA models on both the WHAMR! dataset and the new, more challenging, dataset. § PROBLEM FORMULATION The signal x(t), captured by a single microphone, is a combination of Q concurrent speakers, represented by: x(t) = ∑^Q_q=1{s_q∗h_q}(t) + v(t) t=0,1,…,T-1 where s_q(t) is the signal of the qth speaker, h_q(t) is the RIR between the qth speaker position and the microphone position, and v(t) is an additive noise. In a noise-free, non-reverberant environment, h_q(t) is dominated by the first arrival, and v(t)=0 for all q. In the STFT domain, the microphone signal can be approximately expressed as: x(n,k) = ∑^Q_q=1 s_q(n,k) h_q(n,k) + v(n,k) where n=0,1,…,N-1 and k=0,1,…,K-1 represent the time-frame and frequency-bin indexes, respectively, and N and K are the total number of time-frames and frequency bands, respectively. This paper focuses on the case where there are only two concurrent speakers, namely Q=2, referred to as the desired speaker s_d(n,k) and the interference speaker s_i(n,k). The reverberant desired signal is defined as s̃_d(n,k) = s_d(n,k) h_d(n,k). The reference signal is denoted s_d^ref(n,k). We aim at the extraction of the desired speaker signal, ŝ_d(n,k), using the mixed signal x(n,k), and a reverberant reference signal, s̃_d^ref(n,k) = s_d^ref(n,k) h_d^ref(n,k). § PROPOSED MODEL §.§ Architecture and Training Procedure Our model is composed of two sub-stages. The first is a Simase-Unet, which consists of three parts: two encoders and a decoder. We share weights between the encoders to encourage joint embeddings of both the mixture and the reference signals in the same latent space. The encoder architecture consists of several convolution layers followed by two-dimensional batch normalization and a `Relu' function (similar to the one introduced in <cit.>). Next, we combine the dimensions of the channels and frequencies and employ a fully-connected layer to reduce the dimensions. After this step, we apply a single transformer-encoder layer. The decoder architecture consists of six transformer-encoder layers, followed by FC layer to restore the original dimension. Then transpose-convolution layers are employed to adapt to the convolution layers in the encoder, enabling the application of skip connections as required. A transformer-encoder layer is subsequently applied after all the steps mentioned above. We repeat the first stage several times to further enhance the extraction process. In the first iteration, the mixture signal is processed, while in the subsequent iterations, the separated (but still reverberant) signals from the previous iteration are processed. Formally, the process can be expressed as: Input^(ℓ) = x(n,k) ℓ=0 ŝ̃̂_d^(ℓ-1)(n,k) ℓ>0 where ℓ = 0,...,L-1 is the iteration index. By repeating this process for L iterations, we obtain L estimates of s̃_d(n,k), which are all used to train the entire model. The second stage of the model uses the same architecture as the first stage. Our empirical results showed that using the reveberant reference signal in the second phase can improve the results. Rather than passing the reference signal again through an encoder, we can simply use the learned embedding vector from the first stage. Alternative ways for integrating the information from the reference signal are described in <cit.>, including concatenation, addition, and multiplication, the latter achieving the best results. To obtain a single vector that represents the speaker's identity, we average across the frame dimensions of the reference embedding, thus ignoring the temporal information and emphasizing the speaker's identity. The final embedding vector is denoted E^ref_d. Unlike <cit.>, in the Unet architecture, skip connections are only implemented from the mixture encoder and not from the reference encoder. Instead, we only use the output of the last layer of the reference encoder in the bottleneck stage. While most single microphone DNN-based algorithms apply a masking operation to the mixture signal, the proposed scheme is trained to directly estimate the TF representation of the target source. The two sub-stages are trained together in an end-to-end manner, while the first stage feeds the second phase with an estimate of the last iteration of the first stage and the reference embedding. A block diagram of the entire model is shown in Fig. <ref>. §.§ Features In this work, we adopted the RI components of the STFT as both the input features of the model and its output. The model is trained with the SI-SDR loss function, which is sensitive to phase distortion. Using the RI features may alleviate such problems (see discussion in <cit.>). §.§ Objectives As mentioned above, we use the SI-SDR loss function to train our model. The loss is formulated as SI-SDR( s,ŝ)= 10 log_10( ⟨ŝ,s⟩/⟨s,s⟩ s^2/⟨ŝ,s⟩/⟨s,s⟩ s-ŝ^2). The model is trained using all output signals, namely, ŝ_d and ŝ̃̂_d^(ℓ), ℓ = 0 , … , L-1: ℒ_SISDR_d = ∑_ℓ=0^L-1SI-SDR( s̃_d, ŝ̃̂_d^(ℓ)) + SI-SDR( s_d,ŝ_d ). For the extraction task to be successful, the network must be able to learn a unique embedding for each speaker to prevent errors in identifying the correct speaker. To achieve this goal, an additional, triplet loss function, was implemented: TRIPLET(a,p,n) = max( cd(a,p) - cd(a,n) + m, 0) where a is the anchor input, p is the positive input and n is the negative input, with p closer to a than n. The function cd(·) is the cosine distance and m is a margin hyperparameter. The triplet loss function encourages the distance between the anchor and the positive inputs to be smaller than the distance between the anchor and negative inputs, by a margin of at least m. In our case, we would like the embedding of the reverberant reference to be as close as possible to the embedding of the output of the first phase (namely, the estimated desired and reverberant speaker), and as far as possible from the embedding of the reference of the second speaker. In explicit terms: ℒ_TRIPLET_d = TRIPLET(E_ŝ̃̂_d,E^ref_d,E_d^ref ) where E_ŝ̃̂_d is obtained by passing ŝ̃̂_d_L-1 through the encoder of stage 1 and E_d^ref is the embedding of the reference of the interference signal. During training, we encountered a convergence problem when using both loss functions simultaneously. To address this issue, we implemented a warm-up training procedure in which the network is initially trained using only the SI-SDR loss, and the triplet loss is added at a later stage in the training process. This approach successfully resolved the convergence issues. In an effort to improve the training process, we alternated the desired and interference signals within each training batch, while maintaining consistency in the mixture employed. That is, inserting the mixture signal with the reference signal of one of the speakers and then repeating the process with the reference of the other speaker in the same batch, and summing the losses for both speakers. In short, the overall loss function takes the following form: ℒ = (ℒ_SISDR_d + ℒ_SISDR_i)/2 + α·1_warm-up· (ℒ_TRIPLET_d + ℒ_TRIPLET_i )/2 where α represents a hyperparameter, and the indicator function 1_warm-up determines the point at which the triplet objective function should be taken into consideration in the training process. § EXPERIMENTAL STUDY §.§ Datasets We used the WHAMR! dataset to train our model. This dataset is created by taking the WSJ0-2Mix dataset <cit.> and modifying it by incorporating environmental noise from the WHAM dataset <cit.> and reverberation. To adapt the dataset to the extraction task, we modified it in the following manner. For each speaker included in the mixture, we selected a different utterance and convolve it with the same room impulse response (RIR) used to generate the mixed signal, namely h_d^ref = h_d. This procedure reflects the fact that in a typical conversation, segments in which only a single speaker is active can always be found. However, it is implicitly assumed that the scenario is static, hence that the RIR does not significantly change during the entire conversation. We note that, according to our tests, the reverberation level in the WHAMR! dataset does not exceed 600 milliseconds, in contradiction to the reported reverberation level, which is in the range of [0.2, 1].[Due to space constraints, we will not give a detailed analysis of the dataset in the current contribution.] The dataset includes 20,000 signals for training, 5,000 for validation, and 300 for the test phase, and it uses the `min' and `8k' sampling rate configuration. (With `min' setting the longer target is truncated to match the length of the shorter target.) In addition to WHAMR!, we generated a new dataset for the purpose of enriching the data. This is equivalent to dynamic mixing training, which randomly generates the mixture from the existing speakers during training. We also took speakers from the WSJ0 corpus, along with noise from the WHAM and the reverberation generated from an RIR generator <cit.> with parameters listed in Table <ref>. During training, each signal is truncated to a variable length between 2 to 5 seconds. Since we are using a Siamese architecture, the mixture and the reference signal must have the same length. If the reference signal is longer, it will be truncated, and if it is shorter, it will be duplicated until it is the same length as the mixture. §.§ Algorithm Settings The frame-size of the STFT is 256 samples with 50% overlap. Due to the symmetry of the DFT only the first half of the frequency bins are used. The value of α was empirically set to 2, emphasizing the triplet loss due to the significant difference in scales between the two objective functions. The triplet loss margin was set to m=0.5. The number of iterations for the first phase was chosen as L=2, because there was minimal improvement when increasing the number from 2 to 3 iterations, while a noticeable improvement was observed between 2 iterations to no iterations, L=1. In the training procedure, we used the Adam optimizer <cit.>. The learning rate was set to 0.001 and the training batch size to 6. The weights are randomly initialized, and the lengths of the signals were randomly changed at each batch. §.§ Evaluation Measures To evaluate the proposed algorithm we use five evaluation measures: SI-SDR, SIR, SDR, STOI, and PESQ. While the first three are used as a measurement of the quality of the speaker separation, the last two give an indication of the audio intelligibility and quality. The proposed algorithm is compared to the current SOTA separation methods, i.e., the Sepformer <cit.> and the Sudo rm-rf <cit.>. These are time-domain blind source separation masking-based methods. We decided to compare our method with separation methods rather than extraction methods since these are the most effective methods in the field. §.§ Results The results for the WHAMR! dataset are depicted in Table <ref>. Our model achieves an SI-SDR of 9.67 dB, SDR of 10.88 dB, and SIR of 24.2 dB. It is evident that our proposed method outperforms the SOTA methods in almost all measures. In addition, the method also achieves the best scores for the intelligibility measure (STOI) and the quality measure (PESQ), with scores 92% and 2.72, respectively. The new dataset imposes a greater challenge on the extraction algorithm, as evidenced by the lower scores in Table <ref> for all measures, compared to the scores obtained on the WHAMR! dataset, as reported in Table <ref>. While the absolute separation results obtained for the new dataset are lower, the improvement in terms of SI-SDR is 14.2 dB, which is very high and significantly outperforms the competing methods. The intelligibility results (90.2%) are on par with the results obtained for the WHAMR! dataset. §.§ Ablation Study We present an ablation study for our model. We examined four different configurations: * One iteration in the first stage. The loss function for the desired source is given by: ℒ_SISDR_d = SI-SDR( s̃_d, ŝ̃̂_d^(L-1)) + SI-SDR( s_d,ŝ_d ) with L = 1, and the overall loss is given by ℒ = (ℒ_SISDR_d + ℒ_SISDR_i)/2. Triplet loss is not applied. * Two iterations in the first stage. The SI-SDR loss is only applied to the final output ŝ̃̂_d^(L-1), i.e. L=2 in (<ref>). Triplet loss is not applied. * The SI-SDR loss is applied to all intermediate results ℓ=0,…, L-1, as in (<ref>), with L=2. Triplet loss is not applied. * The full implementation of the proposed model with all its components active. Table <ref> depicts the breakdown of the results for the WHAMR! and the new datasets. It is evident that each additional component enhances the quality of the network output for both datasets. In total, the SI-SDR measure improved from 8.62 dB to 9.67 dB for the WHAMR! dataset and from 5.45 dB to 6.21 dB for the new dataset. Respectively, STOI improved from 90.4% to 92% for WHAMR!, and from 88% to 90.2% for the new dataset Training the model to accurately identify the intended speaker from a mixture is challenging in speaker extraction, particularly in reverberant conditions and when the speakers have similar voices. This may result in the extraction of the incorrect speaker or a permutation between the output signals. To address this issue, the triplet loss was added. Our experiments showed that the addition of the triplet loss alleviated such permutation problems. § CONCLUSIONS We have proposed a two-stage approach for speaker extraction under reverberant conditions. The first stage separates the desired and yet reverberated speaker, while the second stage reduces reverberation and further enhances separation quality. Our results indicate that our model performs comparably or better than current state-of-the-art separation methods, with the added benefits of faster and more consistent training. Furthermore, an ablation study identifies the role of the various components in improving performance. IEEEtran
http://arxiv.org/abs/2303.07276v1
20230313165106
Optimization of Cryptocurrency Miners' Participation in Ancillary Service Markets
[ "Ali Menati", "Yuting Cai", "Rayan El Helou", "Chao Tian", "Le Xie" ]
eess.SY
[ "eess.SY", "cs.SY" ]
printacmref=false plain 20222022 acmcopyright [e-Energy '22]The Thirteenth ACM International Conference on Future Energy SystemsJune 28–July 1, 2022Virtual Event, USA The Thirteenth ACM International Conference on Future Energy Systems (e-Energy '22), June 28–July 1, 2022, Virtual Event, USA 15.00 10.1145/3538637.3538867 978-1-4503-9397-3/22/06 ruled algorithmtbploa algorithm plain thm definition defn plain lem plain cor ifundefineddefinecolor for each S[FOR]ForEach[1] #1 1
http://arxiv.org/abs/2303.06708v1
20230312170233
Thermal regulation in thin vascular systems: A sensitivity analysis
[ "K. B. Nakshatrala", "K. Adhikari" ]
math.NA
[ "math.NA", "cs.NA", "physics.flu-dyn" ]
=0.1 1.6pt 0.4pt Thermal regulation in thin vascular systems: A sensitivity analysis 0.4pt 1.6pt An e-print of the paper is available on arXiv. Authored by K. B. Nakshatrala Associate Professor, Department of Civil & Environmental Engineering University of Houston, Houston, Texas 77204. phone: +1-713-743-4418, e-mail: knakshatrala@uh.edu website: http://www.cive.uh.edu/faculty/nakshatrala K. Adhikari Graduate Student, Department of Civil & Environmental Engineering University of Houston, Houston, Texas 77204. 2023 Computational & Applied Mechanics Laboratory One of the ways natural and synthetic systems regulate temperature is via circulating fluids through vasculatures embedded within their bodies. Because of the flexibility and availability of proven fabrication techniques, vascular-based thermal regulation is attractive for thin microvascular systems. Although preliminary designs and experiments demonstrate the feasibility of thermal modulation by pushing fluid through embedded micro-vasculatures, one has yet to optimize the performance before translating the concept into real-world applications. It will be beneficial to know how two vital design variables—host material’s thermal conductivity and fluid’s heat capacity rate—affect a thermal regulation system’s performance, quantified in terms of the mean surface temperature. This paper fills the remarked inadequacy by performing adjoint-based sensitivity analysis and unravels a surprising non-monotonic trend. Increasing thermal conductivity can either increase or decrease the mean surface temperature; the increase happens if countercurrent heat exchange—transfer of heat from one segment of the vasculature to another—is significant. In contrast, increasing the heat capacity rate will invariably lower the mean surface temperature, for which we provide mathematical proof. The reported results (a) dispose of some misunderstandings in the literature, especially on the effect of the host material’s thermal conductivity, (b) reveal the role of countercurrent heat exchange in altering the effects of design variables, and (c) guide designers to realize efficient microvascular active-cooling systems. The analysis and findings will advance the field of thermal regulation both on theoretical and practical fronts. [ [ March 30, 2023 ================== § A LIST OF MATHEMATICAL SYMBOLS AND ABBREVIATIONS ll1cSymbol 1cDefinition 2cOperators · jump operator across the vasculature Σ · average operator across the vasculature Σ div[·] spatial divergence operator grad[·] spatial gradient operator 2cGeometry-related quantities Ω domain (i.e., mid-surface of the body) ∂Ω boundary of the domain Γ^ϑ part of the boundary with prescribed temperature Γ^q part of the boundary with prescribed heat flux Σ curve representing the vasculature d thickness of the body 𝐧(𝐱) unit outward normal vector to the boundary 𝐧^±(𝐱) unit outward normal vector on either sides of Σ s normalized arc-length along Σ, measured from the inlet under forward flow 𝐭(𝐱) unit tangential vector along Σ 𝐱 a spatial point 2cSolution fields ϑ(𝐱) temperature (scalar) field ϑ^(f)(𝐱) temperature field under forward flow conditions ϑ^(r)(𝐱) temperature field under reverse flow conditions ϑ_outlet outlet temperature 𝐪(𝐱) heat flux vector field 2cPrescribed quantities ϑ_amb ambient temperature ϑ_inlet inlet temperature f(𝐱) power supplied by heat source f_0 a constant power by heat source Q volumetric flow rate in the vasculature 2cMaterial and surface properties κ host material's thermal conductivity ρ_f fluid's density c_f fluid's specific heat capacity h_T (combined) heat transfer coefficient 2cOther symbols η thermal efficiency ϑ spatial mean of the temperature field (i.e., mean surface temperature) ϑ_HSS spatial mean of hot steady-state temperature ṁ mass flow rate in the vasculature, ṁ = ρ_f Q χ heat capacity rate of the fluid, χ = ṁ c_f ξ(𝐱) an arbitrary design field variable Φ[·] objective functional DΦ[ξ(𝐱)] Fréchet derivative of functional Φ with respect to ξ(𝐱) 2cAbbreviations hot steady-state mean surface temperature quantity of interest § INTRODUCTION AND MOTIVATION Moving fluids through embedded vasculatures offers environmental-friendly solutions to many thermal regulation applications. For example, a geothermal system—a renewable energy source—comprises a network of pipes in the ground and thrusts a ct ofluid (typically water) to extract thermal energy from the subsurface to heat homes and appliances <cit.>. Another application, which is becoming popular, is using vascular-based thermal modulation to de-ice grounded aircraft instead of toxic anti-freeze chemicals, which pollute groundwater and soils if not correctly handled <cit.>. In separate developments, researchers avail fluid flow in embedded vesicles for controlling temperature fields to achieve other vital functionalities in synthetic composites, such as electromagnetic modulation <cit.>, in situ self-healing <cit.>, and reduced thermal stresses <cit.>. Given these and many other potential applications, recent progress across several scientific fields provides perfect opportunities to spur the growth of thermal regulation in microvascular composite and metal systems. These fields include experimental heat transfer (e.g., optical imaging <cit.>), fabrication techniques (e.g., 3D printing <cit.>, frontal polymerization <cit.>), modeling methods (e.g., reduced-order models <cit.>), numerical formulations (e.g., stabilized formulations for convection-dominated problems <cit.>), and design approaches (e.g., topology optimization <cit.>). Nevertheless, two aspects need a thorough examination in perfecting such microvascular systems. First, one must identify suitable quantities of interest (QoIs) that can assess the system's performance; for example, thermal efficiency is a popular performance metric in heat transfer and thermodynamics studies. In mathematical optimization jargon, an objective function is a popular alternative to QoI; herein, we use these two terms interchangeably. Upon a selection, a designer's goal would be to “extremize" (maximize or minimize, depending on the choice) the chosen objective function. Selecting appropriate objective functions for thermal regulation—from either a design perspective or computational appeal—is still an unsettled question, certainly warranting an in-depth study; nonetheless, such an investigation is beyond this paper's scope. That said, studies involving thin members often aim to minimize the mean surface temperature (MST) <cit.>. Also, as this paper shows, minimizing MST is equivalent to maximizing cooling efficiency. Because of these two reasons, we take MST as the quantity of interest and defer exploring alternatives to a follow-up article. But a natural question arises: * What are the ramifications of minimizing the mean surface temperature on other thermal characteristics? Said differently, what equivalent changes does it bring to the system? Second, one needs to identify an appropriate set of design variables: geometrical, material, and input parameters that a designer can vary to alter the system’s performance. Several studies have explored geometrical attributes, such as altering vasculature layout (e.g., spiral) and changing the spacing among branches <cit.>. However, prior studies have not adequately investigated the effects of the host material’s thermal conductivity and the fluid’s heat capacity rate (product of fluid's heat capacity, a material parameter, and volumetric flow rate, an input parameter). Further, a diligent look at the literature reveals an unresolved issue: studies have indicated that the host material’s conductivity does not significantly affect the mean surface temperature or thermal efficiency (e.g., see <cit.>). But a simple thought experiment conjectures the possibility of the opposite: A higher conductive host material will offer lower resistance to the heat flowing towards the sink—the coolant flowing in the vasculature. Thus, the flowing fluid will take out a higher percentage of supplied heat to the system—meaning a higher thermal efficiency and a lower MST. Ergo, there is a clear-cut dichotomy. Indeed, as we will show later in this paper, the situation is more intriguing than the discussion heretofore. Thus, a related key question is: * How does altering the design variables—the fluid's heat capacity rate and the host material's thermal capacity—vary the mean surface temperature? This paper comprehensively addresses the above-outlined two questions: We will use integral theorems to answer the first question, while a mathematical sensitivity analysis alongside finite element simulations will address the second. The workhorse for both integral theorems and sensitivity analysis is a reduced-order mathematical model for which <cit.> has recently provided a theoretical underpinning. In addition, we use the adjoint state method for the sensitivity analysis to assess how the design variables affect the quantity of interest. The adjoint state method—a powerful technique to calculate design sensitivities—is widely used in optimal control theory <cit.>, inverse problems <cit.>, PDE-constrained optimization <cit.>, tomography problems <cit.>, shape and topology optimization <cit.>, material design <cit.>, and dynamic check-pointing <cit.>, to name a few. The chief advantage of the adjoint state method is that it circumvents an explicit calculation of the solution field's sensitivity to a design variable. This circumvention is attractive to this study, as our primary intention is to assess the sign of the sensitivity (positive or negative): whether the design variable promotes or hinders the QoI. The adjoint state method allows us to do so without explicitly calculating the solution field. The results presented in this paper provide a deeper understanding of active cooling and pave a systematic path for a mathematical-driven material design of thermal regulation systems. The plan for the rest of this article is as follows. We first present the governing equations for the direct problem: a reduced-order mathematical model describing vascular-based thermal regulation (<ref>). Using this model, we then deduce the ramifications of minimizing the mean surface temperature—a popular quantity of interest—on thermal efficiency and other thermal attributes of the system (<ref>). Next, using the adjoint state method, we calculate the sensitivity of the mean surface temperature to the fluid's heat capacity rate (<ref>). Following a similar procedure, we estimate the sensitivity of the same quantity of interest to the thermal conductivity of the host material (<ref>). After that, we verify the newfound theoretical results using numerical simulations (<ref>). Finally, we draw concluding remarks and put forth potential future works (<ref>). § MATHEMATICAL DESCRIPTION OF THE DIRECT PROBLEM Figure <ref> depicts a typical active-cooling setup: Consider a thin body whose thickness is much smaller than its other characteristic dimensions. The body contains a connected vasculature, with inlet and outlet openings on the lateral surface, which is otherwise insulated. A heat source supplies power to one of the transverse faces while the other is free to convect and radiate. A liquid flows through the vasculature, enabling active-cooling. We assume radiation is relatively minor, and, as commonly done, we lump its contribution to the convective component using the combined/overall heat transfer coefficient <cit.>. The lumping makes the resulting mathematical model linear, making the sensitivity analysis analytically tractable. Since the body is thin, a full three-dimensional model is inordinate. So, this paper avails a reduced-order model defined in a two-dimensional domain—the mid-surface of the slender body. Accordingly, we model the vasculature as a curve within this domain rather than resolving its cross-sectional area. For mathematical description, Ω⊂ℝ^2 denotes the domain, ∂Ω the boundary, and d the body's thickness. For technical purposes, we assume Ω to be open and bounded and ∂Ω piece-wise smooth. A spatial point is denoted by 𝐱∈Ω∪∂Ω and the outward unit normal vector to the boundary by 𝐧(𝐱). The spatial divergence and gradient operators are denoted by div[·] and grad[·], respectively. We denote the temperature field in the domain by ϑ(𝐱) and the heat flux vector field by 𝐪(𝐱). ϑ_amb denotes the ambient temperature—the surrounding environment's temperature. The boundary is divided into two complementary parts: Γ^ϑ∪Γ^q = ∂Ω. Γ^ϑ is the part of the boundary on which temperature (i.e., Dirichlet boundary condition) is prescribed, while Γ^q is that part of the boundary on which heat flux (i.e., Neumann boundary condition) is prescribed. For mathematical well-posedness, we require Γ^ϑ∩Γ^q = ∅. Fluid passage through the vasculature enables active-cooling: heat transfers between the host solid and flowing fluid. ρ_f and c_f denote the fluid's density and specific heat capacity, respectively. Q represents the volumetric flow rate within the vasculature. Thus, the mass flow rate reads: ṁ = ρ_f Q The heat capacity rate—one of the design variables considered in this paper—is then defined as: χ = ṁ c_f Note that χ is a product of fluid properties (ρ_f and c_f) and an input parameter (Q). The curve representing the vasculature is denoted by Σ and is parameterized using the normalized arc-length s, with s = 0 at the inlet and s = 1 at the outlet. The unit tangent vector in the direction of increasing arc-length at a spatial point on this curve is denoted by 𝐭(𝐱). We denote the inlet and outlet temperatures by ϑ_inlet and ϑ_outlet, respectively. ϑ_inlet is a prescribed input, while ϑ_outlet is a part of the solution—generally unknown without solving the boundary value problem. Throughout this paper, we assume ϑ_inlet = ϑ_amb. §.§ Average and jump operators The fluid flow within the vasculature creates a jump in the heat flux across the curve Σ. On this account, we introduce the necessary notation to describe the remarked jumps mathematically. We denote the outward unit normals on either side of Σ by 𝐧^+(𝐱) and 𝐧^-(𝐱) (see Fig. <ref>). Assigning the signs to these normals can be arbitrary. For instance, label one of the outward normals as positive; the other—pointing in the opposite direction—will be negative. These two normals satisfy: 𝐧^+(𝐱) + 𝐧^-(𝐱) = 0 and 𝐧^±(𝐱) ∙𝐭(𝐱) = 0 ∀𝐱∈Σ where ∙ denotes the (Euclidean) dot product. Given a field γ(𝐱), we denote the limiting values on either side of Σ by γ^+(𝐱) and γ^-(𝐱). Mathematically, γ^+(𝐱) := lim_ϵ→ 0 γ(𝐱 - |ϵ| 𝐧^+(𝐱)) and γ^-(𝐱) := lim_ϵ→ 0 γ(𝐱 - |ϵ| 𝐧^-(𝐱)) We then define the average operator across Σ for a scalar field α(𝐱) and a vector field 𝐚(𝐱) as follows: α(𝐱) = 1/2(α^+(𝐱) + α^-(𝐱) ) 𝐚(𝐱) = 1/2(𝐚^+(𝐱) + 𝐚^-(𝐱) ) For these two fields, the jump operator across Σ is defined as follows: α(𝐱) = α^+(𝐱) 𝐧^+(𝐱) + α^-(𝐱) 𝐧^-(𝐱) 𝐚(𝐱) = 𝐚^+(𝐱) ∙𝐧^+(𝐱) + 𝐚^-(𝐱) ∙𝐧^-(𝐱) Note that the jump operator acts on a scalar field to produce a vector field and vice versa.[There is an alternative definition used in the literature for the jump operator: a(𝐱) = a^+(𝐱) - a^-(𝐱). For example, see <cit.>. The definition used in this paper (i.e., Eq. (<ref>)) is symmetric with respect to + and - sub-domains and is more convenient for writing Green's theorem and executing other calculations.] For scalar fields α(𝐱) and β(𝐱) and vector fields 𝐚(𝐱) and 𝐛(𝐱), the following identities (see Appendix for a derivation): α(𝐱) 𝐚(𝐱) = α(𝐱) ∙𝐚(𝐱) + α(𝐱) 𝐚(𝐱) 𝐚(𝐱) ∙𝐛(𝐱) = 𝐚(𝐱) 𝐛(𝐱) + 𝐚(𝐱) 𝐛(𝐱) These identities will be used later in sensitivity analysis to derive the adjoint state problem. §.§ Reduced-order mathematical model The model considers three modes of heat transfer. Newton's law of cooling accounts for the convection on a free surface. A jump condition—an energy balance across the vasculature—models the heat transfer between the circulating fluid and the host solid. The Fourier model describes the conduction within the host solid: 𝐪(𝐱) = - κ(𝐱) grad[ϑ(𝐱)] where κ(𝐱) is the coefficient of thermal conductivity. The governing equations for the reduced-order model, describing thermal regulation, are - d div[κ(𝐱) grad[ϑ(𝐱)]] = f(𝐱) - h_T (ϑ(𝐱) - ϑ_amb) in Ω∖Σ - d κ(𝐱) grad[ϑ(𝐱)]= χ grad[ϑ(𝐱)] ∙𝐭(𝐱) on Σ ϑ(𝐱)= 0 on Σ - d 𝐧(𝐱) ∙κ(𝐱) grad[ϑ(𝐱)] = 0 on ∂Ω ϑ(𝐱)= ϑ_inlet = ϑ_amb at s = 0 on Σ where h_T is the combined heat transfer coefficient, and f(𝐱) is the power supplied by the heat source. For underlying assumptions and a thorough mathematical analysis of this reduced-order model, see <cit.>. Reduced-order models, similar to the one presented above, have been employed in prior active-cooling studies: for example, to establish invariants under flow reversal <cit.>, to get optimized vascular layouts using topology or shape optimization—or both <cit.>, to develop analysis numerical frameworks <cit.>, to name a few. However, these studies' focus has been different and not towards addressing the two questions central to this paper, outlined in the introduction. In the rest of the article, we will use mathematical analysis and sensitivity analysis on the reduced-order model to answer these questions. In the parlance of sensitivity analysis and inverse problems, the above boundary value problem is often referred to as the direct problem.[In the literature, another popular name for the direct problem is the forward problem. As we will show later, the sensitivity analysis (under the adjoint state method) avails boundary value problems under forward and reverse flow conditions (i.e., swapping the inlet and outlet). To avoid a potential confusion, we do not adopt the forward problem terminology—but use the direct problem instead.] Two remarks are warranted to relate the form in which the governing equations are presented above to those used by other works. In Eq. (<ref>), grad[ϑ]∙𝐭(𝐱) represents the tangential derivative of the temperature field along the vasculature. Equation (<ref>) implies that the temperature is continuous across Σ. Since the unit tangent vector 𝐭(𝐱) remains the same on either side of the vasculature, the tangential derivative grad[ϑ]∙𝐭(𝐱) will also be continuous across Σ. So, the average operator can be dropped on the right side of Eq. (<ref>); one can alternatively write it as -d κ(𝐱) grad[ϑ] = χ grad[ϑ] ∙𝐭(𝐱) on Σ <cit.> has utilized the above alternative equation in their mathematical analysis to account for the heat transfer across the vasculature. But, for carrying out the sensitivity analysis using the adjoint method, Eq. (<ref>) is better suited than the above alternative. Equation (<ref>) assigns the prescribed inlet temperature to ϑ(𝐱) at s = 0 on Σ; that is, the assignment is to the average of the temperatures on the either sides of the vasculature at the inlet. Because of the continuity of the temperature field across the vasculature (i.e., Eq. (<ref>)), the average operator can be dropped in writing the initial condition: ϑ(𝐱) = ϑ_inlet = ϑ_amb at s = 0 on Σ Some works prefer the above equation, for example, see <cit.>. However, for our paper, Eq. (<ref>) is a better (equivalent) alternative, as it will simplify the derivations in the sensitivity analysis. Also, since ϑ_inlet and ϑ_amb are constants and do not experience jumps across the vasculature, we rewrite Eq. (<ref>), in derivations in this paper, as: ϑ(𝐱) - ϑ_inlet = ϑ(𝐱) - ϑ_amb = 0 at s = 0 on Σ §.§ Useful definitions The mean surface temperature is defined as ϑ := 1/meas(Ω)∫_Ωϑ(𝐱) dΩ where meas(Ω) denotes the (set) measure of Ω. Since Ω is a surface, meas(Ω) is the area of Ω. The thermal efficiency—referred to as the cooling efficiency in the context of active-cooling—is defined as the ratio of the rate at which heat is carried away by the flowing fluid (within the vasculature) to the total power supplied by the heater. Mathematically, η := ( ∫_Ω f(𝐱) dΩ)^-1χ (ϑ_outlet - ϑ_inlet) If the applied heat supply is uniform over the entire domain (i.e., f(𝐱) = f_0), then we have: η = χ (ϑ_outlet - ϑ_inlet)/f_0 meas(Ω) We refer to the steady-state achieved without active-cooling as the hot steady-state (HSS) and denote the corresponding temperature field as ϑ_HSS(𝐱). That is, HSS occurs when χ = 0 and the temperature at the inlet is not prescribed. With this definition and by availing Eqs. (<ref>)–(<ref>), the mean hot steady-state temperature can be written as ϑ_HSS := 1/meas(Ω)∫_Ωϑ_HSS(𝐱) dΩ = ϑ_amb + 1/h_T meas(Ω)∫_Ω f(𝐱) dΩ If f(𝐱) = f_0 (i.e., uniform power supplied by the heater), we have: ϑ_HSS = ϑ_amb + f_0/h_T As revealed by the above equation, for the chosen thermal regulation setup (see Fig. <ref>), ϑ_HSS is independent of the host material's conductivity. §.§ Forward and reverse flows Shown later, the sensitivity analysis avails a boundary value problem under reverse flow conditions: that is, the inlet and outlet locations are swapped, and hence, the fluid flows in the opposite direction within the vasculature. The solution under forward flow conditions will be denoted by ϑ^(f)(𝐱), which satisfies Eqs. (<ref>)–(<ref>). While ϑ^(r)(𝐱) denotes the solution under reverse flow conditions, satisfying the following boundary value problem: - d div[κ(𝐱) grad[ϑ^(r)(𝐱)]] = f(𝐱) - h_T (ϑ^(r)(𝐱) - ϑ_amb) in Ω∖Σ - d κ(𝐱) grad[ϑ^(r)(𝐱)]= -χ grad[ϑ^(r)(𝐱)] ∙𝐭(𝐱) on Σ ϑ^(r)(𝐱)= 0 on Σ - d 𝐧(𝐱) ∙κ(𝐱) grad[ϑ^(r)(𝐱)] = 0 on ∂Ω ϑ^(r)(𝐱)= ϑ_inlet = ϑ_amb at s = 1 on Σ Note that we have employed the same orientation for the arc-length (as the one used under the forward flow) in writing the governing equations under the reverse flow. Namely, the inlet location corresponds to s = 0 under the forward flow while to s = 1 under the reverse flow. Also, note the two main differences between the boundary value problems under forward and reverse flow conditions: the sign change on the right side of Eq. (<ref>) (cf. Eq. (<ref>)), and s = 1 in Eq. (<ref>) (instead of s = 0 in Eq. (<ref>)). We will refer to the boundary value problems under the forward and reverse flow conditions as the forward and reverse flow problems, respectively. In general, ϑ^(f)(𝐱) differs from ϑ^(r)(𝐱). However, as shown recently by <cit.>, the mean surface temperature remains invariant under a reversal of flow when the applied heat source is uniform (i.e., f(𝐱) = f_0). Stated mathematically, 1/meas(Ω)∫_Ωϑ^(f)(𝐱) dΩ ≡ ϑ^(f) = ϑ^(r) ≡ 1/meas(Ω)∫_Ωϑ^(r)(𝐱) dΩ This invariance property will be used later in the mathematical analysis of design sensitivities. § RAMIFICATIONS OF MINIMIZING MEAN SURFACE TEMPERATURE This section addresses the first question outlined in the introduction. We show that minimizing the mean surface temperature is equivalent to: * maximizing the difference between the outlet and inlet temperatures, * maximizing the outlet temperature, * maximizing the thermal (cooling) efficiency, * maximizing the difference between ϑ_HSS - ϑ, and * minimizing the difference between ϑ - ϑ_amb if applied heater power is uniform (i.e., f(𝐱) = f_0). Except for the last equivalence, the remaining ones hold for a general power source f(𝐱) ≥ 0. To establish the first equivalence, we integrate Eq. (<ref>) over the domain, apply the divergence theorem (<ref>), and use the rest of equations under the direct problem (<ref>)–(<ref>) to get: ϑ_outlet - ϑ_inlet = 1/χ(∫_Ω f(𝐱) dΩ - meas(Ω) h_T (ϑ - ϑ_amb) ) In the above equation f_0, h_T, ϑ_amb, meas(Ω), and χ are all independent of ϑ. Noting the negative sign in the term containing h_T, we conclude that minimizing the mean surface temperature will maximize the difference (ϑ_outlet - ϑ_inlet). Since the inlet temperature (which is equal to the ambient temperature) is a prescribed quantity and a constant, maximizing the difference (ϑ_outlet - ϑ_inlet) is the same as maximizing the outlet temperature, thereby establishing the second equivalence. The third equivalence is evident from the definition of thermal efficiency (<ref>), which is proportional to the difference between the outlet and inlet temperatures. For the fourth equivalence, we start with the definition for ϑ_HSS (Eq. (<ref>)): ϑ_HSS = ϑ_amb + 1/h_T meas(Ω)∫_Ω f(𝐱) dΩ Equation (<ref>) can be rearranged as follows: ϑ = ϑ_amb + 1/h_T meas(Ω)∫_Ω f(𝐱) dΩ - χ/h_T meas(Ω)(ϑ_outlet - ϑ_inlet) Subtracting Eq. (<ref>) from Eq. (<ref>), we get: ϑ_HSS - ϑ = χ/h_T meas(Ω)(ϑ_outlet - ϑ_inlet) Hence, maximizing the difference of outlet and inlet temperatures—equivalent to minimizing the mean surface temperature, from the first equivalence—implies maximizing the difference (ϑ_HSS - ϑ). For the fifth equivalence, we use the maximum and minimum principles recently presented by <cit.>. For the case of f(𝐱) = f_0, the temperature field satisfies the following ordering: ϑ_amb≤ϑ(𝐱) ≤ϑ_HSS which further implies the mean surface temperature is bounded by ϑ_amb≤ϑ≤ϑ_HSS So, the above bounds implies that maximizing the difference ϑ_HSS - ϑ will minimize the difference ϑ - ϑ_amb. This observation, alongside the fourth equivalence, will establish the desired result. In the following two sections, we address the second question outlined in the introduction; we estimate the sensitivity of the quantity of interest (MST) to the two chosen design variables. To facilitate a pithy presentation, we avail functionals and their calculus. §.§ Functionals and their calculus A quantity of interest (in our case, the mean surface temperature) depends on the solution field, which changes upon altering the values of the design variables. However, a solution field is not an explicit function of design variables. Nevertheless, a sensitivity analysis should account for this solution field's non-explicit dependence. Ergo, for clarity and to ease the sensitivity analysis calculations, we introduce the “semi-colon" notation and avail calculus of functionals. We write ϑ(𝐱;ξ(𝐱)) to mean that ϑ does not explicitly depend on the quantities to the right of the semi-colon, but ϑ changes upon altering them. In its simplest terms, a functional is a function of functions <cit.>. So, we write a quantity of interest Φ depending on a design variable ξ(𝐱) as a functional of the form Φ[ξ(𝐱)]. Functionals have their own rich, well-established calculus. However, all we need in our sensitivity analysis is the notion of Fréchet derivative. For a functional Φ[ξ(𝐱)], we denote its Fréchet derivative by DΦ[ξ(𝐱)] with definition <cit.>: lim_Δξ(𝐱)→ 0 Φ[ξ(𝐱) + Δξ(𝐱)] - Φ[ξ(𝐱)] - DΦ[ξ(𝐱)] ∙Δξ(𝐱)/Δξ(𝐱) = 0 where · is the Frobenius norm. If the functional is continuously differentiable, then Gâteaux variation furnishes an easier route—than the definition (<ref>)—to calculate the derivative: [d/d ϵ Φ[ξ(𝐱) + ϵ Δξ(𝐱)] ]_ϵ=0 = δΦ[ξ(𝐱)] ∙Δξ(𝐱) = DΦ[ξ(𝐱)] ∙Δξ(𝐱) ∀Δξ(𝐱) implying DΦ[ξ(𝐱)] = δΦ[ξ(𝐱)]. For easy reference, we distinguish the sensitivities to the chosen two design variables. If ξ(𝐱) = χ (i.e., the design variable is the heat capacity rate), we denote the corresponding Fréchet derivative as Φ^#[χ] ≡ DΦ[χ] Likewise, if ξ(𝐱) = κ(𝐱), we use the notation: Φ^'[κ(𝐱)] ≡ DΦ[κ(𝐱)] For the scalar solution field ϑ(𝐱;ξ(𝐱)) (i.e., the temperature field satisfying the forward problem), we define D_1 ϑ and D_2ϑ as follows: lim_Δ𝐱→ 0 ϑ(𝐱+Δ𝐱;ξ(𝐱)) - ϑ(𝐱;ξ(𝐱)) - D_1ϑ(𝐱;ξ(𝐱)) ∙Δ𝐱/Δ𝐱 = 0 lim_Δξ(𝐱)→ 0 ϑ(𝐱;ξ(𝐱)+ Δξ(𝐱)) - ϑ(𝐱;ξ(𝐱)) - D_2ϑ(𝐱;ξ(𝐱)) ∙Δξ(𝐱)/Δξ(𝐱) = 0 Then the spatial derivative is related as follows: grad[ϑ(𝐱;ξ(𝐱))] = D_1ϑ(𝐱;ξ(𝐱)) Similar to the notation used for the functional Φ, we use the following notation to represent the solution sensitivities: ϑ^#(𝐱;χ) = D_2ϑ(𝐱;χ) and ϑ^'(𝐱;κ(𝐱)) = D_2ϑ(𝐱;κ(𝐱)) In the next section, we mathematically investigate the sensitivity of the mean surface temperature to the fluid's heat capacity rate. § SENSITIVITY OF MST TO COOLANT'S HEAT CAPACITY RATE For this set of sensitivity analysis, we write the objective functional as follows: Φ[χ] = ∫_Ωϑ(𝐱;χ) dΩ Since, in this case, Φ = meas(Ω) ϑ and meas(Ω)—the area of the domain—is a constant, minimizing Φ is equivalent to minimizing the mean surface temperature. Our usage of this alternative (but equivalent) objective functional is for mathematical convenience: to avoid writing 1/meas(Ω) factor often. To find the associated design sensitivity, the task at hand is to calculate D Φ[χ]: D Φ[χ] = ∫_Ωϑ^#(𝐱;χ) dΩ where a superscript # denotes the Fréchet derivative with respect to χ. Notice that the above expression for the design sensitivity contains solution sensitivity ϑ^#(𝐱;χ). But, the solution is unknown without solving the direct problem; the same situation even with the solution sensitivity. It will be ideal if we can estimate DΦ[χ] without actually finding ϑ^#(𝐱;χ). The adjoint state method provides one such viable route, and we will avail it below. We augment Eq. (<ref>) with terms involving products of a Lagrange multiplier and derivatives with respect to χ of the residuals of state equations (i.e., governing equations of the direct problem). After augmenting these terms, the design sensitivity can be equivalently written as follows: D Φ[χ] = ∫_Ωϑ^#(𝐱;χ) dΩ +1/f_0∫_Ω∖Σ(μ(𝐱) - ϑ_amb) (d div[κ(𝐱)grad[ϑ(𝐱;χ)]] + f_0 - h_T(ϑ(𝐱;χ) - ϑ_amb)_Eq. (<ref>))^#dΩ -1/f_0∫_Σμ(𝐱) - ϑ_amb ( d κ(𝐱) grad[ϑ(𝐱;χ)] + χ grad[ϑ(𝐱;χ)]∙𝐭(𝐱)_Eq. (<ref>))^#dΓ +1/f_0∫_Σ d κ(𝐱) grad[μ(𝐱)]∙(ϑ(𝐱;χ)_Eq. (<ref>))^# dΓ +1/f_0∫_∂Ω(μ(𝐱) - ϑ_amb) (-d κ(𝐱) grad[ϑ(𝐱;χ)] ∙𝐧(𝐱)_Eq. (<ref>))^# dΓ -χ/f_0(μ(𝐱) - ϑ_amb) (ϑ(𝐱;χ) - ϑ_amb_Eq. (<ref>))^#|_s = 0 (inlet) where μ(𝐱) is the newly introduced Lagrange multiplier—also known as the adjoint variable. In the above equation, the factors introduced in the augmented terms are for getting an easy-to-work adjoint state problem, which will be apparent later in the derivation. After applying Green's theorem twice, using identities (<ref>), and grouping the terms, Eq. (<ref>) can be rewritten as follows (see Appendix for a detailed derivation): D Φ[χ] = - 1/f_0∫_Σ(μ(𝐱) - ϑ_amb) grad[ϑ(𝐱;χ)] ∙𝐭(𝐱) dΓ + 1/f_0∫_Ω∖Σϑ^#(𝐱;χ) {d div[κ(𝐱)grad[μ(𝐱)]] + f_0 - h_T(μ(𝐱) - ϑ_amb)} dΩ - 1/f_0∫_Σϑ^#(𝐱;χ) { d κ(𝐱) grad[μ(𝐱)] - χ grad[μ(𝐱)] ∙𝐭(𝐱) } dΓ + 1/f_0∫_Σ d κ(𝐱) grad[ϑ^#(𝐱;χ)]∙{μ(𝐱) - ϑ_amb} dΓ + 1/f_0∫_∂Ωϑ^#(𝐱;χ) {-d κ(𝐱) grad[μ(𝐱)] ∙𝐧(𝐱) } dΓ - χ/f_0ϑ^#(𝐱;χ) {μ(𝐱) - ϑ_amb}|_s = 1 Note that μ(𝐱) is arbitrary till now, and a prudent choice for it will simplify the design sensitivity expression. A heedful look at Eq. (<ref>) reveals that if we set all the terms in the curly brackets[We also marked these terms in purple for the reader's benefit—see an online version of this article.] to zero, the resulting expression for the design sensitivity will not contain ϑ^#(𝐱;χ). Duly, we force the mentioned terms to vanish, giving rise to the following boundary value problem: - d div[κ(𝐱)grad[μ(𝐱)]] = f_0 - h_T (μ(𝐱) - ϑ_amb) in Ω∖Σ - d κ(𝐱) grad[μ(𝐱)]= -χ grad[μ(𝐱)] ∙𝐭(𝐱) on Σ μ(𝐱) = 0 on Σ - d 𝐧(𝐱) ∙κ(𝐱)grad[μ(𝐱)] = 0 on ∂Ω μ(𝐱) = ϑ_amb at s = 1 on Σ The above boundary value problem is referred to as the adjoint state problem (or adjoint problem, for brevity). If μ(𝐱) satisfies the above adjoint state problem, the design sensitivity takes the following compact form: DΦ[χ] = - 1/f_0∫_Σ(μ(𝐱) - ϑ_amb) grad[ϑ(𝐱;χ)] ∙𝐭(𝐱) dΓ Recalling the discussion in <ref>, we note that the above adjoint state problem is identical to the boundary value problem under reverse flow conditions (cf. Eqs. (<ref>)–(<ref>)), which is s well-posed problem with a unique solution <cit.>. Thus, the solution to the adjoint variable is μ(𝐱) = ϑ^(r)(𝐱) With this identification, invoking the continuity of μ(𝐱) across the vasculature (<ref>), and noting Remark <ref>, the sensitivity of the mean surface temperature to the fluid's heat capacity rate amounts to DΦ[χ] = - 1/f_0∫_Σ(ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ where ϑ^(f)(𝐱) is the solution of the boundary value problem under the forward flow conditions—the solution of the direct problem (i.e., Eqs. (<ref>)–(<ref>)). The exact expressions for ϑ^(f)(𝐱) and ϑ^(r)(𝐱) are unknown a priori. One often solves the direct and adjoint boundary value problems to get these solutions using a numerical method or an analytical technique. Since we are interested only in the design sensitivity's sign, we do not attempt to solve these problems but avail mathematical analysis to assess the remarked sign instead. Under uniform f(𝐱) = f_0, the sensitivity of the mean surface temperature to the heat capacity rate is non-positive. That is, DΦ[χ] = - 1/f_0∫_Σ(ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ≤ 0 By multiplying the first equation of the forward flow problem by (ϑ^(f)(𝐱) - ϑ_amb), applying Green's identity, and using the rest of the equations, we write ∫_Ω d grad[ϑ^(f)(𝐱)] ∙κ(𝐱) grad[ϑ^(f)(𝐱)] dΩ +∫_Σχ (ϑ^(f)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ =∫_Ω f(𝐱) (ϑ^(f)(𝐱) - ϑ_amb) dΩ -∫_Ω h_T(ϑ^(f)(𝐱) - ϑ_amb)^2 dΩ Likewise, by multiplying the first equation of the reverse flow problem by (ϑ^(r)(𝐱) - ϑ_amb) and following similar steps as before, we get the following: ∫_Ω d grad[ϑ^(r)(𝐱)] ∙κ(𝐱) grad[ϑ^(r)(𝐱)] dΩ -∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(r)(𝐱)] ∙𝐭(𝐱) dΓ =∫_Ω f(𝐱) (ϑ^(r)(𝐱) - ϑ_amb) dΩ -∫_Ω h_T(ϑ^(r)(𝐱) - ϑ_amb)^2 dΩ Finally, by multiplying the first equation of the forward flow problem by (ϑ^(r)(𝐱) - ϑ_amb), we get the following: ∫_Ω d grad[ϑ^(r)(𝐱)] ∙κ(𝐱) grad[ϑ^(f)(𝐱)] dΩ +∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ =∫_Ω f(𝐱) (ϑ^(r)(𝐱) - ϑ_amb) dΩ -∫_Ω h_T(ϑ^(r)(𝐱) - ϑ_amb) (ϑ^(f)(𝐱) - ϑ_amb) dΩ We add Eqs. (<ref>) and (<ref>), and from this sum we subtract twice Eq. (<ref>) (i.e., Eq. (<ref>) + Eq. (<ref>) – 2 × Eq. (<ref>)); this calculation amounts to ∫_Ω d grad[ϑ^(f)(𝐱) - ϑ^(r)(𝐱)] ∙κ(𝐱) grad[ϑ^(f)(𝐱) - ϑ^(r)(𝐱)] dΩ +∫_Ω h_T(ϑ^(f)(𝐱) - ϑ^(r)(𝐱))^2dΩ = ∫_Ω f(𝐱) (ϑ^(f)(𝐱) - ϑ^(r)(𝐱)) dΩ -∫_Σχ (ϑ^(f)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ +∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(r)(𝐱)] ∙𝐭(𝐱) dΓ +2∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ The two integrals on the left side of the above equation are non-negative; note d > 0 and κ(𝐱) > 0. Therefore, we write 0 ≤∫_Ω f(𝐱) (ϑ^(f)(𝐱) - ϑ^(r)(𝐱)) dΩ -∫_Σχ (ϑ^(f)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ +∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(r)(𝐱)] ∙𝐭(𝐱) dΓ +2∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ By noting f(𝐱) is uniform and invoking the invariance of the mean surface temperature under flow reversal (i.e., Eq. (<ref>)), the first term on the right side of Eq. (<ref>) vanishes. We thus have the following inequality: ∫_Σχ (ϑ^(f)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ -∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(r)(𝐱)] ∙𝐭(𝐱) dΓ ≤ 2∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ We will now consider the first term in Eq. (<ref>) and execute the integral along the vasculature: ∫_Σχ (ϑ^(f)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ = χ/2 (ϑ^(f)(𝐱) - ϑ_amb)^2 |_s = 0^s = 1 Noting that, under forward flow conditions, ϑ^(f)(𝐱) = ϑ_amb at s = 0 and ϑ^(f)(𝐱) = ϑ^(f)_outlet at s = 1, we get ∫_Σχ (ϑ^(f)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ = χ/2 (ϑ^(f)_outlet - ϑ_amb)^2 Carrying out similar steps for the second term in Eq. (<ref>), we write ∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(r)(𝐱)] ∙𝐭(𝐱) dΓ = χ/2 (ϑ^(r)(𝐱) - ϑ_amb)^2 |_s = 0^s = 1 = -χ/2 (ϑ^(r)_outlet - ϑ_amb)^2 The minus sign arises because, under reverse flow conditions, ϑ^(r)(𝐱) = ϑ^(r)_outlet at s = 0 and ϑ^(f)(𝐱) = ϑ_amb at s = 1. Using Eqs. (<ref>) and (<ref>), inequality (<ref>) can be written as follows: χ/2(ϑ^(f)_outlet - ϑ_amb)^2 +χ/2(ϑ^(r)_outlet - ϑ_amb)^2≤ 2∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ The left side of the above inequality is non-negative. Hence, we have 0 ≤ 2∫_Σχ (ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ Noting that χ≥ 0 and f_0 > 0 are constants, the above inequality renders the desired result: DΦ[χ] = - 1/f_0∫_Σ(ϑ^(r)(𝐱) - ϑ_amb) grad[ϑ^(f)(𝐱)] ∙𝐭(𝐱) dΓ≤ 0 §.§ Discussion The above result is remarkable: We have mathematically shown that, regardless of the vasculature, the mean surface temperature always decreases upon increasing the heat capacity rate. Even if the segments of the vasculature are close by—which introduces countercurrent heat exchange: heat transfers from the coolant to the host solid—the remarked trend is unaltered. Given the heat capacity rate is a product of fluid properties (specific heat capacity, c_f, and density, ρ_f) and volumetric flow rate (Q), two scenarios are pertinent: one can alter the fluid or vary the flow rate. * For a fixed fluid, increasing the volumetric flow rate will decrease the mean surface temperature. * For a fixed flow rate while altering the flowing fluid (coolant), the fluid with a higher heat capacity (i.e., product of the density and specific heat capacity: ρ_f c_f) will have a lower mean surface temperature. § SENSITIVITY OF MST TO THERMAL CONDUCTIVITY For estimating the sensitivity of the mean surface temperature to the host material's thermal conductivity field κ(𝐱), the task is to find D Φ[κ(𝐱)]. We again use the adjoint state method and start with the definition of DΦ[κ]: D Φ[κ(𝐱)] = ∫_Ωϑ^'(𝐱;κ(𝐱)) dΩ where a superscript prime denotes the Fréchet derivative related to the conductivity field. Following the steps taken in the previous section, we augment Eq. (<ref>) with terms involving weighted integrals, containing the derivatives with respect to κ(𝐱) of the residuals of the forward problem's governing equations. λ(𝐱) will now denote the corresponding weight (i.e., the Lagrange multiplier or the adjoint variable). After augmenting these terms, the design sensitivity can be written as follows: D Φ[k(𝐱)] = ∫_Ωϑ^'(𝐱;κ(𝐱)) dΩ +1/f_0∫_Ω(λ(𝐱) - ϑ_amb) (d div[κ(𝐱) grad[ϑ(𝐱;κ(𝐱))]] + f_0 - h_T (ϑ(𝐱;κ(𝐱)) - ϑ_amb)_Eq. (<ref>))^'dΩ -1/f_0∫_Σλ(𝐱) - ϑ_amb ( d κ(𝐱) grad[ϑ(𝐱;κ(𝐱))] + χ grad[ϑ(𝐱;κ(𝐱))]∙𝐭(𝐱)_Eq. (<ref>))^'dΓ +1/f_0∫_Σ d κ(𝐱) grad[λ(𝐱)]∙(ϑ(𝐱;κ(𝐱))_Eq. (<ref>))^' dΓ +1/f_0∫_∂Ω(λ(𝐱) - ϑ_amb) (-d κ(𝐱) grad[ϑ(𝐱;κ(𝐱))] ∙𝐧(𝐱)_Eq. (<ref>))^' dΓ -χ/f_0(λ(𝐱) - ϑ_amb) (ϑ(𝐱;κ(𝐱)) - ϑ_amb_Eq. (<ref>))^'|_inlet Similar to the derivation provided in the previous section and appendix, the above expression can be rewritten as follows: D Φ[k(𝐱)] = -1/f_0∫_Ω d grad[λ(𝐱)] ∙grad[ϑ(𝐱;κ(𝐱))] dΩ + 1/f_0∫_Ωϑ^'(𝐱;κ(𝐱)) {d div[κ(𝐱) grad[λ(𝐱)]] + f_0 - h_T (λ(𝐱) - ϑ_amb)} dΩ - 1/f_0∫_Σϑ^'(𝐱;κ(𝐱)) { d κ(𝐱) grad[λ(𝐱)] - χ grad[λ(𝐱)] ∙𝐭(𝐱) } dΓ + 1/f_0∫_Σ d κ(𝐱) grad[ϑ^'(𝐱;κ(𝐱))]∙{λ(𝐱) - λ_amb} dΓ + 1/f_0∫_∂Ωϑ^'(𝐱;κ(𝐱)) {-d κ(𝐱) grad[λ(𝐱)] ∙𝐧(𝐱) } dΓ - χ/f_0ϑ^'(𝐱;κ(𝐱)) {λ(𝐱) - ϑ_amb} |_s = 1 The corresponding adjoint state problem is obtained by forcing all the terms in parenthesis of Eq. (<ref>) to be zero: - d div[κ(𝐱)grad[λ(𝐱)]] = f_0 - h_T (λ(𝐱) - ϑ_amb) in Ω - d κ(𝐱) grad[λ(𝐱)]= -χ grad[λ(𝐱)] ∙𝐭(𝐱) on Σ λ(𝐱) = 0 on Σ - d 𝐧(𝐱) ∙κ(𝐱)grad[λ(𝐱)] = 0 on ∂Ω λ(𝐱)= ϑ_amb at s = 1 on Σ If λ(𝐱) satisfies the adjoint problem, the sensitivity (<ref>) takes the following compact form: DΦ[κ(𝐱)] = - 1/f_0∫_Ω d grad[λ(𝐱)] ∙grad[ϑ(𝐱;κ(𝐱))] dΩ The solution to the adjoint variable is again the temperature field under the reverse flow conditions: λ(𝐱) = ϑ^(r)(𝐱) Thus, the sensitivity of the mean surface temperature to the host's thermal conductivity is: DΦ[κ(𝐱)] = -1/f_0∫_Ω d grad[ϑ^(r)(𝐱)] ∙grad[ϑ^(f)(𝐱)] dΩ It is instructive to write the above equation in terms of the heat flux vector: DΦ[κ(𝐱)] = -1/f_0∫_Ωd/κ^2(𝐱) 𝐪^(r)(𝐱) ∙𝐪^(f)(𝐱) dΩ where the heat flux vector fields under the forward and reverse flow conditions take the following form: 𝐪^(f)(𝐱) = - κ(𝐱) grad[ϑ^(f)(𝐱)] and 𝐪^(r)(𝐱) = - κ(𝐱) grad[ϑ^(r)(𝐱)] Expression (<ref>) suggests that DΦ[κ(𝐱)] can be positive or negative depending on whether 𝐪^(f)(𝐱) opposes 𝐪^(r)(𝐱), at least in a significant portion of the domain. This observation further indicates that the trend—variation of the sensitivity with thermal conductivity—might not be monotonic. Needless to say, the exact expressions for ϑ^(f)(𝐱) and ϑ^(r)(𝐱)—hence 𝐪^(f)(𝐱) and 𝐪^(r)(𝐱)—are not known a priori. We, therefore, resort to numerics for establishing the remarked trend. § NUMERICAL VERIFICATION We now verify numerically the theoretical findings presented in the previous two sections. All numerical results are generated by implementing the single-field Galerkin formulation using the weak form capability in <cit.>. The Galerkin formulation corresponding to the boundary value problem (<ref>)–(<ref>) reads: Find ϑ(𝐱) ∈𝒰 such that we have ∫_Ω d grad[δϑ(𝐱)] ∙κ(𝐱) grad[ϑ(𝐱)] dΩ + ∫_Ωδϑ(𝐱) h_T (ϑ(𝐱) - ϑ_amb) dΩ + ∫_Σδϑ(𝐱) χ grad[ϑ(𝐱)] ∙𝐭(𝐱) dΓ = ∫_Ωδϑ(𝐱) f(𝐱) dΩ ∀δϑ(𝐱) ∈𝒲 where the function spaces are defined as follows: 𝒰 := {ϑ(𝐱) ∈ H^1(Ω) | ϑ(𝐱) = ϑ_inlet = ϑ_amb at s = 0 on Σ} 𝒲 := {δϑ(𝐱) ∈ H^1(Ω) | δϑ(𝐱) = 0 at s = 0 on Σ} In the above definitions, H^1(Ω) denotes the standard Sobolev space comprising all functions defined over Ω that are square-integrable alongside their derivatives <cit.>. We have used quadratic Lagrange triangular elements in all the numerical simulations reported in this paper. The chosen meshes were fine enough to resolve steep gradients across the vasculature. Table <ref> lists the simulation parameters. The values we have chosen for the dimensions and input parameters (e.g., ambient temperature, volumetric flow rate) are common and reported in several experimental active-cooling studies <cit.>. Also, we have shown results spanning three host material systems—glass fiber-reinforced plastic (GFRP) composite, carbon fiber-reinforced plastic (CFRP) composite, and Inconel (an additive manufacturing nickel-based alloy). These materials are popular among microvascular active-cooling applications. §.§ U-shaped vasculature Guided by Eq. (<ref>), we devise a problem that shows DΦ[κ] can be positive or negative. The train of thought is: we choose a vasculature comprising two parallel segments. If the spacing between them is small, the heat transfers from one segment to the other—the flowing fluid in a part of the vasculature loses net heat. In such a case, swapping the inlet and outlet will make the heat flux vector under the reverse flow conditions oppose that under the forward flow conditions, making DΦ[κ] positive. A concomitant manifestation will be a non-monotonic temperature variation along the vasculature. Figure <ref> provides a pictorial description of one such problem. The corresponding heat flux vectors are shown in Fig. <ref>. Clearly, under the forward flow conditions with close spacing (l = 20 mm), the heat flows from the right vertical segment, connected to the outlet, to the left vertical segment (which is connected to the inlet). Further, the heat flux vectors under the two flow conditions oppose each other in the region between these two parallel segments, and the magnitude of the heat flux vector in this sandwiched region is large. Henceforward, we refer to the heat transfer from one segment to another along the vasculature as countercurrent heat exchange. Depending on the strength of the countercurrent heat exchange, increasing the host material's conductivity need not result in a monotonic variation of either the mean surface temperature or thermal efficiency, as conveyed in Fig. <ref>. On the other hand, Fig. <ref> shows that increasing the flow rate invariably decreases the mean surface temperature, despite countercurrent heat exchanges—verifying once more Theorem <ref>. Nonetheless, what factors—material, geometric and input parameters—promote or hinder countercurrent heat exchange is yet to be studied: worthy of a separate investigation. §.§ Straight channel To verify further the role of countercurrent heat exchange, we consider a straight channeled vasculature, illustrated in Fig. <ref>. The lack of nearby segments implies there will be no countercurrent heat exchange. The heat flux vectors under the forward and reverse flow conditions align (more or less) in the same direction, as exhibited in Fig. <ref>. So, the mean surface temperature should decrease monotonically as the thermal conductivity increases, verified for various flow rates in Fig. <ref>. Figure <ref> verifies Theorem <ref>: Increasing the volumetric flow rate (keeping the fluid fixed) will decrease the mean surface temperature. §.§ Serpentine vasculature Figure <ref> depicts the serpentine vasculature layout. Several studies have used this layout (e.g., <cit.>) because of its spatial spread, enabling cooling over the entire domain. Clearly, heat transfer under this layout is intricate along the vasculature because of many nearby segments, as portrayed in Fig. <ref>. On many portions of the vasculature, heat transfers from the host material to flowing fluid on one side and the opposite on the juxtaposed side. Due to this prominent countercurrent heat exchanges, the effect of the thermal conductivity on the mean surface temperature can be multifaceted and depends on the flow rate, as shown in Fig. <ref>. Despite the complex heat transfer map, Fig. <ref> shows that the sensitivity of the mean surface temperature to the volumetric flow rate (for a fixed fluid) is always negative—in agreement with Theorem <ref>. § CLOSURE This paper addressed the individual effects of heat capacity rate (product of volumetric flow rate and heat capacity) and thermal conductivity on the mean surface temperature (MST) and thermal efficiency. The study avails a reduced-order model for thermal regulation and conducts mathematical analysis based on the adjoint state method (a popular sensitivity analysis approach) and representative numerical simulations. The principal finding on the sensitivity analysis front is: the adjoint-state problem is the boundary value problem for the reverse flow conditions (i.e., swapping the inlet and outlet locations). The primary determinations on the physics front are: * Irrespective of the vasculature layout, an increase in the mass flow rate of the circulating fluid decreases MST—meaning that the thermal efficiency increases. * However, MST variation is non-monotonic with the host material’s thermal conductivity. * The sensitivity of MST to the conductivity is proportional to the weighted inner product of the heat flux vector fields under the forward and reverse flow conditions. * When countercurrent heat exchange dominates, these two heat flux vectors oppose each other, thereby making the sensitivity of MST to thermal conductivity positive. The trend can be the opposite if the countercurrent heat exchange is absent or insignificant. A direct significance of this work is it settles an unresolved fundamental question related to thermal regulation in thin vascular systems: how does the host material's thermal conductivity affect MST? Also, the reported analysis and results (a) enhance our fundamental understanding of vascular-based thermal regulation and (b) provide a clear-cut path to pose material design problems. As alluded to in <ref>, a logical sequel to this study is to address this principal question: what factors (material, geometric and input parameters) promote or hinder countercurrent heat exchange in microvascular active-cooling systems? Further, we envision scientific explorations on two fronts: * An experimental program—validating the identified non-monotonic behavior of the sensitivity of thermal conductivity on the mean surface temperature—will benefit the field. Further, these experiments should realize countercurrent heat exchange and confirm its role in the sign change of this sensitivity. * On the modeling front, a natural extension is to develop a material design framework and comprehend the resulting designs. Also, researchers should explore alternative objective functionals appropriate to thermal regulation (other than the mean surface temperature) and study the ramifications of such alternatives. The results from this paper provide the necessary impetus to undertake the remarked material design research. § ALGEBRA AND CALCULUS OF JUMPS §.§ Algebra Below we provide proof of identity (<ref>). Proof of the other equivalence (<ref>) follows a similar procedure. Given a scalar field α(𝐱) and a vector field 𝐚(𝐱), the following identity holds: α(𝐱) 𝐚(𝐱) = α(𝐱) ∙𝐚(𝐱) + α(𝐱) 𝐚(𝐱) We use the definitions of the average and jump operators (i.e., Eqs. (<ref>) and (<ref>)) to expand the first term on the right side of the identity: α(𝐱) ∙𝐚(𝐱) = (α^+(𝐱) 𝐧^+(𝐱) + α^-(𝐱) 𝐧^-(𝐱) ) ∙1/2(𝐚^+(𝐱) + 𝐚^-(𝐱) ) = 1/2α^+(𝐱) 𝐧^+(𝐱) ∙𝐚^+(𝐱) + 1/2α^+(𝐱) 𝐧^+(𝐱) ∙𝐚^-(𝐱) +1/2α^-(𝐱) 𝐧^-(𝐱) ∙𝐚^+(𝐱) + 1/2α^-(𝐱) 𝐧^-(𝐱) ∙𝐚^-(𝐱) Likewise, expanding the second term on the right side of the identity, we get: α(𝐱) 𝐚(𝐱) = 1/2(α^+(𝐱) + α^-(𝐱) ) (𝐚^+(𝐱) ∙𝐧^+(𝐱) + 𝐚^-(𝐱) ∙𝐧^-(𝐱) ) = 1/2α^+(𝐱) 𝐚^+(𝐱) ∙𝐧^+(𝐱) + 1/2α^+(𝐱) 𝐚^-(𝐱) ∙𝐧^-(𝐱) +1/2α^-(𝐱) 𝐚^+(𝐱) ∙𝐧^+(𝐱) + 1/2α^-(𝐱) 𝐚^-(𝐱) ∙𝐧^-(𝐱) By adding the above two equations and noting the commutative property of the dot product, we get α(𝐱) ∙𝐚(𝐱) + α(𝐱) 𝐚(𝐱) = α^+(𝐱) 𝐚^+(𝐱) ∙𝐧^+(𝐱) + α^-(𝐱) 𝐚^-(𝐱) ∙𝐧^-(𝐱) + 1/2(α^+(𝐱) 𝐚^-(𝐱) + α^-(𝐱) 𝐚^+(𝐱) ) ∙(𝐧^+(𝐱) + 𝐧^-(𝐱) ) Noting that 𝐧^+(𝐱) + 𝐧^-(𝐱) = 0, we establish the desired result as follows: α(𝐱) ∙𝐚(𝐱) + α(𝐱) 𝐚(𝐱) = α^+(𝐱) 𝐚^+(𝐱) ∙𝐧^+(𝐱) + α^-(𝐱) 𝐚^-(𝐱) ∙𝐧^-(𝐱) = (α(𝐱) 𝐚(𝐱))^+∙𝐧^+(𝐱) + (α(𝐱) 𝐚(𝐱))^-∙𝐧^-(𝐱) = α(𝐱) 𝐚(𝐱) §.§ Calculus The divergence theorem over Ω∖Σ takes the following form: ∫_Ω∖Σdiv[𝐚(𝐱)] dΩ = ∫_∂Ω𝐚(𝐱) ∙𝐧(𝐱) dΓ + ∫_Σ𝐚(𝐱) dΓ where 𝐚(𝐱) is a vector field. The Green's theorem over Ω∖Σ can be written as follows: ∫_Ω∖Σα(𝐱) div[𝐚(𝐱)] dΩ = ∫_∂Ωα(𝐱) 𝐚(𝐱) ∙𝐧(𝐱) dΓ + ∫_Σα(𝐱) 𝐚(𝐱) dΓ - ∫_Ω∖Σgrad[α(𝐱)] ∙𝐚(𝐱) dΩ where α(𝐱) is a scalar field. The above two expressions are valid even if the vasculature Σ comprises branches. The following result, an application of Green's theorem (<ref>), will be useful in deriving the adjoint state problem. Let β(𝐱) and γ(𝐱) are two smooth scalar fields over Ω∖Σ. These fields satisfy ∫_Ω∖Σγ(𝐱) div[κ(𝐱) grad[β(𝐱)]] dΩ = ∫_∂Ωγ(𝐱) κ(𝐱) grad[β(𝐱)] ∙𝐧(𝐱) dΓ -∫_∂Ωβ(𝐱) κ(𝐱) grad[γ(𝐱)] ∙𝐧(𝐱) dΓ + ∫_Σγ(𝐱) κ(𝐱) grad[β(𝐱)] dΓ - ∫_Σβ(𝐱) κ(𝐱) grad[γ(𝐱)] dΓ + ∫_Ω∖Σβ(𝐱) div[ κ(𝐱) grad[γ(𝐱)] ] dΩ Taking α(𝐱) = γ(𝐱) and 𝐚(𝐱) = κ(𝐱) grad[β(𝐱)] in Green's theorem (<ref>), we write: ∫_Ω∖Σγ(𝐱) div[κ(𝐱) grad[β(𝐱)]] dΩ = ∫_∂Ωγ(𝐱) κ(𝐱) grad[β(𝐱)] ∙𝐧(𝐱) dΓ + ∫_Σγ(𝐱) κ(𝐱) grad[β(𝐱)] dΓ - ∫_Ω∖Σgrad[γ(𝐱)] ∙κ(𝐱) grad[β(𝐱)] dΩ Using the commutative property of the dot product and invoking Green's theorem (with α(𝐱) = β(𝐱) and 𝐚(𝐱) = κ(𝐱) grad[γ(𝐱)]), the last integral (defined over Ω∖Σ) in the above equation is rewritten as follows: ∫_Ω∖Σgrad[γ(𝐱)] ∙κ(𝐱) grad[β(𝐱)] dΩ = ∫_Ω∖Σgrad[β(𝐱)] ∙κ(𝐱) grad[γ(𝐱)] dΩ = ∫_∂Ωβ(𝐱) κ(𝐱) grad[γ(𝐱)] ∙𝐧(𝐱) dΓ + ∫_Σβ(𝐱) κ(𝐱) grad[γ(𝐱)] dΓ - ∫_Ω∖Σgrad[β(𝐱)] ∙κ(𝐱) grad[γ(𝐱)] dΩ By subtracting Eq.  (<ref>) from Eq. (<ref>), we get the desired result: ∫_Ω∖Σγ(𝐱) div[κ(𝐱) grad[β(𝐱)]] dΩ = ∫_∂Ωγ(𝐱) κ(𝐱) grad[β(𝐱)] ∙𝐧(𝐱) dΓ - ∫_∂Ωβ(𝐱) κ(𝐱) grad[γ(𝐱)] ∙𝐧(𝐱) dΓ + ∫_Σγ(𝐱) κ(𝐱) grad[β(𝐱)] dΓ - ∫_Σβ(𝐱) κ(𝐱) grad[γ(𝐱)] dΓ + ∫_Ω∖Σβ(𝐱) div[ κ(𝐱) grad[γ(𝐱)] ] dΩ § DERIVATION OF THE ADJOINT STATE PROBLEM To make the presentation concise in the main text, several intermediate steps were skipped in arriving at Eq. (<ref>) from Eq. (<ref>). Below we provide the missing details. We start with Eq. (<ref>) and record that a superscript # is the Fréchet derivative with respect to χ. Also, we note that the spatial derivatives (i.e., divergence and gradient operators) commute with the Fréchet derivative with respect to χ. Since ϑ_amb, f_0, d, h_T, and κ(𝐱) do not depend on χ, we rewrite Eq. (<ref>) as follows: D Φ[χ] = ∫_Ωϑ^#(𝐱;χ) dΩ +1/f_0∫_Ω∖Σ(μ(𝐱) - ϑ_amb) (d div[κ(𝐱) grad[ϑ^#(𝐱;χ)]] - h_T ϑ^#(𝐱;χ)) dΩ -1/f_0∫_Σμ(𝐱) - ϑ_amb ( d κ(𝐱) grad[ϑ^#(𝐱;χ)] + χ grad[ϑ^#(𝐱;χ)]∙𝐭(𝐱) + grad[ϑ(𝐱;χ)]∙𝐭(𝐱) ) dΓ +1/f_0∫_Σ d κ(𝐱) grad[μ(𝐱)]∙ϑ^#(𝐱;χ) dΓ +1/f_0∫_∂Ω(μ(𝐱) - ϑ_amb) (-d κ(𝐱) grad[ϑ^#(𝐱;χ)] ∙𝐧(𝐱)) dΓ -χ/f_0(μ(𝐱) - ϑ_amb) ϑ^#(𝐱;χ) |_s = 0 (inlet) The central aim for the rest of the derivation is to isolate ϑ^#(𝐱;κ(𝐱)) in each term of Eq. (<ref>). For convenience, we denote the second term by ℐ_2: ℐ_2 = 1/f_0∫_Ω∖Σ(μ(𝐱) - ϑ_amb) (d div[κ(𝐱)grad[ϑ^#(𝐱;χ)]] - h_T ϑ^#(𝐱;χ)) dΩ = - 1/f_0∫_Ω∖Σϑ^#(𝐱;χ) h_T (μ(𝐱) - ϑ_amb) dΩ + 1/f_0∫_Ω∖Σ(μ(𝐱) - ϑ_amb) d div[κ(𝐱)grad[ϑ^#(𝐱;χ)]] dΩ We now rewrite the integral ℐ_2 by moving the spatial derivatives on ϑ(𝐱;χ) to μ(𝐱). By invoking Proposition <ref> on the second integral in Eq. (<ref>), we get the following: ℐ_2 = - 1/f_0∫_Ω∖Σϑ^#(𝐱;χ) h_T (μ(𝐱) - ϑ_amb) dΩ + 1/f_0∫_Ω∖Σϑ^#(𝐱;χ) ( d div[κ(𝐱) grad[μ(𝐱)] ] ) dΩ + 1/f_0∫_∂Ω(μ(𝐱) - ϑ_amb) d κ(𝐱)grad[ϑ^#(𝐱;χ)] ∙𝐧(𝐱) dΓ + 1/f_0∫_Σ(μ(𝐱) - ϑ_amb) ∙ d κ(𝐱)grad[ϑ^#(𝐱;χ)] dΓ - 1/f_0∫_∂Ωϑ^#(𝐱;χ) ( d κ(𝐱) grad[μ(𝐱)] ∙𝐧(𝐱) ) dΓ - 1/f_0∫_Σϑ^#(𝐱;χ) ∙ d κ(𝐱) grad[μ(𝐱)] dΓ We now substitute the above expression into Eq. (<ref>) and group the resulting terms into three categories for further simplification. We thus write: DΦ[χ] = 𝒥_1 + 𝒥_2 + 𝒥_3 where 𝒥_1 contains all the terms comprising integrals over Ω∖Σ, 𝒥_2 over ∂Ω, and 𝒥_3 consists of all the terms pertaining to the vasculature (i.e., terms containing integrals over Σ, and terms defined at the inlet or outlet of Σ). The expression for 𝒥_1 reads: 𝒥_1 = ∫_Ω∖Σϑ^#(𝐱;χ) dΩ - 1/f_0∫_Ω∖Σϑ^#(𝐱;χ) h_T (μ(𝐱) - ϑ_amb) dΩ + 1/f_0∫_Ω∖Σϑ^#(𝐱;χ) ( d div[κ(𝐱) grad[μ(𝐱)] ] ) dΩ = 1/f_0∫_Ω∖Σϑ^#(𝐱;χ) ( d div[κ(𝐱) grad[μ(𝐱)] ] + f_0 - h_T (μ(𝐱) - ϑ_amb) ) dΩ The expression for 𝒥_2 reads: 𝒥_2 = 1/f_0∫_∂Ω(μ(𝐱) - ϑ_amb) d κ(𝐱)grad[ϑ^#(𝐱;χ)] ∙𝐧(𝐱) dΓ -1/f_0∫_∂Ωϑ^#(𝐱;χ) ( d κ(𝐱) grad[μ(𝐱)] ∙𝐧(𝐱) ) dΓ + 1/f_0∫_∂Ω(μ(𝐱) - ϑ_amb) (-d κ(𝐱) grad[ϑ^#(𝐱;χ)] ∙𝐧(𝐱)) dΓ =1/f_0∫_∂Ωϑ^#(𝐱;χ) (-d κ(𝐱) grad[μ(𝐱)] ∙𝐧(𝐱) ) dΓ The expression for 𝒥_3 reads: 𝒥_3 = -1/f_0∫_Σμ(𝐱) - ϑ_amb grad[ϑ(𝐱;χ)] ∙𝐭(𝐱) dΓ +1/f_0∫_Σ( (μ(𝐱) - ϑ_amb) ∙ d κ(𝐱)grad[ϑ^#(𝐱;χ)] -μ(𝐱) - ϑ_amb d κ(𝐱) grad[ϑ^#(𝐱;χ)]) dΓ - 1/f_0∫_Σ(ϑ^#(𝐱;χ) ∙ d κ(𝐱) grad[μ(𝐱)] - d κ(𝐱) grad[μ(𝐱)]∙ϑ^#(𝐱;χ)) dΓ -1/f_0∫_Σμ(𝐱) - ϑ_amb χ grad[ϑ^#(𝐱;χ)]∙𝐭(𝐱) dΓ -χ/f_0(μ(𝐱) - ϑ_amb) ϑ^#(𝐱;χ) |_s = 0 (inlet) We simplify further by invoking the jump identities (<ref>) the second and third terms of the above equation: 𝒥_3 = -1/f_0∫_Σμ(𝐱) - ϑ_amb grad[ϑ(𝐱;χ)] ∙𝐭(𝐱) dΓ +1/f_0∫_Σ d κ(𝐱) grad[ϑ^#(𝐱;χ)] ∙μ(𝐱) - ϑ_amb dΓ - 1/f_0∫_Σϑ^#(𝐱;χ) d κ(𝐱) grad[μ(𝐱)] dΓ -1/f_0∫_Σμ(𝐱) - ϑ_amb χ grad[ϑ^#(𝐱;χ)]∙𝐭(𝐱) dΓ -χ/f_0(μ(𝐱) - ϑ_amb) ϑ^#(𝐱;χ) |_s = 0 (inlet) Noting that χ is independent of 𝐱 and invoking Green's identity on the integral (in fact, it will be integration by parts, as the integral is in one spatial variable, s), the penultimate term can be rewritten as follows: 1/f_0∫_Σμ(𝐱) - ϑ_amb χ grad[ϑ^#(𝐱;χ)]∙𝐭(𝐱) dΓ = 1/f_0∫_0^1μ(𝐱) - ϑ_amb χ d/dsϑ^#(𝐱;χ) ds = χ/f_0( μ(𝐱) - ϑ_amb ϑ^#(𝐱;χ) ) |_s=0^s=1 - 1/f_0∫_0^1χd/dsμ(𝐱) - ϑ_amb ϑ^#(𝐱;χ) ds = χ/f_0( μ(𝐱) - ϑ_amb) ϑ^#(𝐱;χ) |_s=1 (outlet) - χ/f_0( μ(𝐱) - ϑ_amb ) ϑ^#(𝐱;χ) |_s=0 (inlet) - 1/f_0∫_Σϑ^#(𝐱;χ) χ grad[μ(𝐱)] ∙𝐭(𝐱) dΓ Using the above two equations, 𝒥_3 will be written as: 𝒥_3 = -1/f_0∫_Σμ(𝐱) - ϑ_amb grad[ϑ(𝐱;χ)] ∙𝐭(𝐱) dΓ +1/f_0∫_Σ d κ(𝐱) grad[ϑ^#(𝐱;χ)] ∙μ(𝐱) - ϑ_amb dΓ - 1/f_0∫_Σϑ^#(𝐱;χ)( d κ(𝐱) grad[μ(𝐱)] - χ grad[ϑ^#(𝐱;χ)]∙𝐭(𝐱) ) dΓ -χ/f_0ϑ^#(𝐱;χ) (μ(𝐱) - ϑ_amb) |_s = 1 (outlet) Finally, by substituting the terms for 𝒥_1, 𝒥_2 and 𝒥_3—given by Eqs. (<ref>), (<ref>) and (<ref>)—into Eq. (<ref>), we get DΦ[χ] = -1/f_0∫_Σμ(𝐱) - ϑ_amb grad[ϑ(𝐱;χ)] ∙𝐭(𝐱) dΓ + 1/f_0∫_Ω∖Σϑ^#(𝐱;χ) { d div[κ(𝐱) grad[μ(𝐱)] ] + f_0 - h_T (μ(𝐱) - ϑ_amb) } dΩ - 1/f_0∫_Σϑ^#(𝐱;χ)( d κ(𝐱) grad[μ(𝐱)] - χ grad[ϑ^#(𝐱;χ)]∙𝐭(𝐱) ) dΓ +1/f_0∫_Σ d κ(𝐱) grad[ϑ^#(𝐱;χ)] ∙{μ(𝐱) - ϑ_amb} dΓ +1/f_0∫_∂Ωϑ^#(𝐱;χ) {-d κ(𝐱) grad[μ(𝐱)] ∙𝐧(𝐱) } dΓ -χ/f_0ϑ^#(𝐱;χ) {μ(𝐱) - ϑ_amb} |_s = 1 (outlet) which is same as Eq. (<ref>). § DATA AVAILABILITY The data that support the findings of this study are available from the corresponding author upon request. plainnat
http://arxiv.org/abs/2303.06832v2
20230313032836
ODIN: On-demand Data Formulation to Mitigate Dataset Lock-in
[ "SP Choi", "Jihun Lee", "Hyeongseok Ahn", "Sanghee Jung", "Bumsoo Kang" ]
cs.LG
[ "cs.LG", "cs.AI" ]
ODIN: On-demand Data Formulation to MItigate Dataset Lock-iN SP Choi, Jihun Lee, Hyeongseok Ahn, Sanghee Jung, Bumsoo Kang Lotte AI Research {seungpyo.choi, jihoon8798, hyeongseok_ahn, sanghee.jung, bumsoo.kang}@lotte.net Received: date / Accepted: date ========================================================================================================================================================================================== empty is an innovative approach that addresses the problem of dataset constraints by integrating generative AI models. Traditional zero-shot learning methods are constrained by the training dataset. To fundamentally overcome this limitation, attempts to mitigate the dataset constraints by generating on-demand datasets based on user requirements. consists of three main modules: a prompt generator, a text-to-image generator, and an image post-processor. To generate high-quality prompts and images, we adopted a large language model (e.g., ChatGPT), and a text-to-image diffusion model (e.g., Stable Diffusion), respectively. We evaluated on various datasets in terms of model accuracy and data diversity to demonstrate its potential, and conducted post-experiments for further investigation. Overall, is a feasible approach that enables AI to learn unseen knowledge beyond the training dataset. § INTRODUCTION The primary drawback of traditional supervised machine learning is its dependency on the training dataset for acquiring knowledge. This means that a model designed for a particular classification task is unable to classify classes that were not included in the dataset. Researchers have been exploring ways to enable machine learning techniques to obtain learning-ability for new things, similar to how humans learn. Zero-shot learning <cit.> is a popular approach in this direction, which tackles the challenge of handling unseen classes not present in the training dataset. Embedding-based zero-shot learning <cit.> enables a model to represent unseen classes as a combination of features solely learned from the training data, leading to a strong dependency on the dataset. On the other hand, generative zero-shot learning <cit.> is the method that trains a generative model to generate latent features for unseen classes based on the training dataset. The latent features are integrated with the training dataset at the feature level, allowing the model to learn the knowledge of the unseen classes. However, since the generative model is trained on the training dataset, the dependency on the dataset still persists. In conclusion, both zero-shot learning methods are still fundamentally constrained by the prior knowledge of the training dataset and may not perform well on unseen classes in completely different domains. In this study, we address the challenge of dataset lock-in, which is being constrained by the dataset, in a different way. While an ideal solution would be creating a large dataset that contains all the necessary knowledge, constructing such a dataset and training a model on it may not be practical due to its massive learning capacity requirement. Previous attempts at tackling such challenges focused on utilizing prior knowledge to deal with new classes, which does not fundamentally solve the underlying problem of being locked in the dataset. As an alternative, we attempt to mitigate the dataset constraints by generating on-demand datasets based on user requirements. In this light, we propose , a system that dynamically formulates customized datasets for users by leveraging text-to-image generation techniques. Figure <ref> highlights the key structural difference between and typical zero-shot learning approaches, where the main task is to classify unseen classes. * The ideal solution in (a) is that all the data and labels required to train a classification model are already present in the dataset. In other words, unseen data does not actually exist, which eliminates the need for zero-shot learning techniques (ideal but not realistic). * Embedding-based zero-shot learning <cit.> in (b) utilizes a semantic embedding model that learns the seen data and converts semantic attributes into feature vectors. This approach allows the visual feature of the image and the semantic feature of the class to be projected to the same latent space. Then, it recognizes the unseen class based on the similarity between the feature vectors of seen and unseen data. * Generative zero-shot learning <cit.> in (c) generates latent feature vectors for unseen labels. Firstly, the feature extractor converts the pairs of image-label (i.e., training dataset) into the pairs of feature-label (i.e., feature vectors). The feature generation model is then trained using these feature vectors to generate additional feature vectors for the unseen labels. These converted and generated feature vectors are integrated to train the classification model. * As in (d) for , it dynamically formulates an on-demand dataset by directly generating image data from the unseen labels without relying on the training dataset and incorporating them with the existing dataset. From the model's perspective, the previous unseen classes become seen classes as the unseen data are now included in the dataset. This approach differs from generative zero-shot learning (c) in the way of handling unseen classes. First, the data generation model in (i.e., image generation model) is independent of the training dataset (i.e., seen classes), while the one in the generative zero-shot learning relies on the dataset. Second, handles the unseen classes at the data level (i.e., image-label), while zero-shot learning handles them mostly in the feature level (i.e., feature-label). These fundamental differences mitigate the dataset constraints and enable to create new classes, even if they were not in the original dataset. To evaluate the feasibility of , we compare the performance of the model trained on the dataset with the one trained on the conventional dataset. We followed a common training hyperparameter setting in the experiment, which is likely already tuned to the conventional datasets. Since -generated images and real images may differ in various perspectives, there could be other optimization settings for . However, hyperparameter optimization was out of our scope in this study. § RELATED WORK can be viewed as an advanced approach that addresses multiple research problems, including data augmentation/generation and zero-shot learning for unseen classes. We discuss the previous angles and approaches taken toward each problem, and position among them. §.§ Data augmentation and generation Research on data augmentation has become a critical aspect in deep learning field, since deep neural networks heavily rely on the size of training data. Data augmentation aims to artificially inflate the size of a dataset while keeping the labels fixed, spanning from common methods like rotating, flipping, and cropping, to more advanced methods like mixup <cit.>, cutmix <cit.>, UniformAugment <cit.> and TrivialAugment <cit.>. Nevertheless, such augmentation techniques require a minimum amount of data to be performed, which is dependent on task and domain. On the other hand, recent advances in image generation have been gaining attention as a breakthrough for the long-standing problem of insufficient training data. Ravuri and Vinyals <cit.> implement BigGAN <cit.> as a large scale, high-fidelity image generative model. Their conclusion is that the mere addition of generated samples results in a lengthy training time with a minor improvement. Several attempts have been introduced to overcome such performance issues in investigating learning strategies <cit.> or generative models <cit.>. These efforts aimed at training a model with generated images, assuming that a gap between real and generated images is the reason for the poor performance. Many attempts implemented state-of-the-art image generation models to reduce this gap by improving the quality of generated images. In contrast, takes a different approach by reducing the gap in the feature space, which is inserting pixel noise to the generated images. While this may seem to manipulate the images more unrealistic, note that the key idea is to reduce the distance between the real and generated images in the feature space. §.§ Zero-shot learning for unseen label Zero-shot learning <cit.> refers to the capability of a model to classify objects that were not presented in the training dataset by transferring knowledge from seen classes to unseen classes. A number of proposed approaches enabling models to recognize unseen classes without prior knowledge of and access to unseen data. These can be broadly categorized into two approaches, embedding-based zero-shot learning and generative zero-shot learning. Embedding-based zero-shot learning <cit.> firstly trains a model to embed semantic attributes of images, and maps them to classes in a latent space to find class representation. By this means, it is possible to recognize unseen classes based on the similarity between the representation of the image to be recognized and those of the class. The advantage of this approach is that it is easy to implement and relatively requires low computing resources. However, in generalized zero-shot learning <cit.> (i.e., recognizing not only unseen but also seen), the model has a risk to be biased when the images of unseen classes are insufficient, and eventually get tendency to recognize only the seen classes. Generative zero-shot learning emerged with the development of deep learning-based generation models. The idea is to convert zero-shot learning into supervised learning by generating images <cit.> or features <cit.>. However, due to the unpleasant performance of existing image generation models, most of the studies are directed toward to generating features rather than images themselves. This feature generation approach overcomes the bias problem that occured in embedding-based methods, as it can generate a large number of samples for unseen classes <cit.>. However, there is a potential generalization problem on unseen classes because the generative model is only trained on seen data. In other words, zero-shot learning methods that attempt to overcome the drawback of supervised learning (i.e., dataset lock-in) also fundamentally suffer from the same drawback. In contrast, directly formulates datasets that are independent of existing datasets and aligned with the user's requirements, which fundamentally solves the problem of dataset lock-in. Furthermore, has the potential to become the foundational approach for ideal supervised learning that is free from the data constraints. § DESIGN In this section, we present an overview of the design process behind , which aims to dynamically formulate on-demand dataset based on the user request, namely dynamic data formulation. consists of three main components, including prompt generator, text-to-image generator, and image post-processor. Figure <ref> illustrates the overall process of dynamic data formation in . First, the prompt generator receives a label from the user and generates a prompt. Second, a set of images is generated by the text-to-image (denoted txt2img, hereafter) generator based on the given prompt. Finally, the image post-processor reduces the invisible gap that may exist between the generated and the real images, although the generated images seem realistic to the human eye. The output images generated by are then used as input to train the models. We name this newly generated dataset as dataset. To begin the design process, we carefully selected a suitable dataset that would meet our criteria for fine-grained classification with a sufficient number of classes and a relatively high image resolution. Our choice was Oxford-IIIT Pet dataset (denoted Oxford Pet, hereafter) <cit.>, which includes 37 classes of pet images, to list a few, Bengal, Egyptian Mau, Pomeranian, etc. The dataset contains images of varying resolutions, with an average of 430x390, and around 200 images included in each class. Then, we iteratively designed each component of based on the classification task on the Oxford Pet. To make decisions in each step, we evaluated the performance of Swin-v2 (started from Imagenet-1k checkpoint), using a common training parameter setting to focus solely on the dataset itself rather than parameter optimization. The hyperparameter setting is: learning rate=2e-5, optimizer=adam, loss=cross-entropy, batch size=50, without any additional lr-scheduling. We report the best accuracy within 50 epochs. §.§ Iteration 1: Initial design As an initial step, we designed basic components of with minimal guidance in order to assess its feasibility. Since the primary goal of is to generate images, we incorporated Stable Diffusion-v2 <cit.>, a publicly available txt2img generation model. Subsequently, we initially designed with a prompt generator and an image post-processor on top of the txt2img generator. * Prompt generator: It generates simple prompts in a style of “a photo of one {class} {context}", where {class} represents the user-provided label and {context} is the word `pet', as the design process is based on the Oxford Pet. The reason we added the `pet' to the prompt is to avoid homophone errors in some classes (e.g., boxer). * Txt2Img generator: It uses Stable Diffusion-v2, a generalized pre-trained txt2img generation model released under an open-source license by Stability AI, taking the output of the prompt generator as input. * Image post-processor: It applies Gaussian blur with a kernel size of 5, which is a widely used technique for image noise reduction. Using the images generated by the initial version of , we achieved a classification accuracy of 78.6% on the Oxford Pet, which seems a decent result for a first attempt, yet still identified rooms for improvement. To improve the accuracy further, we examined the generated images. We observed that they appeared less diverse compared to those in the real dataset. For example, Figure <ref>(a) shows a set of images of `yorkshire-terrier' class generated by the initial version of . These images have similar colors, backgrounds, and compositions. We concluded that increasing the diversity in the generated images is our next priority. §.§ Iteration 2: Prompt generator In the recent advances in image generation, we design to be flexible enough to accommodate a number of image generation models. To this end, we tried to keep the image generation module untouched so that it could be replaced with other models in the future. Instead, we focused on addressing the diversity issue at the prompt level. We developed the prompt generator to generate various prompts as inputs for the txt2img generator, aiming to finally generate diverse images while maintaining the flexibility of the image generation module. To develop the prompt generator, we tested two different approaches: 1) generating prompts with pre-trained large language models (LLMs) and 2) extracting prompts from real images with pre-trained image caption LLMs. We performed the classification task with changing only the prompt generator to observe the suggested strategies respectively. Prompt generation: For the generative language model, we chose ChatGPT <cit.> which is a text-based interaction service developed on GPT-3.5 by OpenAI. To generate the prompts for each class, we sent queries to ChatGPT with the following input: “Can you recommend 10 simple prompts for image creation? I want to generate photo-realistic class images with txt2img model". We observed that the ChatGPT-suggested prompts generated much more diverse images than the naive prompts. Prompt extraction: To obtain diverse prompts by extracting them from real images, we adopted blip-v2 model (blip2-opt, pretrained-opt2.7b) <cit.>, a recently developed high-performance image captioning model (hits 96.9% accuracy in img2txt captioning under the Flickr30K dataset) However, even with a good image captioning model, biased or low-quality source images would lead to insufficient quality of the captioned prompts for generating a good training dataset. To avoid such an issue, we use Oxford Pet training dataset for captioning. Overall, blip-2 image captioning works well; however, the captioned description of the subject tends to be coarse compared to the labels in the dataset. For example, an image of `yorkshire-terrier' is captioned as an image of `dog'. Therefore, in reverse, we replace the word of coarse subjects with the labels of the dataset (e.g., replacing `dog' with `yorkshire-terrier'). Since we directly used Oxford Pet, this may represent the peak performance of image-captioning under optimal settings. Figure <ref> shows sampled generated images using (a) the naive prompt in our initial design, (b) prompts suggested by ChatGPT, and (c) prompts extracted from the training dataset using blip-v2. We observed that ChatGPT-suggested prompts and blip-v2 based extracted prompts generate more diverse images than the naive prompts. As for the image captioning in (c), we provide examples of the source images in the training dataset and the generated images of captioned prompts from the source images in our supplementary. Table <ref> presents the results of each method. ChatGPT-based prompt generation achieved 85.4%, while blip-v2 based prompt extraction achieved 85.8% accuracy. Both approaches demonstrate a significant improvement compared to the naive prompt generator. This indicates that the quality of prompts is heavily related to the quality of dataset, followed by the model performance. Although there is no significant difference between the two approaches, they have different practical implications. The prompt extraction requires source images to be captioned while the prompt generator does not. In our design study, we used Oxford Pet as the source images, since it was the dataset we tested. However, using training set of a specific dataset as the source images and captioning them as prompts are difficult to generalize. In contrast, ChatGPT-based prompt generation is easy to incorporate into the pipeline, as the output from ChatGPT can be directly used as a prompt. With these considerations, we decided to use the ChatGPT-based prompt generator for . §.§ Iteration 3: Image post-processor Despite generating more diverse images, the accuracy with was still lower than that of real image dataset. Previous research discussed in 2.1 investigated such problems and concluded that there is a gap between the real images and generated ones. They addressed it by increasing the image quality closer to real images. However, we approached the problem differently: reducing the distance in the feature space. We hypothesized that adding noises to the generated images could smooth out the specific features of the generated images. We experimented with several noise functions on the model with ChatGPT-based prompts (from the 3.1) as the base (i.e., the base accuracy: 85.4%). Table <ref> (left) presents the accuracy of the model with each noise function. While the salt noise performed the best with 86.4% (the increase of 0.7% from the base), we also observed that most of the functions show similar results (M=84.79, SD=0.95). Since the experiment was conducted on Oxford Pet under a specific training condition, there is a possibility that the performance of the noise functions may significantly vary depending on the task or model architecture. We also hypothesized that applying post-processing to real images in the test dataset could smooth out their specific features. We expected such an attempt would reduce the gap between the generated and the real images in the feature space, leading to a better classification performance. To test our assumption, we applied the same post-processing to the test dataset during the inference. Contrary to our expectations, the result was slightly less than that of applying to the training dataset only (M=82.65, SD=1.14), as shown in Table <ref> (right). Our interpretation is that the generated images have specific features that differ from those of real images, and applying post-processing smooths out such differences. However, applying post-processing to real images acts as noise and reduces the performance of the model. Therefore, we conclude to apply post-processing only to the generated images in the training dataset. §.§ Dynamic dataset formulation We built the first prototype of by implementing the prompt generator and the image post-processor as we designed. To evaluate the feasibility of dynamically formulating on-demand datasets, we conducted small-scale Proof of Concept (PoC) experiment. Thorough experiments on other datasets are discussed in the next section. For PoC experiment, we conducted 101 rounds of tests. In each round, we created a test dataset randomly selected and combined 10 classes from each of the Oxford Pet and Indian Food, resulting in a total of 20 classes. We ensured the number of data for each class was balanced by randomly sampling images with the minimum number of data in a class. As for the training dataset, based on the selected labels, we generated 10 different prompts for each class using ChatGPT, followed by generating 18 images from each prompt. In total, 180 images for each class were generated as the training set. Overall, we achieved an average accuracy of 88.4% with a SD of 3.25 across the 101 rounds. The result demonstrated the potential of for dynamic dataset formulation. Note that has, technically, the capability to generate an unlimited amount of data. § TECHNICAL PROBE §.§ Evaluation We conducted evaluations on a number of tasks to examine the quality of dataset. We focused on two main aspects: accuracy and diversity. We measured the accuracy of various models trained on dataset under different datasets. As for diversity, we compared the variance of structural similarity index (SSIM) between real datasets and those generated by . §.§.§ Accuracy In our design process in 3, we conducted several experiments using a fixed dataset (i.e., Oxford Pet) and model structure (i.e., Swin-v2) to verify the feasibility of . To evaluate the final design of , we measured the accuracy with various datasets and models. We used four datasets in our evaluation, including Oxford Pet <cit.>, Caltech <cit.>, Indian Food <cit.>, and CIFAR-100 <cit.>. We used all classes of the datasets except for the `Face-easy' class (a cropped version of `Face' class) of Caltech. We omitted it due to its loose connection between the label and the photo, resulting in the difficulty of generating proper image with . As for the model structures, we used five models, including ResNet-152 <cit.>, ResNeXt101 <cit.>, ViT-b-16 <cit.>, Swin-v2 <cit.>, and RegNet <cit.>. We applied the hyperparameters globally as described in 3. In the experiments, we generated dataset in 768x768 resolution, which appeared to be the optimal resolution for Stable Diffusion-v2. We resized the images to 224x224 resolution before feeding them to the models, and began the training from the Imagenet-1k checkpoint. Table <ref> shows the results. Focusing on the accuracy of the models for each dataset, we found that performs well across various model structures without tuning the parameters, not just on the model we used for our design (i.e., Swin-v2). The top-1 best accuracy also did not show significant variance across models for each dataset, including Oxford Pet (M=83.76, SD=1.54, Caltech (M=86.72, SD=1.52), Indian Food (M=70.6, SD=2.14), and CIFAR-100 (M=63.88, SD=2.24). The results demonstrate the feasibility of for various model structures. However, we observed that the accuracy of the model for CIFAR-100 tends to be lower than that of the others, possibly due to the low resolution of CIFAR-100 image (32x32). To equalize the resolution of the images as model inputs, we stretched the images from (32x32) to (224x224). At the same time, we reduced the resolution of the other images to (224x224) due to their larger original resolution. We speculate that this process have affected the low accuracy of CIFAR-100. In terms of the impact of post-processing, the results indicate that the post-processing led to an average improvement of 1.29% in top-1 accuracy across 20 results, and up to 4.3% increase with ResNet-152 under Oxford Pet. The findings demonstrate that the image post-processing of improves the model accuracy across different structures and datasets. However, our experiments did not provide clear guidelines for model- or dataset-specific post-processing techniques, and in four out of 20 results, the performance without post-processing was the best. Investigating the relationship between the performance and various post-processing techniques to find optimal post-processing for each model and dataset remains for our future work. This experiment confirms the feasibility of , achieving classification accuracies up to 91.4% (using ResNeXt101 on Caltech). Interestingly, we found that ResNeXt101 outperformed Swin-v2 by an average of 0.9% across datasets, though the was initially designed with the Swin-v2. However, as the accuracy of the model depends on the hyperparameter setting, further research is necessary to explore the full potential of . Note that parameter optimization for each model was out of the scope. §.§.§ Diversity In this section, we examine the diversity between the real dataset and the dataset from two perspectives: 1) the impact of different prompt generators on reproducing single dataset (Oxford Pet), 2) the impact of 's prompt generator on reproducing additional datasets. Specifically, we verify whether the ChatGPT-based prompt generator of help generates a more diverse dataset in general cases. In the first perspective, we reproduced Oxford Pet into two different datasets - one by a prompt generator using fixed prompt (denoted as -Naive), and the other by a ChatGPT-based prompt generator (denoted as -ChatGPT). These datasets were then compared with the original dataset to measure the effects of the generators respectively. Furthermore, in the second perspective, we only use -ChatGPT to reproduce additional datasets, then compared them with the real ones to evaluate how generally diverse the datasets are. The average SSIM score is used as the measurement standard in every cases. SSIM <cit.> is a well-known method to assess the structural similarity between two images. We assumed that the lower average SSIM score over all pairs in a class indicates that the images in the class are composed of images with more different structures (i.e., diverse). Different prompt generators on reproducing single dataset: Figure <ref> presents SSIM scores of images generated under classes of Oxford Pet, each based on the prompts of -Naive and -ChatGPT. The results show that the dataset with -ChatGPT looks more similar to the real ones than those with -Naive. The mean and variance of SSIM scores for each class are as follows: -Naive (M=0.18, SD=0.06), Real (M=0.15, SD=0.03), and -ChatGPT (M=0.12, SD=0.03). Dataset with -ChatGPT tends to have lower SSIM scores than the real dataset, probably because the increased prompt complexity generated more images drawn in unexpected compositions. -ChatGPT on reproducing additional datasets: We reproduced three additional datasets (Indian Food, CIFAR-100, and Caltech) with -ChatGPT, then compared SSIM scores with the real ones. Table <ref> shows the results of all our runs. In the case of Indian Food, generated images with -ChatGPT obtained SSIM score of (M=0.08, SD=0.01), whereas the real dataset's SSIM score is in distribution of (M=0.11,SD=0.03). A larger difference in SSIM scores between the real and the generated datasets was shown in the case of Caltech, with -ChatGPT's SSIM scores of (M=0.14, SD=0.08) and real dataset (M=0.20, SD=0.08). This might be due to the presence of confusing labels in Caltech that affects the prompt generator. For example, we asked ChatGPT to suggest a prompt with the word 'airplanes' (a class in Caltech), but it rather gave an answer including 'helicopter'. We assume that ChatGPT inadvertently judged helicopter as a kind of airplane. Lastly, SSIM score of -ChatGPT in CIFAR-100 classes achieved (M=0.10, SD=0.05), while the real presenting (M=0.40, SD=0.06). Here, the resolution of the actual image is inherently low (32x32), which led to an underestimation in terms of structural similarity. §.§.§ Summary of findings (1) A dataset generated by is useful to train various models on different datasets, however, the accuracy is slightly lower compared to the models trained on real images; (2) The diversity of images generated by is strongly correlated with the quality of the prompts; (3) While the model trained on dataset performs well for common resolution images, we found that it has limited performance in low resolution. §.§ Gap between the real and generated images We further investigate the reason for the differences in model accuracy between the real and the datasets. Our initial hypothesis was the presence of an invisible gap between the real and generated images. To verify this, we performed a binary classification to distinguish the real and the generated images using several model structures with similar parameter sizes (ResNeXt101: 83.5M, ViT-b-16: 86.6M, Swin-v2: 87.9M). We tested on different datasets used in 4.1 without image post-processing. Table <ref> shows the binary classification results for real and generated images across various models and datasets. We observed that the real and generated images were well distinguished regardless of the model structures, indicating the presence of invisible differences between them. ResNeXt101 and Swin-v2 in Caltech show the largest difference, implying that Swin-v2 performs better at identifying the generated and real images than ResNeXt101. To investigate the impact of such a difference on the model performance, we evaluated the performance of each model on both real and datasets under the same settings. ResNeXt101 achieved 89.6% and Swin-v2 achieved 86.4% of accuracy (see Table <ref>). In comparison, the accuracy for the real dataset was 96.5% for ResNeXt101 and 94.8% for Swin-v2. The performance difference was 6.9% for ResNeXt101 and 8.4% for Swin-v2. As Swin-v2 outperforms in distinguishing between real and generated images, we think this contributes to the larger performance difference between real and datasets. This finding also explains why the post-processor was effective in improving the model performance, which reduces the gap between real and generated images. Moreover, although the generated images exhibit clear differences from real images, the model performance on dataset still achieved reasonable accuracy. This is probably because the model was initially trained using a pre-trained ImageNet-1k checkpoint, which already has knowledge of real images, compensating for the difference between the real and generated images in the model performance. § DISCUSSION §.§ Limitation Locking in generalized pre-trained models: addresses the dataset lock-in of traditional machine learning and mitigates the problem by utilizing generalized pre-trained models (i.e., Stable Diffusion and ChatGPT). However, it is still constrained by the knowledge boundaries of these models, which is unable to generate data beyond their knowledge. As such models continue to learn and expand their knowledge boundaries, can generate an unlimited amount of data within their knowledge range, providing the necessary data for personalized model training. Optimization for generated images: In 2.1, we highlighted that previous research discussed an invisible gap between real and generated images <cit.>. As we mentioned in 4.2, we achieved 98.5% accuracy in detecting real and generated images under CIFAR-100. It indicates that there are obvious differences between the generated and the real images. We conducted experiments in 4.1 and found that the model trained on real images consistently outperformed those trained on generated images. However, the hyperparameters may not be optimal for dataset. Given the difference between real and generated images, there is room for improvement in hyperparameter optimization for generated images, as well as in generating better prompts and image post-processing. §.§ Fueling AI adoption Data is often referred to as the fuel <cit.> that drives model training and boosts performance without directly impacting the model architecture. We discuss the potential of as the fuel for future adoption, highlighting its advantages in terms of high versatility and scalability. Within-domain versatility: Lack of data often discourages thorough experiments in certain domains. For example, in the case of human detection, deep learning model may detect humans accurately when they are facing forward or sideways, but perform poorly in angled photos taken from the ceiling <cit.>. This is because there are simply insufficient data consisting of ceiling-perspective photos. addresses such issues straightforwardly without requiring additional manipulation or optimization of model structures, which ultimately facilitates practical utilization. Scalability to other domains: also has an advantage in facilitating the adoption of AI in other domains where data collection is challenging. Several domains in our lives suffer from data depletion due to the difficulties in collecting data, such as in a disaster or medical emergency. overcomes limited availability of data in such domains by generating synthetic data to train AI models for any situation in any domain. Imagine an earthquake where a building collapses under a huge fire breakout, and using traditional methods (e.g., infrared sensors) for survivor search impossible. In this case, a camera with a built-in detection system pre-trained with the dataset under earthquake scenarios can be served as a viable substitution. While taking a disaster as an initial example, we believe that the capability of (i.e., fueling data) opens up new opportunities for the adoption of AI in previously inaccessible areas. §.§ Intensifying user customization is designed to formulate on-demand dataset, in which the `customization' is the underlying pursuit. We discuss design flexibility and task extensibility, which have the potential to further enhance the level of customization. Design flexibility: We designed each component of to be modular and independent of the others so that they can be easily replaced by other models as needed. In particular, currently uses Stable Diffusion, which is one of the generalized pre-trained models. Although such models are referred to as “generalized”, they are not always suitable for all use cases. However, there are opportunities to improve task performance by replacing them with more specialized models. For example in the classification of specific painting styles, replacing the Stable Diffusion with a model primarily trained for painting (e.g., Novel AI <cit.>) could potentially enhance the quality of the generated images. The flexibility in our design helps create a custom dataset that better meets user requirements and improves performance. Task extensibility: can expand the scope of the task by adding a few more components to its design beyond replacing them. Figure <ref> shows heatmaps of the parts of the generated images that correspond to given labels. In this manner, it is possible to create a dataset for image recognition or image segmentation tasks by providing the bounding box of a given label or its pixel coordinates along with the entire image. This functionality allows users to create a custom dataset tailored to specific tasks and requirements. chatGPT, Stable Diffusion을 예시로 들면서 개인이 AI을 만드는 사회가 다가온다는 좀 이상한듯 함.. 마치 나사에서 우주선을 쏘아올린다고 개인이 우주선을 만들어 우주여행을 하는 사회가 다가온다 그런 느낌.. –> 개인이 만드는 customization말고 개인을 위한 customization으로 가는건 어떨까 싶음 As the public is easily exposed to AI models due to the great advance of the latest AI technology such as ChatGPT <cit.> and Stable diffusion models <cit.>, the society in which individuals model AI has become closer. However, a gap between the dataset and the actual task makes it difficult to become an AI ubiquitous 뜬금없음"AI ubiquitous" society. This gap occurs because it is difficult to configure the dataset that precisely fits the problem situation the user wants to solve. AI에 익숙하지 않은 사람들은 데이터 수집이 문제가 아니라 그냥 모델을 못만들지않을까?.. 데이터 수집을 오히려 잘할듯 Especially for ordinary individuals who are not familiar with AI, collecting a well-suited dataset for AI modeling is a considerable challenge. circumstance-fit, task-fit도 갑자기 나온느낌?.. The circumstance-fit and task-fit characteristics of the will ease such adversity. Think of a situation where user wants to build a deep learning model that can identify aggressive behaviors of his dog, Max. What user needs are the photos of a specific dog acting unusual. To achieve this, the existing txt2img generator can be replaced with Dreambooth<cit.>, which generates fine-tuned outputs based on the input object. Taking a step further, can be updated to reflect changes in the task at hand. If one wants to determine whether Max is being aggressive while playing with other dogs, the scope of the task is expanded from simple classification to object detection(detecting Max in a pack). In this case, can be utilized to draw pixel coordinates of Max in images, thereby creating a dataset suitable for segmentation like Figure 6. 이러이러 할때는 figure 6처럼 할수있어! 보다는 NUO는 figure 6과같은 기능도 할 수 있으니 이러이러한 상황에서 사용할 수 있을거야 이런느낌이 나을것 같음 갑자기 figure 6 나오니까 이상함 아무래도 그렇지... With 's significant flexibility to construct datasets customized for user's needs, we envision a genuine "AI ubiquitous" society where individuals can design their own AI service. 형석 탈부착이 쉬운 서비스 – 5.3에서 주요 논점은 유저가 입맛에 맞게 데이터셋을 control한다는 점 //초반 40 -> 문제 상황 제시(괴리) 그러나 nuo 최고 //중반 50 task의 범위가 단순 classification(공격적인 행위를 하고 있는지 아닌지를 판별)에서 무리들 사이에서 Max를 검출해내는 object detection로 확장되는 것이라고 할 수 있다. 이때 Dreambooth가 bounding box까지 그려낼 수 있도록 해 bounding box prediction에 바로 쓸 수 있는 데이터셋을 획득할 수 있다. //후반 10 -> 봐 nuo 짱이지 이렇게 데이터셋에 Control ability를 부여하는 NUO만의 장점을 통해, 개인이 직접 AI 모델 디자인을 하는 날을 앞당길 수 있을것이다. § CONCLUSION We address the problem of dataset lock-in by dynamically formulating on-demand dataset. We propose , a system that consists of 3 main modules: a prompt generator, a txt2img generator, and an image post-processor. We evaluate in terms of accuracy and diversity. Our results demonstrate the potential of to enable models to learn new knowledge beyond the training dataset. We believe represents a step forward from the zero-shot learning and has the potential to change the way we approach deep learning problems. ieee_fullname [pages=1, pagecommand=]pdfs/_Arxiv__ODIN__Supplemental_.pdf [pages=2, pagecommand=]pdfs/_Arxiv__ODIN__Supplemental_.pdf [pages=3, pagecommand=]pdfs/_Arxiv__ODIN__Supplemental_.pdf [pages=4, pagecommand=]pdfs/_Arxiv__ODIN__Supplemental_.pdf [pages=5, pagecommand=]pdfs/_Arxiv__ODIN__Supplemental_.pdf
http://arxiv.org/abs/2303.07063v1
20230313123720
Spontaneous flows and dynamics of full-integer topological defects in polar active matter
[ "Jonas Rønning", "Julian Renaud", "Amin Doostmohammadi", "Luiza angheluta" ]
cond-mat.soft
[ "cond-mat.soft" ]
shapes,arrows,calc datavisualization datavisualization.formats.functions matrix et al.
http://arxiv.org/abs/2303.07297v2
20230313172109
Disc population synthesis: decrease of the solid mass reservoir through pebble drift
[ "Johan Appelgren", "Michiel Lambrechts", "Nienke van der Marel" ]
astro-ph.EP
[ "astro-ph.EP", "astro-ph.SR" ]
Disc population synthesis 1 Lund Observatory, Department of Astronomy and Theoretical Physics, Lund University, Box 43, 22100 Lund, Sweden email: johan@astro.lu.se 2 Center for Star and Planet Formation, GLOBE Institute, University of Copenhagen, Øster Voldgade 5-7, 1350 Copenhagen, Denmark 3 Leiden Observatory, Leiden University, P.O. Box 9531, NL-2300 RA Leiden, the Netherlands Surveys of star-forming regions reveal that the dust mass of protoplanetary discs decreases by several orders of magnitude on a timescale of a few million years. This decrease in the mass budget of solids is likely due to the gas-drag-induced radial drift of mm-sized solids, called pebbles. However, quantifying the evolution of this dust component in young stellar clusters is difficult due to the inherent large spread in stellar masses and formation times. Therefore, we aim to model the collective evolution of a cluster to investigate the effectiveness of radial drift in clearing the discs of mm-sized particles. We use a protoplanetary disc model that numerically solves for disc formation, and the viscous evolution and photoevaporative clearing of the gas component, while also including the drift of particles limited in size by fragmentation. We find that discs are born with dust masses between 50 M_ and 1000 M_, for stars with, respectively, masses between 0.1 M_⊙ and 1 M_⊙. The majority of this initial dust reservoir is typically lost through drift before photoevaporation opens a gap in the gas disc for models both with and without strong X-ray-driven mass loss rates. We conclude that the decrease in time of the mass locked in fragmentation-limited pebbles is consistent with the evolution of dust masses and ages inferred from nearby star-forming regions when assuming viscous evolution rates corresponding to mean gas disc lifetimes between 3 Myr and 8 Myr. Disc population synthesis: decrease of the solid mass reservoir through pebble drift J. Appelgren 1 , M. Lambrechts2,1 N. van der Marel3 Received ; accepted ========================================================================================================== § INTRODUCTION Surveys of young star-forming regions, such as the 1 Myr-old Perseus cluster, reveal typical dust disc masses that exceed 100 M_ <cit.>. Older star-forming regions, on the other hand, often show much reduced dust masses, by up to two orders of magnitude, although with large spread <cit.>. However, care should be taken in the interpretation of individual dust disc mass measurements, as these depend on model choices such as the chosen opacity prescription, particle size distribution, and assumptions on optically thin continuum emission <cit.>. The dominant process responsible for removing dust is not yet completely clear. Two likely candidates are the radial drift of dust pebbles and the formation of planetesimals and planets. Radial drift occurs due to gas drag from gas on sub-Keplerian orbits removing angular momentum from the pebbles, which causes them to drift inwards in the disc <cit.>. If dust particles are sufficiently large, this occurs in most regions of protoplanetary discs but can be halted at locations with a pressure bump where gas drag is not present <cit.>. In <cit.> we studied the effect of radial drift in population synthesis models and found radial drift to be compatible with typical measurements of disc dust masses. However, this study only traced a single dust size and did not include gas disc clearing by photoevaporation. The effect of limiting dust growth by fragmentation and the impact of photoevaporation will be the focus of this population synthesis study. Estimates of dust grain sizes in protoplanetary discs have found maximum sizes on the order of mm-cm, based on measured opacity slopes <cit.>. However, if maximum dust sizes are estimated from the degree of polarisation in the emission from protoplanetary discs, typically lower maximum sizes of 0.10-0.15 mm are found <cit.>, although 1 mm is still possible for very low turbulence values <cit.>. Dust coagulation is a complex process where the collision of two particles can result in very different outcomes, including sticking, bouncing, fragmentation, mass transfer, cratering and erosion, depending on the sizes and velocities of the two particles <cit.>. The outcome of these coagulation processes sets the size, and therefore Stokes number, of the largest particles that characteristically hold a very large fraction of the total disc dust mass <cit.>. Importantly, the dominant particle size affects not only the speed of the radial drift of these particles but also their ability to form planetesimals via the streaming instability <cit.> and the efficiency of pebble accretion <cit.>. Protoplanetary discs are formed together with their host star when dense cores of giant molecular clouds collapse under their own gravity. The formation of the disc is thought to last a few hundred thousand years to ∼1 Myr <cit.>. As the disc continues to evolve, gas accretion removes gas from the disc over a timescale of a few to several million years <cit.>. The accretion of gas is driven by a redistribution of angular momentum in the discs. The mechanism behind the redistribution is not fully understood yet, but has been believed to be disc turbulence driven by the magnetorotational instability (MRI)<cit.> or disc winds <cit.> or a combination of the two. For a recent review on magneto-hydrodynamic disc processes see <cit.>. Due to the lack of understanding on what drives the turbulence, this is commonly parameterised by the well-known α-disc model <cit.>. During this time, gas accretion rates drop from as high as 10^-6 M_⊙/yr, for the youngest discs, to ≲ 10^-9 M_⊙/yr for discs as old as a few million years <cit.>. Simultaneously, the gas disc mass is reduced from ∼ 0.1 M_⊙ to ∼ 0.001 M_⊙ <cit.>. However, estimating gas disc masses from, for example, CO gas emission, is highly uncertain. Therefore, dust disc masses have been used to infer gas disc masses, under the crude assumption of a global dust-to-gas ratio of 0.01 <cit.>. This value is typical of the interstellar medium, but no longer valid when considering the effects of pebble drift <cit.>. Furthermore, dust disc masses themselves may be underestimated if the millimeter emission is optically thick. It is important to include the correct range of stellar masses when trying to model the evolution of a cluster of discs. Lower mass stars are more commonly formed than solar mass stars according to the stellar initial mass function <cit.>. The dominating presence of sub-solar stars is of importance because the mass of dust discs has been found to scale with the stellar mass in nearby star-forming regions as M_dust∝ M_⋆^1.3-2.4, although with a large scatter <cit.>. Similarly, a trend has been found where higher stellar gas accretion rates relate to more massive dust discs, but again with a significant scatter <cit.>. The final dispersal of the gas component of protoplanetary discs is suggested to be driven by photoevaporative winds <cit.>. A combination of EUV, X-ray and FUV radiation heats the gas at the disc surface to the point where the gas becomes gravitationally unbound and is lost from the disc. When the gas removal rate via photoevaporation and the gas accretion rate through the disc become comparable, the inner disc is no longer efficiently replenished by gas. This results in the efficient dispersal of the inner disc, creating an inner disc cavity that expands outwards with time. Several prescriptions of photoevaporation aimed for use in population synthesis models have been developed. <cit.> provide a prescription for X-ray-driven photoevaporation, which was extended with an updated X-ray photoevaporation prescription <cit.>. <cit.> provide an alternative prescription for photoevaporation driven by extreme ultraviolet (EUV), far ultraviolet (FUV), and X-rays, using a method similar to <cit.>. The importance of each of these drivers has been the subject of a number of studies. EUV and X-rays are more straightforward to model, whereas FUV is a bigger challenge because it is affected by dust evolution and chemistry <cit.>. <cit.> concluded that X-rays are the dominant driver of photoevaporation. <cit.> similarly argued that X-rays dominate over EUV. In contrast to this, <cit.> found that FUV-driven photoevaporation is dominant. We will explore the impact of both the <cit.> and the <cit.> models. In this paper, we first elaborate on the method used for the population synthesis model (Sect. <ref>). We then present the results of the study. We focus on the evolution of the disc dust mass and how its evolution is affected by the strength of the assumed disc viscosity and the two different photoevaporation prescriptions available in the literature (Sect. <ref>). This is followed by a discussion of our results, their stellar mass dependency, and the implications on the gas and dust radius evolution with time in Sect. <ref>. Finally, we present our conclusions in Sect. <ref>. § MODEL In this paper we present an update to the disc model used in <cit.>. As in the previous paper, we calculate the evolution of discs around stars in a newly formed stellar cluster using viscous gas evolution and radial drift of solids. We briefly review the used methodology here. In addition, we now evolve the size of the dust particles, include clearing of the gas disc by photoevaporation, and we use a more complete temperature treatment. §.§ Disc formation The formation of the protoplanetary disc is modelled from the collapse of an over-dense Bonnor-Ebert sphere, similar to <cit.>. The collapse occurs inside-out with the collapse front expanding outwards over time. The infall rate of gas mass onto the disc is given by Ṁ_g, inf = 4 π r_cf( t )^2 ρ ( r_cf( t ) ) d r_cfd t, where r_cf is the radius of the collapse front, ρ(r_cf) is the density of the cloud core at this radius and dr_cf/dt is the velocity at which it expands outwards. A more detailed description of how these quantities are calculated can be found in Appendix A of <cit.>. The gas is distributed across the disc according to the following equation Σ̇_g, inf(r) = Ṁ_g, inf8π R_c^2( rR_c)^-3/2[ 1 - (rR_c)^1/2]^-1/2. The infalling material lands on the disc within the centrifugal radius R_c, which is given by R_c = Ω_0^2 r_cf( t )^4G M( r_cf, ), where Ω_0 is the rotation rate of the cloud core and M(r_c) is the mass interior to the collapse front radius. We assume here that the angular momentum of the infalling material is conserved. This is a simplification that ignores the role of magnetic braking <cit.> and possible anistropic accretion <cit.>. However, detailed modelling of the angular momentum of molecular cloud cores and their evolution during the collapse phase is beyond the scope of this article. §.§ Gas disc evolution We evolve the disc viscously using the well-established alpha-disc prescription of <cit.>, where the viscosity of the disc is described by ν = α c_s^2/Ω. Here, c_s is the sound speed and Ω is the rotation rate in the disc, and α sets the strength of the viscosity. We treat α as the value which evolves the disc on a timescale consistent with measured disc lifetimes. We do not treat it as being a measure of the true level of midplane turbulence stirring the dust midplane of the disc, which has been observationally inferred to be much lower in the disc <cit.>. The latter we instead parameterise as α_t, which we also use to calculate the size of fragmentation-limited dust (see Sect. <ref>). Using accretion rates of pre-main sequence stars, <cit.> found α = 10^-2. However, recent estimates of line-width broadening by turbulent motions in outer disc regions have found values of α≲ 10^-3 <cit.>. Moreover, measurements of the fraction of stars with discs in star-forming regions suggest that the discs dissipate with a characteristic timescale of 2.5-3 Myr <cit.>. Such disc lifetimes of ∼ 3 Myr would suggest high α-values to drive disc evolution. However, more recent measurements of the disc fraction finds that, in those star-forming regions that are not subject to external photoevaporation, the characteristic timescale for disc dissipation is ∼ 8 Myr <cit.>. The slower disc evolution that the longer disc dissipation timescale indicates would suggest lower values of α. We use a base value, which we label as α_ν, of either 10^-2 or 10^-3 in order to explore both scenarios of faster and slower disc evolution. In practise, α is calculated as α = α_ν + e^-Q^4, which increases the disc viscosity when the disc becomes gravitationally unstable following <cit.>. Here, Q is the Toomre parameter expressing the gravitational stability of the disc. The viscous evolution of the disc is calculated using the equation from <cit.>. The total surface density evolution of the disc is then given by ∂Σ_g∂ r = 3r∂∂ r[ r^1/2∂∂ r( νΣ_g r^1/2) ] +Σ̇_g, inf(r) - Σ̇_g, PE,(r) where Σ̇_g, PE is the mass loss due to internal photoevaporation. How we calculate this is explained in Sect. <ref> and Appenidx <ref>. §.§ Dust evolution The infall rate of dust onto the disc is the infall rate of gas multiplied by the assumed dust-to-gas ratio of the cloud core. We assume this to be uniformly Z=0.01. §.§.§ Dust drift The evolution of the dust in the disc is governed by the radial gas flow and the radial drift of the dust particles. Radial drift occurs because the dust feels a slight headwind from the gas that orbits at a sub-Keplerian velocity <cit.>. This headwind removes angular momentum from the dust causing it to drift inwards in the disc. The speed at which the dust drifts is given by v_drift = - 2τ_s1 + τ_s^2η v_k. Here, v_k is the Keplerian orbital velocity and η is a measure of the radial pressure support in the disc given by η = -12(Hr)^2 dln Pdln r. The Stokes number, St, of the dust particles is a measure of how aerodynamically coupled particles are to the gas. The ratio H/r expresses the gas disc aspect ratio. To calculate the Stokes number we take into account the Epstein and the Stokes regimes given by St = √(2π)ρ_∙ a_dΣ_g if a_d < 94λ_mfp, 49a_dλ_mfp√(2π)ρ_∙ a_dΣ_g if a_d≥94λ_mfp. Here, ρ_∙ is the material density of the dust particle which we set to 1.6 g/cm^3 <cit.>. The size of the dust grains, a_p, is discussed further in Sect. <ref>. Because the dust is coupled to the gas, small grains simply move along with the gas in the disc. Taking this into account, the total radial velocity of the dust, v_d, is given by v_d,r = v_drift + v_g1 + St^2, where v_g is the radial velocity of the gas. The surface density of dust is then evolved with the following continuity equation ∂Σ_d∂ t = -1r∂∂ r(rΣ_d v_d,r) + Σ_d,inf. §.§.§ Dust sizes We follow the evolution of the largest grains that carry most of the mass in typical dust size distributions <cit.>. The dust grows from an initial monomer size of 1 μ m to the fragmentation limit on a time scale given by t_grow = Σ_gΣ_dΩ_K. For grains that reach their maximum size limit by fragmenting, the maximum grain size is set by a_frag = f_f23πΣ_gρ_∙α_tu_f^2c_s^2, where f_f = 0.37 is a fudge factor to better match detailed coagulation simulations <cit.>. We set the level of the midplane turbulence α_t to 10^-4, in line with the lower α values inferred from observations <cit.>. Note that we treat it as a separate parameter from α_ν (Eq. <ref>). The fragmentation threshold velocity, u_f, depends on the material properties of the grains. Laboratory experiments of silicate dust grain collisions suggest limits of about 1 m/s <cit.>. Water ice was thought to be stickier than silicates and have a fragmentation speed of about 10 m/s <cit.>. However, more recent studies conclude that the fragmentation speed of water ice is likely to be lower. The stickiness of CO_2-ice is also thought to be quite low, with fragmentation speeds of about 1 m/s <cit.>. Similar results are found for mixtures of water and CO_2 ices <cit.>. Therefore the choice of 1 m/s as a global fragmentation velocity should be suitable. Particles that are not limited by fragmentation in their growth naturally approach their drift-limited sizes in our model. Their maximum size is then bound by a_drift = f_d2Σ_dπρ_∙v_k^2c_s^2γ^-1, where f_d = 0.55 is a fudge factor with similar purpose as f_f and γ = |dln P/dln r| <cit.>. §.§ Disc temperature The temperature of the disc is calculated similar to <cit.>. We include irradiation and viscous heating. The temperature due to irradiation is given by <cit.> σ_SB T_irr, ⋆^4 = L_⋆4π r^2Hr(dln Hdln r - 1 ), where L_⋆ is the stellar luminosity. We assume that the luminosity of the star scales linearly as L_⋆ = L_⊙(M_⋆/M_⊙) <cit.>. The heating rate due to irradiation is given by <cit.> Γ_irr = 8σ_SB( T_irr, ⋆^4 + T_core^4 )τ/2 + 1/√(3) + 1/(3τ), where T_core = 10 K is the temperature of the cloud core, τ = κΣ/2 is the optical depth and κ is the opacity. The heating rate due to viscous heating is given by <cit.> Γ_Visc = 94νΣ_g(r ∂Ω∂ r)^2. Heat is lost from the disc by radiative cooling <cit.> Λ_rad = 8σ_SBT_mid^4 3( τ/2 + 1/√(3) + 1/(3τ) ), where T_mid is the midplane temperature of the disc. The midplane temperature due to irradiation and viscous heating is given by the balance of the heating and cooling rates. We use an opacity prescription similar to <cit.>, where the opacity is that of solid grains and given by κ = 0.052 cm^2/g (T/K)^0.738 <cit.>. This opacity scaling assumed a solar composition of dust grains. However, above a temperature of ∼ 1500 K most dust will have sublimated. This will cause the opacity to drop and the disc to cool until the dust solidifies again. Unless the much lower gas opacity is enough to drive the disc to higher temperatures, this results in a temperature plateau around 1500 K. This effect has been found in more complex disc temperature models <cit.>. We therefore impose a temperature limit of 1500 K in our model. §.§ Photoevaporation Photoevaporation removes gas from the surface of the protoplanetary disc by either EUV, FUV, or X-rays heating the gas until it can escape the disc <cit.>. In this work, we look at two different photoevaporation prescriptions, one by <cit.> (hereafter Pic21) and one by <cit.> (hereafter Kom21). The two prescriptions differ in the physics that is included, and also in the methods used to derive photoevaporation rates. To model photoevaporation includes X-rays and EUV radiation, although the X-ray component is the dominant contributor to the heating and mass loss rate <cit.>. The model from includes X-rays, EUV, and FUV radiation, with here the FUV radiation being the dominant source of heating. In this model, the X-ray contribution is negligible, as illustrated in Fig. <ref> where mass loss rates are driven by the FUV radiation, even if the FUV fraction would be reduced by a factor hundred. We, therefore, choose to present both these models to reflect the uncertainty in modeling photoevaporative mass loss (for a further discussion, see Sect. <ref>). The equations and their parameters used to calculate the photoevaporation rates are given in Appendix <ref>. To find the parameters for stellar masses that fall in between the ones given in either model, we linearly interpolate over the grid of masses. For stellar masses that fall outside the range of masses modelled in the prescriptions we use the parameters for the lowest/highest mass given to avoid extrapolating. We do this because, in general, the parameters of either prescription are not monotonically increasing or decreasing with stellar mass. For the model, this upper mass is 1 M_⊙ and stars above this mass will be very uncommon in our sample, therefore the choice of using the 1 M_⊙ cut off will be of little consequence. With the model the lower mass is 0.3 M_⊙ and thus more stars will be affected since our stellar masses extend to ≲ 0.1 M_⊙, possibly leading to moderately overestimating the photoevaporation rate for very low-mass stars. §.§ Population Synthesis The main cloud core parameters that are varied in the population synthesis are the mass and angular momentum. The masses of cores in molecular clouds are described by the so-called core-mass-function (CMF). This is similar in form to the initial mass function of stars (IMF) <cit.>. Therefore, we sample masses of the cloud cores from the Kroupa IMF <cit.>. We limit our sampling to masses between 0.1–2 M_⊙. To set the angular momentum of the cloud core, we set the maximum centrifugal radius, which is connected to the angular momentum of the cloud core through Eq. <ref>. This is the largest radius at which any material will land on the disc during its formation. We select centrifugal radii from a normal distribution with a standard deviation of 30 au and a mean scaled linearly with the cloud core mass as R_c = 10 au (M_core/M_⊙), as in <cit.>. In order to limit the number of parameters varied in the population synthesis, we chose to use a fixed value for the temperature of the cloud core of T_core = 10 K across all simulations. The stars in a young star-forming cluster do not all form at the same time. For instance, star formation in the star-forming region of Taurus is thought to have been going on for 1-2 Myr <cit.>. Across Orion, for discs in isolation, the spread in disc mass is likely related to an age spread <cit.>. Therefore, for the internal age spread of the discs, we use a value of 1 Myr. When a protoplanetary disc forms, it will inherit the dust-to-gas ratio of its parent molecular cloud core. The metallicity of a clump in a giant molecular cloud which forms s stellar cluster is thought to be very homogeneous, due to a very short mixing timescale <cit.>. Hence, we do not vary the initial dust-to-gas ratio of the cloud cores and keep the nominal value of Z = 0.01 for all cloud cores in the population synthesis. Finally, we run two population synthesis copies with the same cloud core masses and centrifugal radii, but one using the prescription and the other using the prescription. The discs are evolved for 10 Myr using α_ν = 10^-2 (Sect. <ref>) and α_ν = 10^-3 (Sect. <ref>) for disc lifetimes of 2.5 Myr and 8 Myr <cit.>, respectively. § RESULTS §.§ Evolution of a single disc Before presenting the population synthesis results, we show the evolution of a single protoplanetary disc to illustrate the key physical processes at play. For this, we started a model with a molecular cloud core with a mass of 1 M_⊙ and a maximum centrifugal radius of 10 au. We used an α-viscosity of α_ν = 10^-2, together with the -photoevaporation prescription. Other model parameters are the same as described in Sect. <ref>. Viscous evolution dominates the gas disc for the first ∼ 3.7 Myr, after which photoevaporation begins to quickly carve out a gap in the gas. A gap in the disc forms at an orbital distance of about 3–4 au. This is seen in Fig. <ref>, which shows the evolution of the temperature (left panel), gas surface density (middle panel), and dust surface density (right panel). Once the gap opens up, dust drift over this gap is prevented because the decreased pressure gradient at the gap edge (Fig. <ref>, panel b). For this nominal case, we find that 0.6 M_Earth of dust was trapped outside the gap, which gradually is pushed outwards as the inner cavity expands. The radially inwards flux of pebbles is highest in the inner disc, early in its evolution (Fig. <ref>, left panel). However, during the early times (≲ 0.35 Myr) dust also has an outwards motion in the outer disc region between 10–400 au, because the gas in this region is expanding viscously outwards and the dust is well-coupled to it. The dust flux drops over time until a gap is opened up by photoevaporation. The dust remaining within the gap is quickly pushed inwards, whilst the dust retained outside the gap is slowly pushed outwards. This latter effect is represented by the thin sliver of dust shown in green in the top right of the left panel in Fig. <ref>. The dust-to-gas ratio exceeds the initial value of 0.01 at two regions in time and space (Fig. <ref>, middle panel). It occurs when the disc is 0.2–0.4 Myr old at radii between 0.1–5 au, and at a later time, between 0.6–0.9 Myr, at radii between 0.1–1.5 au. The high dust-to-gas ratio makes these potential sites for planetesimal formation <cit.> (see also Sect. <ref>). Particles do not grow beyond cm in size, except at early times, within ≲ 1 Myr (Fig. <ref>, right panel). Around 1 au there is a local minimum in the particle size distribution. This region is located where the disc transitions from the maximum temperature of 1500 K to lower temperatures at wider radii where stellar irradiation is dominant in setting the disc temperature rather than viscous heating. §.§ Population synthesis with α_ν = 10^-2 In this section we will present the results from the population synthesis model using α_ν = 10^-2. The value of α_ν which best matches observations of protoplanetary discs lifetimes is still a matter of debate, as discussed in Sect. <ref>. We show results for α_ν = 10^-3 in Sect <ref>. §.§.§ Gas disc evolution The evolution of the gas accretion rate over time for all discs in the population synthesis is shown in Fig. <ref>. Discs evolving under photoevaporation (red curves) are dominated by viscous evolution for about 1–3 Myr before photoevaporation takes over. In the prescription (black curves) discs undergo viscous evolution for longer times. Photoevaporation clears the inner parts of discs at the earliest after about 5–6 Myr, and for some discs photoevaporation never plays an important role during the 10 Myr that we simulate. Newly formed discs have gas masses ranging from 0.03 M_⊙ to 0.5 M_⊙. These gas discs are then depleted by accretion and photoevaporation (Fig. <ref>). For both the and photoevaporation prescriptions, the mass reservoir diminishes until approximately 1 % of the initial mass remains. This remainder of gas is found outside the photoevaporative gap at large orbital radii. Therefore, it takes excessively long to deplete by photoevaporation. However, the gas surface densities in these gas-poor regions §.§.§ Dust disc evolution Radial drift of pebbles reduces the dust mass of protoplanetary discs on a timescale of a few Myr. This is illustrated in the middle panel of Fig. <ref>, which shows the evolution of the dust mass as a function of disc age. Discs are formed from cloud cores with gas masses between ∼ 0.1 M_⊙ and ∼ 1 M_⊙, and are born with dust disc masses between of 50 M_ and 1000 M_ respectively. The least massive and shortest lived discs are depleted of dust within less than 1 Myr, whilst the most massive and longest lived discs last up to 7 Myr. This process is also seen in the evolution of the cumulative distribution of dust disc masses at cluster ages between 0.5 Myr and 5 Myr, as shown in Fig. <ref>. In the 0.5 Myr-old cluster, 73 % of discs have a disc dust mass higher than 10 M_. At 1 Myr this has decreased to only 45 % of discs having over 10 M_ of dust. From here on we see a continued decrease in the available disc dust mass as more and more dust drifts onto the star. We do not find that photoevaporation is able to retain significant amounts of dust by gap opening. Using the prescription, all discs retain <0.1 M_ of dust. With the <cit.> model, we find that 20 % of all discs are able to retain at least 0.1 M_ of dust. However, of these discs the median mass retained is only 0.3 M_. The median mass of these discs right at the end of their formation, which is when they are the most massive, is 367 M_. Hence, these discs retain less than 0.01 % of their maximum dust mass. For comparison, the observed median dust masses in protoplanetary disc surveys at ∼ 2 Myr are 3.0 M_ (Lupus), 3.2 M_ (Cham I), 6.2 M_ (Taurus), and 11.5 M_ (Cham II) <cit.>. The retention of dust by gap opening can also be seen in Fig. <ref>, where the gas accretion rate as a function of dust disc mass is shown for each disc using both photoevaporation models. Discs start out with high gas accretion rates (∼ 10^-6 M_⊙/yr) and low disc dust masses. For the model (red curves) some of these discs reach a phase where the gas accretion turns over at rates between 10^-8 and 10^-9 M_⊙/yr, due to photoevaporation clearing the inner disc of gas, whilst retaining some dust. These are the discs where photoevaporation has trapped dust outside the gas gap. None of the discs using the model (black lines) go through this phase, showing that all these discs lost all of their dust before photoevaporation opened up a gap. The efficient depletion of dust by radial drift agrees with our previous results from <cit.> where radial drift is the dominant process for removing dust from protoplanetary discs. Other mechanisms of dust removal, such as planetesimal formation and subsequent planet formation, would only further deplete the dust reservoir and will be discussed in Sect. <ref>. If radial drift would not be effective, the dust would evolve by advecting with the gas and therefore be lost at the same rate as the gas. The cumulative distribution of disc dust masses in this case is shown with the thin coloured lines in the left plot of Fig. <ref>. For this experiment, we calculated these dust masses by multiplying the gas mass of each disc with the initial dust-to-gas ratio and kept it fixed at a constant value of Z=0.01 in our simulations (Sect. <ref>). In this case, dust is lost very slowly, and the profile of the cumulative distribution remains similar throughout the evolution of the cluster. For comparison, we show a sample of observed dust disc masses in different star-forming regions in the right plot of Fig. <ref>. The observed sample is taken from <cit.>. To get the occurrence fraction with respect to the full population of stars in the cluster, we scale the cumulative distributions of this sample according to Eq. <ref> (for more, see Appendix <ref>), assuming a gas disc lifetime of 2.5 Myr <cit.>. Note that the model disc masses presented in this paper are the masses as given directly by the model, that is the integrated surface densities. We do not take into account optical depth effects of the dust to model the dust disc mass that would effectively be observable. The observable dust disc mass would be expected to be somewhat lower than the model masses. At a cluster age of 0.5 Myr and 1 Myr, we find in the model median dust disc masses of ∼ 30 M_ (0.5 Myr) and ∼ 5.5 M_ (1 Myr). This can be compared to the Perseus sample, which has significantly higher median masses for class 0 objects (158 M_) and class I objects (52 M_) <cit.>. In these early stages of disc evolution radial dust drift could be less efficient than we find here. However, determining the masses of young embedded discs remains challenging <cit.>. For the more evolved discs we find that the distribution of observed discs aged between 1–3 Myr all lie in between the 1–3 Myr old cluster in our population synthesis. The observed disc dust masses lie closer to the 2–3 Myr older model clusters than the 1 Myr model clusters. For the oldest observed cluster, Upper Scorpius, only the oldest model cluster (5 Myr) with the photoevaporation model lies somewhat close. Using the photoevaporation prescription, too much dust is retained in too many discs. However, the fate of solids concentrated at the cavity edge is uncertain (see Sect. <ref> and <ref>). If we compare the observed sample to the expected dust mass for models without radial drift (thin coloured lines in Fig. <ref>) it is clear that the match is very poor, with the exception of the Perseus discs. This indicates that dust in discs that are a few Myr old has been lost at a higher rate than the gas. Therefore, the sometimes-used assumption that the gas mass in protoplanetary discs is 100 times their dust mass does not hold. We see this in the right panel of Fig. <ref>, which shows the evolution of the global dust-to-gas ratio of all discs as a function of their age. Note that, even though the cloud cores from which the discs form initially have dust-to-gas ratios of 0.01, efficient radial drift of dust very early in the disc evolution decreases the global dust-to-gas ratio, already very early in the disc evolution (≲ 10^5 yr). Although radial drift is able to qualitatively match the cumulative disc dust mass distributions well, there is one component of the observational sample which is not well-reproduced: the observed clusters show that there is a fraction (∼ 10%) of discs which retain large amounts (≥ 10 M_) of dust at late times <cit.>. In Appendix <ref> we show an experiment of halting dust drift in a subset of the most massive discs. We find that stopping dust drift in a fraction as low as 5 % of the discs can extend the high-mass tail of the CDF, bringing the model more in line with the observations. This supports the claim that ∼ 5%-10% of discs have a reduced efficiency, or complete halting, of radial dust drift. This group of discs can represent a population of discs in which radial drift is less efficient. A likely mechanism for preventing radial drift of pebbles is the presence of pressure bumps in the protoplanetary disc, possibly triggered by wide-orbit planets. We discuss this further in Sect. <ref>. An important measure of disc evolution is the relation between the gas accretion rate onto the star and the dust disc mass. This is shown in Fig. <ref>, where the lines shown the model and the grey dots show observational measurements from <cit.>. Here, we see that a large region of parameter space with relatively low accretion rates of less than about 10^-8 M_⊙/yr and dust disc masses of over 1 M_ is populated by the observed sample. Our synthesis model with the photoevaporation does not produce such dust-rich discs with low gas accretion rates. This region contains roughly half of the of observed sample. Using the photoevaporation prescription, an even smaller region of the observed sample is reached. Only those discs with accretion rates of about 10^-8 M_⊙/yr or more are reproduced. The disagreement between model and observation in the gas accretion rate and dust disc relation could originate from an overestimate in the model of the gas accretion rate onto the host star. Lower gas accretion rates onto the star are possible if disc winds remove some gas from the inner disc before it is accreted onto the host star <cit.>. Alternatively, dust could have been consistently retained in heavily gas-depleted discs, in apparent conflict with the evolution of the cumulative mass distribution (Fig. <ref>). Finally, our models could be consistent with the observations if the estimated mass flux onto the host star is somehow underestimated from the accretion observations. §.§ Population synthesis with α_ν = 10^-3 Lowering the viscous α_ν has a number of effects on the evolution of a protoplanetary disc. In general, the disc will evolve more slowly as angular momentum transport is less efficient. Although, when the disc is very young, the increased viscosity due to gravitational instabilities can dominate over the base viscosity, making early evolution somewhat similar for different base α_ν values (Eq. <ref>). The slower viscous evolution results in photoevaporation becoming dominant at later times and therefore longer gas disc lifetimes. Viscous heating is also less efficient, leading to a cooler disc, further slowing down the evolution. The effect on the dust component is less straightforward. A slower gas evolution results in generally higher gas surface densities. This, in turn, results in lower Stokes numbers and slower dust drift (Eq. <ref> and <ref>). However, the particle size in the fragmentation limit is linearly dependant on the gas surface density (Eq. <ref>). Therefore, Stokes numbers do not change significantly (for a fixed value of α_t). However, the dust is also advected with the gas. At α_ν = 10^-3 the radial gas velocity is slower than at α_ν = 10^-2, resulting in less dust being removed from the disc by pure advection with the gas. The dust disc is therefore effectively drained at a lower rate at α_ν = 10^-3 compared to α_ν = 10^-2. We do not find that the retention of dust by photoevaporative gaps is significantly different at α_ν = 10^-3 compared to α_ν = 10^-2 (Fig. <ref>). The dust discs are longer lived by a few million years at α_ν = 10^-3 compared to α_ν = 10^-2, the gas discs also evolve slower and a photoevaporative gap opens up typically 1-2 Myr later. The fraction of discs which retain >0.1 M_ of dust outside the photoevaporative gap is 20% at α_ν = 10^-2 and 15% at α_ν = 10^-3. Using α_ν = 10^-2 the median dust mass retained outside the photoevaporative gap is 0.3 M_, compared to 0.2 M_ when using α_ν = 10^-3. The observed cumulative distributions (right panel of Fig. <ref>) were as before scaled according to Eq. <ref>, but with a disc lifetime of τ = 8 Myr, following <cit.>. This lifetime is derived by excluding regions with high external photoevaporation. It should therefore be more representative of the observational sample we are comparing to, which are not strongly exposed to external photoevaporation <cit.>. For α_ν = 10^-3 and τ = 8 Myr, radial drift is overall consistent with the observed depletion of dust, as seen in the two panels of Fig. <ref>. Also here we find that radial drift alone is not able to reproduce a small fraction of the population of discs in the observed sample which retain large amounts of dust for more than several Myr, similar to what we found when assuming α_ν = 10^-2. This further supports the idea that there are some discs where radial drift may be less efficient. Slower evolving discs lead to lower accretion rates onto host starts, which manifest itself in the Ṁ_g - M_dust relation. However, we find that the combined evolution of both quantities is little different from the α_ν =10^-2 case. There is a slightly larger scatter in gas accretion rates, and a larger scatter in the disc dust mass at the end of the disc formation, as shown in Fig. <ref>. § DISCUSSION §.§ Interpretation of disc dust masses §.§.§ Dependency on the stellar mass The fraction of the dust disc mass removed in a given time varies with disc and stellar mass. The dependency of the solid mass budget on stellar mass, for different cluster ages, is explicitly shown in Fig. <ref>. We find that dust clearing by radial drift is more efficient around low-mass stars, as was also found in previous works <cit.>. Observations point towards a linear or super-linear trend of dust mass with stellar mass, possibly steepening with time <cit.>. We find steeper power law profiles, given by M_dust∝ M_⋆^β with β = 2.4 at 2 Myr and β = 6.9 at 7.5 Myr, although in the latter case the data is poorly described by a single power law. When instead limiting the model sample to those discs with detectable masses above 0.1 M_, we recover much more moderate power law dependencies, with β = 2.2 at 2 Myr and β = 1.6 at 7.5 Myr, in line with the observed exponents. These relations may further be influenced by the stellar-mass dependent occurrence of giant planets that can reduce pebble drift, as recently argued by <cit.>. This dependency on stellar mass is also reflected in the evolution over time of the profile of the cumulative disc dust mass distribution (Fig. <ref> and <ref>). The cumulative distribution becomes less steep with time. If dust removal was more efficient around more massive stars with more massive discs, the profile would become steeper with time. Conversely, if the efficiency is the same across all disc and stellar masses, the profile would appear similar in shape to the gas tracer profiles in Fig. <ref> and <ref>. In summary, radial drift not only removes dust on a timescale that agrees with observations, but it is also able to match the profile of the cumulative distribution well. §.§.§ The role of pressure bumps Disc surveys have revealed that many of the resolved protoplanetary discs show significant substructures, with very pronounced rings and gaps in the dust <cit.>. These structures are thought to originate from pressure bumps trapping dust <cit.>. The high occurrence of substructures in observed discs suggests that they might be common in all discs. However, by design, such surveys often target the largest and brightest protoplanetary discs, which could be more prone to forming gap-opening giant planets <cit.>. The frequent occurrence of deep gaps and rings in the dust continuum of these large and long-lived discs may signal regions where pebble drift is delayed. The link between exoplanet statistics and disc substructures was investigated in detail by <cit.>. They found that the increased occurrence of extended, structured discs with stellar mass is similar to the increased occurrence of giant planets with stellar mass. This supports the idea that large scale gaps in protoplanetary discs originate from giant planets. Such pressure bumps can arise when growing planetary cores reach the pebble isolation mass and carve shallow gaps that are sufficient to halt pebble drift <cit.>. Other sources of pressure bumps that can slow down or halt pebble drift also exist, for example changes in the level of turbulence at the transition from regions where magneto-hydrodynamic instabilities are active <cit.>. It is thus plausible that the majority of discs are radial-drift dominated, but that in ∼5%-15% of discs, radial drift is reduced by the presence of giant planets. This may connect to the frequently inferred presence of giant planets interior to debris discs <cit.>, where the latter could have been the natural outcome of left-over pebbles clumping into planetesimals during disc clearing <cit.>. §.§.§ The role of planet formation Radial drift is not the sole process by which pebbles are removed from protoplanetary discs, as we know that a fraction of them will form the planets and planetesimals that we observe in our own solar system, as well as in exoplanet systems and debris discs. In this work, we have shown that radial drift removes dust from protoplanetary discs on a timescale which agrees well with dust disc lifetimes as measured from observations. This suggests that radial drift is the dominant dust-removal process. However, since we do not include planetesimal or planet formation in the model, we cannot dismiss their potential importance. Planetesimal formation could remove a substantial fraction of dust particles present in protoplanetary discs, but its efficiency, and how that might vary across stellar and disc mass, is currently not well understood. Planetesimals are thought to form by the streaming instability <cit.>, which is likely to happen in regions with a super-solar dust-to-gas ratio <cit.>. Pressure bumps at the gap edges of giant planets are a promising location for this process, as dust piles up in these regions, and large amounts of planetesimals could form <cit.>. Such planetesimals would then represent a second generation of late-formed planetesimals, as they are triggered by the presence of an already fully-formed giant planet. Similarly, the formation of planets should also be responsible for the removal of some fraction of the dust in protoplanetary discs. To assess the importance of this process, a possible future extension of this work could include a exoplanet synthesis model as well <cit.>. In this context, it is interesting to note that the mass of solids present in typical observed exoplanet systems is comparable to that found in class II discs <cit.>. In the earlier disc stages, the mass budget in pebbles is larger by more than one order of magnitude, so up until the class II stage the decrease in the mass in pebbles is mainly driven by dust drift, rather than planet formation. §.§.§ What happens to the dust retained outside the photoevaporative cavity In our model, the dust retained outside the photoevaporative cavity eventually moves into the location of the pressure maxima where there is no radial drift. Since our model does not consider any additional treatment of this dust, this results in narrow long-lived rings of dust that are slowly pushed outwards as the photoevaporative gap in the gas expands outwards. The high dust-to-gas ratio in these pressure bumps could make them favourable locations for the formation of planetesimals via the streaming instability <cit.>. However, the fate of the dust retained outside photoevaporative gaps is uncertain. For example, <cit.> found that this dust is effectively lost in a process where the largest particles grow until they fragment by collisions, replenishing the reservoir of small dust particles that are subsequently removed by radiation pressure. If the dust is turned into planetesimals, this could lead to the formation of debris discs. However, the median mass of dust outside the photoevaporative gaps is only 0.3 M_ for α_ν = 10^-2 and 0.2 M_ for α_ν = 10^-3. While this dust mass is similar to that present in the known debris disc population, the planetesimal population that creates this dust in debris discs could be significantly higher <cit.>. §.§.§ The role of stellar binarity Most solar mass stars reside in multiple systems, and the stellar multiplicity fraction increases with stellar mass <cit.>. Observations have found that discs around binaries typically host dust masses below 50 M_, and that for binary separations below 100 au discs have dust masses below 10 M_ <cit.>. Therefore, measuring the mean disc masses in young stellar clusters without taking into account the binarity of stars can lead to underestimating the typical mass of discs around single stars. A future extension of this work could include the effect of stellar binarity in driving faster disc dispersal <cit.> through tidal effects and stellar encounters truncating disc radii in the cluster stage<cit.> §.§ Transition discs Transition discs with dust-depleted inner cavities and low accretion rates have been suggested to be caused by photoevaporation of the inner disc <cit.>. However, we find that it is difficult to form discs that both show signs of gas accretion onto the hosts star and massive extended dust disc at wider radii. Gas within the photoevaporation gap is lost on very short timescales (≲ 10^5 yr), as seen in Fig. <ref>, while only retaining small amounts of dust trapped at the outer gap edge. As discussed earlier, the fate of the retained dust is such that it might be lost on short timescales (Sect. <ref>). Therefore we do not find that photoevaporation, as formulated here, is a likely pathway for forming the majority of transition discs. This is in line with the low occurrence of discs with a cavity radius within 10 au <cit.>, that would have been expected in classic photoevaporation models <cit.>. §.§ Evolution of the outer gas and dust disc radius Pebble drift could also, in principle, be identified through tracing the evolution of the outer dust disc radius with respect to the outer gas disc radius <cit.>. This is nevertheless challenging as both radii could be influenced by late accretion events of gas and dust onto the disc <cit.>. Moreover, in our model, the outer gas edge continuously viscously expands outwards with time, while recent models have argued against this based on disc wind models <cit.>. However, an outwards expanding discs is seen in disc wind models that include the truncation of the outer disc <cit.>. Figure <ref> illustrates the evolution of the gas radius as a function of the dust radius for the population synthesis model using α_ν = 10^-3 and the photoevaporation prescription. Here, we calculate the disc radius as the radius within which either 90% of the disc gas or dust mass is present. If a disc has opened up a gap by photoevaporation and retained > 0.1 M_ of dust outside the gap, the dust radius is taken as the outer radius where the dust is trapped and indicated with a triangle symbol. For very young discs the gas and dust radii are similar because the dust is tightly coupled to the gas. As the disc evolves, the dust decouples from the gas and the dust radius begins to decrease while the gas radius still increases. In the here-used approximation of only tracing the largest particle size, the radius of the dust disc shrinks rapidly once radial drift becomes efficient while gas radii continue to expand due to viscous evolution. Finally, the triangular symbols represent those discs where photoevaporation has opened up a gap in the gas whilst retaining >0.1 M_ of dust outside the gap. The dust disc radii also increase, as the dust is pushed outwards as the outer edge of photoevaporative gap expands. A direct comparison of synthetic with observed dust and gas radii is not straightforward. This would require post-processing our results with radiative transfer in order to determine the observable outer dust edge and gas edge, the latter using a CO gas tracer <cit.>. Nevertheless, for illustrative purposes, we show in Fig. <ref>, with grey points, the dust and gas (CO) radii determined for the discs in the sample by <cit.>. This uniformly-analysed collection of discs, drawn mainly from Taurus, Lupus, Ophiuchus, and Upper Sco, spans stellar masses between 0.15–2 M_⊙ and ages between 0.5 to 20 Myr. Similar to our results, all observed discs have dust radii located within their gas disc radii and only a few discs have severely drift-depleted discs with R_gas > 4R_dust. Previous work has argued that radial drift would rapidly deplete pebble discs and result in discs with a gas-to-dust size ratio smaller than four <cit.>. However, this is likely an effect of assuming larger fragmentation velocities (u_f=10 m/s) compared to this study (u_f=1 m/s, see Sect. <ref>). This then results in larger pebbles closer to the drift limit and an outer dust radius that moves inwards too rapidly. §.§ Uncertainty in photoevaporation prescriptions The disagreement in derived mass-loss rates in different photoevaporation models reflects that the underlying physics driving photoevaporation is not entirely understood. <cit.> found that the chosen X-ray spectrum frequency matters significantly for the derived photoevaporation rates. This can explain why some studies <cit.> find very low mass loss rates for for the derived photoevaporation rates X-rays. Also, X-ray photoevaporation models, such as the used here, may underestimate the cooling efficiency in the discs and therefore overestimate the photoevaporation rate <cit.>. Since we cover both low and high photoevaporation efficiencies here, we believe our conclusion on their relative small effect on dust evolution are robust. Nevertheless, this remains a clear area for future work, especially as recent works point towards photoevaporation and magnetic disc wind losses to be tightly linked <cit.>. Since our model does not track the population of small (≲ 100 μm) dust grains, and the provides no scaling with the dust-to-gas ratio (a ratio of 0.01 is used), we do not model the effect that a decreasing or increasing amount of small dust present has on the FUV photoevaporation rate. A decrease in the available small dust grains reduces the opacity and thus increases the penetration depth of the photons, which can enhance the mass-loss rate. Simultaneously, fewer small dust grains also leads to less photoelectric heating, which reduces the mass-loss rate. <cit.> found that these two effects can to a large degree negate each other. However, at dust-to-gas ratios above ∼ 0.03, <cit.> found that a decrease in the dust-to-gas ratio increases the FUV photoevaporation rate. At lower dust-to-gas ratios, the photoevaporation rate instead decreases, but the inclusion of hydrogen ionisation by X-rays lessens the reduction in the photoevaporation rate due to the large amount of free electrons allowing for rapid recombination onto the dust grains. Similarly, <cit.> also concluded that at dust-to-gas ratios below 0.01 photoevaporation by FUV is reduced due to inefficient photoelectric heating. With these results in mind, and the fact that the discs in our model rarely exceed the initial dust-to-gas ratio of 0.01 (see middle panel of Fig. <ref>), including the effect of small grains of the photoevaporation rate would likely result in a reduced FUV photoevaporation rate compared to our current model. Since we already find that FUV photoevaporation has a negligible effect on the dust disc evolution, our conclusions would not change. We also did not take into account that small dust particles may also be entrained in photoevaporative winds <cit.>, but this only affects very small dust, as the maximum particle size that can be effectively entrained in photoevaporative winds is ∼ 1 μm <cit.>. Therefore, this process does not impact significantly the mass budget of pebbles in the disc, but may be important for the determination of gas mass loss rates in the upper parts of protoplanetary discs <cit.>. Finally, in this project, we did not include external photoevaporation. This choice is appropriate for the well-studied nearby stellar clusters considered here. Therefore, we do not include it in our model. Nevertheless, protoplanetary discs in more massive clusters with O and B stars would be subject to external photoevaporation from the strong FUV background radiation of said stars. This process may significantly shorten the disc lifetimes <cit.>. § CONCLUSIONS * We found that the depletion of protoplanetary dust by radial drift of pebbles is compatible with the depletion trend seen in observed protoplanetary discs. We explored dust depletion in synthetic clusters discs with disc depletion timescales of 2.5 Myr or 8 Myr, corresponding to, respectively, a high and low viscous alpha (α_ν = 10^-2 and α_ν = 10^-3). Both cases broadly reproduce the cumulative loss off pebbles from protoplanetary discs. * Our synthesis model is consistent with the evolution of the cumulative dust disc mass distribution with time. However, a fraction of about 5-10% of observed discs show signs of reduced radial drift compared to the model, possibly triggered by wide-orbit planet formation. Other relations that are well-reproduced are the moderate decrease of dust radius with gas radius with time and the trend between disc mass and stellar mass. However, the synthesis model does not recover a population of massive dust discs with low stellar accretion rates. The latter may point to our model not including inner disc winds, which could reduce the mass accretion rate onto the host star, or that observations underestimate stellar accretion rates. * Discs forming with a global dust-to-gas ratio of 0.01 do not retain this proportion of dust. Efficient radial drift, even during the build-up of the discs, lowers the disc's global dust-to-gas ratio below that of its birth environment. Hence, gas disc masses cannot be estimated by multiplying the dust mass by the ISM-ratio of 100, even without considering dust optical depth effects. * Photoevaporation plays a minor role on the evolution of the disc dust mass. Strong X-ray photoevaporation is able to retain some dust outside the photoevaporative gaps, but only a very small fraction (≲0.01 %) of the initial dust mass of the disc (50-1000 M_). Photoevaporation may aid in reaching the low gas accretion rates observed (≲ 10^-9 M_⊙/yr) in protoplanetary discs <cit.>. However, this depends on the assumed photoevaporation efficiency, and is only achieved for maximally efficient X-ray photoevaporation prescriptions. We thank Anders Johansen for his comments on the manuscript. We also thank Andrew Sellek for helpful discussions and input on the photoevaporation models. J.A. acknowledges the Swedish Research Council grant (2018-04867, PI A. Johansen). M.L. acknowledges the Wallenberg Academy Fellow grant (2017.0287, PI A. Johansen) and ERC starting grant 101041466-EXODOSS. aa § PHOTOEVAPORATION PRESCRIPTIONS §.§ <cit.> photoevaporation provides a photoevaporation prescription derived from models of X-ray photoevaporation for different stellar masses using the photoevaporation model of <cit.>. The photoevaporation rate is given by Σ̇_PE( r ) = ln( 10 ) ( 6 a ln(r)^5r ln( 10 )^6 + 5 b ln( r )^4r ln( 10 )^5 + 4 c ln( r )^3r ln( 10 )^4 + 3 d ln( r )^2r ln( 10 )^3 + 2 e ln( r ) r ln( 10 )^2 + frln( 10 ) ) Ṁ_PE( r)2π r [M_⊙ au^-2 yr^-1], where Ṁ_PE( r ) is the mass loss rate due to photoevaporation at a given disc radius. It is given by Ṁ_PE( r )Ṁ_PE(L_X) = 10^alog(r)^6 + blog(r)^5 + clog(r)^4 + dlog(r)^3 + elog(r)^2 + flog(r) + g, where Ṁ_PE(L_X) is the total mass loss rate due to X-ray photoevaporation. The parameters a,..., g for different stellar masses are given by Table <ref>. The X-ray luminosities for each stellar mass is shown in Table <ref>. §.§ <cit.> photoevaporation The photoevaporation prescription of is based on models which includes photoevaporation due to EUV, FUV, and X-rays. The rate of photoevaporation is given by Eq. (<ref>). log( Σ̇_g, PE( r ) 1 g s^-1 cm^-2) = c_5 x^5 + c_4 x^4 + c_3 x^3 + c_2 x^2 + c_1 x + c_0, where x is given by x = log( rr_g), and r_g is the the gravitational radius given by r_g = G M_⋆( 10 km s^-1)^2 = 8.87 au(M_⋆1M_⊙). model photoevaporation in the range 0.1 r_g≤ r ≤ 20 r_g as this is where photoevaporation is thought to occur <cit.>. We therefore only include photoevaporation in the same range. The parameters c_5,..., 0 in Eq. (<ref>) for different stellar masses are given in Table <ref>. X-ray and FUV luminosities for the same stellar masses are given in Table <ref>. To approximate the evolution of the photoevaporation rate as the star grows more massive we linearly interpolate between these stellar masses and parameter values. § DISC FRACTIONS The dust present in protoplanetary discs will result in an excess of infrared emission at mm wavelengths. As a disc in a cluster of young stars evolves, the dust component is depleted, and the infrared excess is lost. To determine the fraction of stars that have discs with mm emission, one often only targets those stars with discs that show an infrared excess. A number of attempts have been made at fitting a function describing how the infrared disc fraction evolves over time given a typical disc lifetime <cit.>. The fitting function for the disc infrared fraction often used is f_disc = e^-t/τ, where τ is the typical disc lifetime, and t is the age of the cluster. Disc lifetimes were long thought to be a few Myr, for example, τ = 2.5 Myr <cit.>. However, these lifetimes were derived using samples of young star clusters where external disc photoevaporation is both present and not. External photoevaporation can significantly shorten disc lifetimes. A more recent study of clusters without external photoevaporation found that discs in such environments have typical lifetimes of about 8 Myr <cit.>. The ages of the star forming regions in the observational sample we compare to are taken from <cit.>. We assume that the of a cluster age is the mid-point of the given age range. These ages are then used in Eq. <ref> to calculate the disc fraction of a star forming region. The resulting disc fraction is then used to scale the cumulative distribution functions of dust disc masses. § HALTING DUST DRIFT IN HIGH-MASS DISCS In this appendix we illustrate how the halting of dust transport inwards in the disc, in a fraction of the most massive discs, can affect the cumulative dust disc mass distributions. Stopping, or slowing down, the inwards transport of dust could be caused by pressure bumps in the gas disc, which are discussed further in Sect. <ref>. In order to approximate dust trapping in pressure bumps we halted the pebble drift between the end of the disc formation stage and 2 Myr in 17% of the 30% most massive discs (corresponding to 5% of the total disc population). We show results in Fig. <ref> for a cluster with α_ν = 10^-2 and using the photoevaporation prescription. Halting the dust evolution in these 5% of discs naturally results in a cumulative distribution of the dust disc mass that extends to higher masses, as seen in Fig. <ref>. The thick lines shows the simulation including 5% of discs with halted dust evolution, and the thin lines shows the standard model. This experiment illustrates how halting pebble drift in a fraction of the most massive discs can help explain the presence of very massive dust discs seen in evolved star forming regions, whilst the majority of discs agree well with being drift dominated.
http://arxiv.org/abs/2303.07378v1
20230313180049
Dark-ages reionization and galaxy formation simulation -- XXI. Constraining the evolution of the ionizing escape fraction
[ "Simon J. Mutch", "Bradley Greig", "Yuxiang Qin", "Gregory B. Poole", "J. Stuart B. Wyithe" ]
astro-ph.GA
[ "astro-ph.GA", "astro-ph.CO" ]
firstpage–lastpage Dynamical Abelian anyons with bound states and scattering states [ March 30, 2023 ================================================================ The fraction of ionizing photons that escape their host galaxies to ionize hydrogen in the inter-galactic medium (IGM) is a critical parameter in analyses of the reionization era. In this paper we use the Meraxes semi-analytic galaxy formation model to infer the mean ionizing photon escape fraction and its dependence on galaxy properties through joint modelling of the observed high redshift galaxy population and existing constraints on the reionization history. Using a Bayesian framework, and under the assumption that escape fraction is primarily related to halo mass, we find that the joint constraints of the UV luminosity function, CMB optical depth, and the Lyα forest require an escape fraction of (18±5)% for galaxies within haloes of M≲10^9M_⊙ and (5±2)% for more massive haloes. When considered with respect to galaxy properties, we find that the transition from values of escape fraction from ∼18% to ∼5% occurs at stellar masses of M_⋆∼10^7M_⊙, nearly independent of redshift. As a function of redshift, we find that reionization is dominated by the smaller M_⋆≲10^7M_⊙ galaxies with high escape fractions at z≳6, and by the larger M_⋆≳10^7M_⊙ galaxies with lower escape fractions at z≲6. Galaxies with star formation rates of 10^-2.5M_⊙yr^-1 to 10^-1.5M_⊙yr^-1 provide the dominant source of ionizing photons throughout reionization. Our results are consistent with recent direct measurements of a ∼5% escape fraction from massive galaxies at the end of reionization, and support recent findings using both hydrodynamic simulations and direct observations which indicate that the dominant sources of escaping ionizing photons during reionization are low mass galaxies. cosmology: theory; dark ages; reionization; first stars; diffuse radiation; early Universe; galaxies: high-redshift; intergalactic medium; Astrophysics - Cosmology and Nongalactic Astrophysics; Astrophysics - Astrophysics of Galaxies § INTRODUCTION The Epoch of Reionization, during which the progenitors of modern day galaxies formed and reionized hydrogen throughout the intergalactic medium (IGM), is the least explored cosmic epoch. However, over the past two decades there has been significant progress in exploring the stellar growth history of these galaxies <cit.>, with a recent step-change in understanding that has arisen through the James-Webb Space Telescope <cit.>. At the same time, observations of the evolution of the ionization state of the inter-galactic medium has been narrowed towards a scenario where reionization completes at, or just below, z∼6 <cit.>. This constraint has been achieved through a combination of the integral measure of the reionization history obtained from CMB measurements <cit.>, and measurements of absorption signals against sources emitting Ly-α photons, including Ly-α forest optical depth, dark gaps and quasar Ly-α emission line damping wings <cit.>. Star forming galaxies are thought to provide the dominant source of ionizing photons to reionize the Universe <cit.>. However, we are unable to directly relate the observed star forming galaxy population to the evolution in the ionization state of the IGM due to the unknown fraction of ionizing photons which escape from the ISM of galaxies. Given the evolution of galaxy density with redshift, and the expected dependence of star-formation rate with host-halo mass, we expect that there is likely a dependence of escape fraction on these quantities <cit.>. For example, in a scenario where the dominant photon sources are low-mass haloes, reionization starts at higher redshift <cit.>. However, if galaxies in more massive haloes are the more dominant sources, then reionization will be delayed and conclude more rapidly <cit.>. Moreover, since this escape of radiation is likely through channels of low column density HI and dust, the escape fraction is expected to be direction dependent for individual galaxies and to have a large scatter with galaxy properties <cit.>. Given the importance of the escape fraction to our understanding of reionization, there have been a number of studies to i) measure the escape fraction directly in individual galaxies <cit.>, ii) to directly simulate the ISM of star forming galaxies in a cosmological context <cit.>, and iii) to infer the average escape fraction properties by comparing observed star-formation rates with the reionization history <cit.>. In this paper we follow the third approach, using a semi-analytic model coupled with semi-numerical calculations of reionization, which offers a computationally efficient route to calculating the connection between galaxy formation and reionization <cit.>. We utilize the Meraxes semi-analytic model <cit.> to provide a realistic description of the galaxy population at z∼4-8, which can be extended to both redshifts higher than observed and to luminosities fainter than observed based on physical descriptions of galaxy formation physics. Meraxes couples this galaxy evolution to the evolution of the ionization state of the IGM self-consistently, with an assumed escape fraction. Our approach is to provide a flexible relationship between galaxy properties and the escape fraction, and then to constrain the parameters describing this relationship via a Bayesian framework. Efficient implementation of the Meraxes semi-analytic model makes this parameter space exploration possible, even though the model includes on the fly calculation of reionization and is directly run on a dark-matter halo population close to the hydrogen cooling limit within a large N-body simulation. The paper outline is as follows. In Section <ref> we outline the relevant features of Meraxes. We then describe our implementation of the statistical sampling of the parameter space for Meraxes in Section <ref> before constraining our galaxy formation model parameters in Section <ref>. In Section <ref> we describe the reionization observations we employ before presenting our escape fraction model and the resulting constraints in Section <ref>. We finally provide our discussion and conclusions in Sections <ref> and <ref>, respectively. Throughout this paper, we adopt a standard ΛCDM cosmology with Ω_ m = 0.308, Ω_Λ=0.692 and H_0 = 67.8km/sMpc^-1. § MERAXES The Meraxes semi-analytic model <cit.> is designed to explore galaxy formation across cosmic time, with a particular focus on the Epoch of Reionization and the first galaxies. Some of its key features include a delayed supernova feedback scheme which accounts for the finite lifetime of massive stars and the use of “horizontal” merger trees whereby the entire simulation volume is processed one snapshot at a time (necessary for an efficient treatment of reionization). However, the defining feature of Meraxes is its close coupling to a modified version of the semi-numerical reionization code, 21cmFAST <cit.>. This allows the self-consistent modelling of reionization, both temporally and spatially, in tandem with the growth of the galaxy population. Taking into account both local and external ionizing radiation, we can explore how subsequent star formation is affected and how this feeds back on to the progression of reionization. As with many other semi-analytic models, Meraxes includes treatments for star formation, supernova feedback, metal enrichment, cooling, AGN feedback, and galaxy mergers. In this section we provide a broad overview of the model and any physical prescriptions that are directly relevant for this work. A full description of the model is provided in <cit.> and the subsequent papers referenced below. §.§ Tiamat Semi-analytic galaxy formation models work by post-processing dark matter halo merger trees either extracted from cosmological N-body simulations or created using Extended Press-Schechter (EPS) theory. In order to fully model reionization, where the spatial distribution of galaxies directly influences their evolution, the former is required. In this work, we utilise the Tiamat N-body simulation, run as part of the Dark-ages Reionization And Galaxy Observables from Numerical Simulations programme <cit.>. Tiamat consists of 2160^3 collisionless particles following a Planck 2015 cosmology <cit.> in a comoving volume of (100 Mpc)^3, resulting in a particle mass of 3.89 × 10^6 M_⊙. This allows us to identify the majority of atomic-cooling mass haloes across all redshifts during reionization within a large enough volume to provide a statistically representative realisation of the large scale process. Tiamat has been run down to a redshift of z=1.8 with 101 snapshots output between z=49 and 5, evenly spaced in time with a cadence of ∼ 11 Myr, and a further 64 snapshots at z<5, logarithmically spaced in redshift. This fine snapshot cadence at high redshift allows us to better track the progression of global reionization, which proceeds rapidly during its mid phases. It also allows us to more accurately model the stochastic nature of star formation and its impacts on the reionization process at these high-redshifts <cit.>. For more details on the Tiamat simulation, interested readers are referred to <cit.> and <cit.>. Details on the halo merger tree construction can be found in <cit.>. §.§ Star formation and supernova feedback The star formation and supernova feedback prescriptions implemented in Meraxes closely follow those of <cit.>, with updates presented in <cit.>. At each time step in the simulation, we calculate the amount of gas required to be accreted by each host dark matter halo in order to maintain the required baryon fraction in the presence of the intergalactic ionization field. This gas is assumed to be shock-heated to the virial temperature of the halo before cooling down to the central regions to form a rotationally supported exponential disc. Assuming angular momentum conservation of the gas as it cools, the scale radius of this disc is given by r_ disc = R_ virλ / √(2), where λ is the dimensionless spin parameter of the halo <cit.>. Following <cit.>, we assume that star formation in the disc only occurs once the cold gas density reaches a critical threshold, Σ_ crit, which can be linked to the instantaneous properties of the host dark matter halo. The resulting star formation rate, ṁ_*, is calculated by assuming that some fraction, α_ SF, of the cold gas, m_ cold, above this threshold is then turned into stars per disc dynamical time, t_ dyn: ṁ_* = α_ SF/t_ dyn(m_ cold - 2πΣ_ crit r_ disc^2 ) , Galaxy mergers can also drive shocks and turbulence, resulting in enhanced star formation episodes. We model the fraction of cold gas converted into stars in such events following <cit.>: m_ burst/m_ cold = α_ burst(m_ gal/m_ parent)^γ_ burst , where m_ burst is the mass of newly formed stars, m_ gal and m_ parent are the total baryonic masses of the infalling and parent galaxies respectively, and γ_ burst and α_ burst are free parameters. Following <cit.>, we fix γ_ burst=0.7 and α_ burst=0.57. Energy injection from supernovæ is thought to be the dominant feedback mechanism for controlling the growth of stellar mass (and hence the production rate of ionizing photons) at the high redshifts and low halo masses relevant for reionization <cit.>. We assume that this feedback mechanism is dominated by massive, short-lived (≲ 40 Myr) stars, ending in energetic Type-II supernovæ. The total supernova energy injected into the ISM, Δ E_ total, after a time, t, from past star formation episodes of mass δ m_* is given by: Δ E_ total = ϵ∫_0^t δ m_*/dt' dξ(t') dt' , where dξ is the metallicity dependent energy injection from stars of age t-t' which we calculate directly from the stellar population synthesis code Starburst99 <cit.>, assuming a <cit.> IMF. ϵ is a free parameter which controls the efficiency with which the injected energy couples to the surrounding ISM. The amount of gas assumed to be directly heated by this energy injection is modelled as Δ m_ total = ηδ m_* , where η is a free parameter commonly referred to as the mass loading factor. Following <cit.>, we assume ϵ and η to take the following functional forms: ϵ = ϵ_0 (1+z/4)^α_ eject(V_max/60 km s^-1)^β and η = η_0 (1+z/4)^α_ reheat(V_max/60 km s^-1)^β , where V_ max is the maximum circular velocity of the host halo, β = -3.2 (-1) for V_max < (≥) 60 km s^-1 <cit.> and α_ reheat=2 <cit.>. We also assume α_ eject=0, as suggested by <cit.>. The energy injected into the ISM is used to adiabatically heat the gas in the galaxy to the virial temperature of the host dark matter halo where it joins a hot gas reservoir. The mass of gas added to the hot reservoir, Δ m_ hot, is given by Δ m_ hot = 2Δ E_ total/V_ vir^2Δ m_ total . If there is more energy available than is required to reheat the full Δ m_ total worth of gas to the virial temperature (i.e. Δ m_ hot > Δ m_ total) then the remainder of the energy is used to eject the remaining mass from the system entirely. For more details on the supernova feedback prescription, see <cit.>. §.§ Reionization One of the key features of Meraxes is its treatment of reionization, which is modelled using a modified version of the semi-numerical reionization code 21cmFAST <cit.>. At each time step in the simulation, Cartesian grids of halo mass, stellar mass, star formation rate, and total matter density are constructed. These are then filtered using an excursion set formalism to identify ionized cells where the number of ionizing photons is greater than the number of neutral atoms and recombination events. As discussed in Section <ref>, the key free parameter controlling this process is the escape fraction of ionizing radiation from the source galaxies, f_ esc. When a patch of the IGM is reionized by UV photons, the temperature of the gas is raised to ∼ 2 × 10^4 K. This acts to raise the local Jeans mass, reducing the amount of material accreted by low mass haloes. We model this process using a baryon fraction modifier: Δ m_ baryon = f_ b f_ mod M_ vir - m_ baryon , where Δ m_ baryon is the freshly accreted baryon mass, f_ b=Ω_ b/Ω_ m is the universal baryon fraction, m_ baryon is the mass of baryons already present in the halo, and f_ mod is the baryon fraction modifier. The value of f_ mod is calculated following <cit.> and depends on the mass of the halo, the strength of the local UV ionizing background (which is again strongly dependent on the ionizing escape fraction), and the time over which the halo has been exposed to this background. For further details of the reionization prescription, see <cit.>. §.§ UV luminosities In order to generate UV luminosities for each galaxy at a time t, we construct a full spectral energy distribution (SED) and apply a tophat filter centred on 1600, with a width of 100: L_ UV(t) = ∫_1550^1650 dλ∫_0^t dt ∫_Z_ min^Z_ max dZ ψ(t-τ, Z)S_λ(τ, Z)T_λ(τ) where ψ(t-τ, Z) is the metallicity (Z) dependant star formation rate of a burst of age τ, S_λ(τ, Z) is the wavelength and metallicity dependent luminosity of a simple stellar population of age τ, and T_λ(τ) is the dust transmission function. We calculate S_λ(τ, Z) using the publicly available starburst99 stellar population synthesis model <cit.>, including nebular emission lines and assuming a <cit.> IMF with Z_ min=0.001 and Z_ max=0.04. <cit.> explored a number of physically motivated parametrisations for the dust transmission, T_λ(τ), by constraining Meraxes to match both the evolution of the observed ultraviolet luminosity function (UVLF) and infrared excess (IRX)-β relation at z ≳ 4. For this work, we employ the gas column density dust model whereby the optical depth, Γ_λ, is given by Γ_λ = e^-a z(m_cold/10^10 h^-1M_⊙)^γ_ GCD(r_disc/h^-1kpc)^-2(λ/1600 )^n , where a, γ_ GCD and n are free parameters and r_ disc and m_ cold are as introduced above. The resulting transmission is calculated using the two phase model of <cit.>: T_λ(t) = exp(-(τ_ISM-τ_BC) Γ_λ) t<t_BC exp( -τ_ISMΓ_λ) t ≥ t_BC , where τ_ ISM and τ_ BC are again free parameters. Here, photons emitted by young stars with ages less than t_ BC must travel through both a dense birthcloud and the more extended ISM. After this time, the birthcloud is assumed to have been destroyed and the photons are only attenuated by the ISM. For more detail on both the SED construction and dust model see <cit.>. §.§ Unique features for parameter space exploration One of the key benefits of semi-analytic models over more detailed hydrodynamic simulations is their relatively low computational expense. This opens up the potential for statistical exploration of the underlying free parameter space <cit.>. Meraxes has been designed to maximise this potential by being written to be as efficient as possible without loss of flexibility. Some of the relevant unique features of our model include the pre-loading of input data, the utilisation of graphics processing units (GPUs), and the suite of companion tools which have been developed to programmaticaly interact with the model and its output. In order to provide a converged sampling of the underlying posterior probability distribution we require many tens-of-thousands of model evaluations for moderate dimensionality problems (∼10 free parameters). In this situation, it is imperative that the model being evaluated can be run as quickly and efficiently as possible. For Meraxes (running on our input N-body simulation, Tiamat) at least ∼70% of the time taken for a single model call is devoted to reading in the trees and dark matter density grids from disk, distributing them amongst all available processors, and processing their contents. Therefore, we have modified the SAM to be able to read in all input data once, store this in memory, and then to run multiple times without the need for any expensive input-output (IO) calls. A further computational bottleneck for Meraxes is its treatment of reionization using a modified version of the 21cmFast <cit.> semi-numerical code. This currently requires the model to filter a number of 3D Cartesian grids using an excursion set formalism at every snapshot. Each of these excursion set calculations entails a large number of Fourier transforms and multiple loops over every cell (of which there are 256^3 for this work) in the gridded volume. To reduce the amount of time spent doing this expensive calculation, and thus allow our analysis to be completed in a timely fashion, the reionization portion of Meraxes has been re-written to take advantage of the Graphics Processing Units (GPUs) commonly available on the majority of modern high performance computing systems. This has sped up the reionization calculation by a factor of 8 for typical combinations of grid dimensions and hardware resources. § PARAMETER SPACE SAMPLING In order to carry out a statistical exploration of the Meraxes parameter space, we require a method to calculate the likelihood of the model predictions for a given set of parameters and to then provide the code with a new set of trial parameters for the next run. To facilitate this, as well as future parameter space exploration and calibration studies with Meraxes, we have developed a new companion code called Mhysa which provides a flexible two-way communication layer between the model (written in C) and Python. Mhysa was designed to efficiently facilitate calling Meraxes many times, with different parameter values, and allows us to interface any Python optimisation or sampling package with the model. It also allows us to write all of our likelihood calculations in Python and to leverage its many available scientific and numerical libraries, vastly reducing development time. In practice, Mhysa deals with initialising the model, updating its parameters, directly accessing in-memory galaxies and haloes, calling arbitrary Python code at the end of each snapshot, doing calculations on an independent processor in the background whilst the model is running, and orchestrating multiple instances of the model running concurrently. A further key feature of Mhysa which greatly enhances future science investigations with Meraxes, is that it is not only limited to statistical sampling. Often we wish to simply find the `best” model which matches our chosen observational constraints, without necessarily investigating parameter degeneracies or uncertainties. Mhysa has been written with a flexible interface that can be used to carry out such a global optimisation of the model parameters using any suitable technique, and leveraging the many publicly available packages. For this work, we make use of the publicly available Python package Ultranest <cit.> to carry out our parameter space sampling using the nested sampling <cit.> Monte Carlo algorithm MLFriends <cit.>. The benefit of nested sampling over more traditional Markov Chain Monte Carlo (MCMC) methods for this work is four-fold: Nested sampling does not require us to have an estimate of the global maximum likelihood parameter values in order to avoid a lengthy burn-in phase; it can more efficiently deal with multi modality or complicated degeneracies in probability distributions; it typically requires fewer likelihood evaluations to probe the underlying posterior probability distribution to a satisfactory degree of accuracy; and it naturally provides us with an estimate of the Bayes evidence that can be used to quantitatively compare the support for different escape fraction parametrisations. For each of the parameter space sampling runs presented in this work, we use a minimum of 200 live points. The default Ultranest stopping criteria were employed, with the exception of the maximum fraction of the remaining evidence and minimum effective sample size, which we set to 0.1 and 600, respectively. § THE GALAXY UV LUMINOSITY FUNCTION AND Β-M_ UV RELATION The galaxy UV luminosity function is the most direct observational probe of the reionizing galaxy population at z ≥5. It traces the recent star formation at a fixed number density and hence, the total ionizing photon production rate and its spatial distribution <cit.>. Therefore, if we are to carry out a quantitative investigation of allowed escape fraction models, we must first calibrate our model against the observed UVLF. The free parameters of the model which we allow to vary when fitting the UVLF are listed in Table <ref>. These are identical to the free parameters used by <cit.> and include four galaxy formation parameters controlling star formation and supernova feedback, as well as four parameters which control dust extinction and how it varies with cold gas mass. These parameters have been shown in previous works to be the most important for controlling the growth of early galaxies in our model <cit.> and reproducing the evolution of the UVLF <cit.>. The assumed prior distributions for each parameter are presented in Appendix <ref>. They are selected to weakly encode our past experience and physical intuition, however, we have ensured that our conclusions are insensitive to our precise choices except where explicitly stated in the text. For this work, we utilise the observational luminosity functions from <cit.>. Following <cit.> <cit.> we enforce a minimum uncertainty of 0.08 dex on all data points. Since reionization is known to be largely complete to within x_ HI∼ 0.05 by z ∼ 5 <cit.>, we only consider redshifts greater than this. The volume of our input N-body simulation (100 Mpc)^3 also limits the brightest galaxies for which Meraxes can provide statistically significant predictions, due to the low number density of these biased objects. Therefore, at each redshift, we only consider luminosities below which observations indicate there should be at least 10 galaxies. We calculate the likelihood of a model parameter set, θ, assuming uncorrelated, (log-)Normally distributed, errors: ln( L_ UVLF(θ)) = -1/2∑_i=0^N_d( (log_10(ϕ_i, obs) - log_10(ϕ_i, mod))^2/σ^2_i - ln (2 πσ_i) ) , where ϕ_i, obs and ϕ_i, mod are the observations and model predictions for data point i, respectively, σ^2_i = σ^2_i, obs + σ^2_i, mod is the corresponding variance, and N_d is the total number of data points. For the model variance, we assume a Poisson distribution with a mean equal to the galaxy number counts in each bin. In order to fully constrain all eight free model parameters and break degeneracies in the dust extinction model, <cit.> found it necessary to additionally constrain against the evolution in the UV slope (β) as a function of magnitude (M_ UV). We do similarly here, utilising the biweight mean observations of <cit.> and again assuming uncorrelated, (log-)Normally distributed errors as per Equation <ref>. §.§ Constraints on galaxy formation parameters We now explore the constraining power of the UVLF and β - M_ UV relation on the galaxy formation parameters of our model. In <cit.>, we demonstrated that reionization feedback only plays a minor role in shaping the evolution of the observable z ≳ 5 galaxy population. We therefore ignore our reionization constraints and turn off reionization feedback for this section, simplifying our interpretation and speeding up our calculations. The model UVLFs are presented in Figure <ref>. Shaded bands indicate the 68% and 95% confidence intervals of the model results, sampled from the underlying posterior distribution. The model is able to replicate the observational data reasonably well, across all redshifts, however, the 68% range of the model ϕ at fixed M_ UV is noticeably smaller than that of the constraining observations. This stems from a tension in matching all four redshifts simultaneously, especially around -21 ≲ M_ UV≲ -20, where the observed dϕ/dz varies non-monotonically. In Figure <ref>, we show the corresponding β - M_ UV relation. Here, the uncertainty in the model results is more similar to that of the constraining observations at z=5. We also show in Figure <ref> the corresponding prediction for the star formation rate density (and volume averaged intrinsic ionizing emissivity) evolution together with their 68% and 95% confidence intervals. At redshift 8, the predicted emissivity can vary by ∼25%, decreasing to ∼ 10% by z≲5. The maximum a-posteriori (MAP) parameter values, along with their marginalised posterior modes and highest density intervals (HDIs), are presented in Table <ref>. The corresponding one and two-dimensional posteriors are also shown in Appendix <ref>. With the exception of the critical surface density for star formation (Σ_n) and supernova energy coupling efficiency (ϵ_0), all of the parameters possess a well-defined peak in their posteriors which is independent of the imposed priors. There are a number of degeneracies between the galaxy formation and dust model parameters. For example, a higher critical density for star formation (Σ_n) leaves more cold gas available for efficient star formation in massive systems and hence requires more dust attenuation there (controlled by γ_ GCD) to match the bright end of the UVLF. The similarity of the ϵ_0 posterior distribution to its prior at all but the smallest values indicates that the model's supernova feedback energy coupling has a minimum viable efficiency, beyond which there is little change to the predicted UVLF. This is due to saturation effects. Once ϵ_0 is large enough, all available cold gas (as determined by the mass loading factor, η_0, and available cold gas reservoirs in the galaxy) is ejected and increasing the value of ϵ_0 has no effect. § OBSERVATIONAL CONSTRAINTS ON REIONIZATION Whilst the evolution of the observed UV luminosity function allows us to constrain the ionizing photon budget as a function of time, it does not provide any direct constraint on the fraction of these photons which escape their source galaxy and participate in reionization (f_ esc). For this, we turn to the following three observations. §.§ Thompson scattering optical depth The integrated optical depth due to Thompson scattering of cosmic microwave background photons by free electrons can be expressed as: τ_e = ∫_z=0^∞c dt/ dz(1+z)^3σ_ T ×[Q^ m_ HII<n_ H> + (Q^ m_ HeII + 2Q^ m_ HeIII) <n_ He>] dz , where σ_ T=6.652× 10^-25 cm^2 is the Thomson scattering cross-section, Q^ m_X is the mass-weighted global ionized fraction of species X, and <n_ H> = 1.88× 10^-7 (Ω_ bh^2/0.022) cm^-3 and <n_ He> = 0.148× 10^-7 (Ω_ bh^2/0.022) cm^-3 are the average comoving density of hydrogen and helium, respectively <cit.>. In order to calculate τ_e from our model we follow the assumptions outlined in <cit.>. In particular, we assume that helium and hydrogen are singly ionized at the same rate (i.e. Q^ m_ HeII(z) = Q^ m_ HII(z) and Q^ m_ HeIII(z>4)=0.0) until z=4, after which helium is assumed to be doubly ionized <cit.>. We utilise the <cit.> measurement of τ_e=0.058 ± 0.012 as our single data point. As with the ionizing emissivity constraint above, we use use a standard χ^2 likelihood and assume Normally distributed errors. We further assume that the uncertainty on the model prediction is negligible and that there is no missing or underestimated systematic uncertainties associated with the observational data. §.§ Ionizing emissivity The instantaneous ionizing emissivity (the number of meta-galactic ionizing photons per unit time, per Hydrogen atom[Often commonly expressed as the number of ionizing photons per unit time, per unit volume]) at the latter stages of reionization, can be inferred from Lyman-alpha forest observations <cit.>. Following <cit.>, we calculate this quantity from Meraxes using: Ṅ_γ = ṁ_* N_γ/m_⋆f_ esc/f_ bM_ tot(1-0.75 Y_ He) , where ṁ_* is the total star formation rate in the full simulation volume, N_γ/m_⋆ is the number of ionizing photons per stellar baryon (fixed at 6000 to be consistent with our assumed <cit.> IMF, f_b=Ω_b/Ω_m is the universal baryon fraction, and Y_ He is the Helium mass fraction. In this work, we constrain against the emissivities calculated by <cit.>. These were derived by combining the most recent measurements of the IGM opacity and gas temperature out to z∼6 with a suite of high-resolution hydrodynamic simulations covering a broad range of IGM thermal histories. For more details on both the methodology used to obtain the observed ionizing emissivity values and the treatment of the associated errors, we refer the reader to <cit.>. We utilise a standard χ^2 likelihood assuming Normally distributed and uncorrelated errors (c.f. equation <ref>). We choose to restrict ourselves to z>5 in this work. While observations are available at z<5, and these ionizing emissivity data would place tighter constraints, at these redshifts the contribution from AGN can become non-negligible. §.§ Global neutral fraction The volume averaged global neutral fraction can be probed observationally by a number of indirect methods. These include Lyman-α source counts <cit.>, Lyman-α and Lyman-break galaxy clustering <cit.>, and QSO damping-wing absorption features <cit.>. Due to the small available sample sizes and model-dependent nature of these probes, the associated uncertainties on individual measurements are typically large. However, a direct measure of the volume averaged global neutral fraction, x̅_ HI, can also be obtained from the fraction of pixels with zero flux in high-z quasar spectra <cit.>. The appearance of these `dark' pixels in the Lyman-α and/or β forests indicates the presence of intervening neutral hydrogen, providing an upper limit to the cosmological neutral hydrogen fraction. In this work, we utilise a number of different neutral fraction constraints assembled from the recent literature, including both model dependent and independent sources <cit.>. With the exception of the model independent dark pixel constraints, we restrict ourselves to only utilising observational values with error bars, rather than upper or lower limits. This is largely motivated by the difficulty in sensibly assigning uncertainties to such limits. However, limited investigation has further suggested that the inclusion of these limits, with the most conservative assumption of a step function likelihood, leads to very little additional constraining power on the evolution of our model escape fraction in any case. We use the 1-sigma uncertainties on each data point as presented and, following <cit.>, we model upper and lower limits as a one sided Gaussian with a likelihood of 1 below (/above) the observed value. The model predictions are obtained by calculating the fraction of cells in our reionization grid with a neutral fraction less than 10^-4 at the central redshift of each data point. § RESULTS In this section we use our best fit model (MAP) combined with a flexible halo mass dependent model for escape fraction to constrain the relation between escape fraction and galaxy properties, and to compute their contribution to the ionizing photon budget. §.§ Constraints on escape fraction evolution Recent numerical studies have indicated that there is a likely correlation between halo mass and the escape fraction of ionizing photons <cit.> This is thought to be a result of low mass halos having shallower potential wells, allowing supernova to more efficiently clear high density gas in the IGM and provide channels for ionizing photons to escape the galaxy. In this section, we thus investigate the constraining power of the Thompson scattering optical depth, ionizing emissivity, and neutral fraction evolution on f_ esc as a function of halo mass. We fix all galaxy evolution parameters to their maximum a-posteriori (MAP) values found in Section <ref>, where we constrained the model against the evolution of the UVLF. We note that this removes any extra scatter in the recovered escape fraction introduced by uncertainties in the evolution of ionizing source population, simplifying our interpretation. However the observed star-formation rate density is constrained by the luminosity function to a ∼ 10% level at z∼6 (see Figure <ref>), which is more precise than the observed uncertainties in the ionization rate in the IGM. The 10% uncertainty on the star-formation rate density (which is linearly related to the escape fraction with-respect-to the timing of reionization) is also smaller than the fractional constraints on the escape fraction derived below. We therefore find that the effect of simultaneously allowing our galaxy formation parameters to be free, in addition to the reionization parameters, would be minimal. We choose a logistic functional form for the escape fraction: f_ esc(M_ vir) = f_ min + f_ max - f_ min/1 + exp(-γ_ esclog_10(M_ vir/M_ offset)) where γ_ esc = 4 df dlog_10M_ vir/(f_ max - f_ min) This flexible, four parameter function allows the escape fraction to vary between f_ min and f_ max with a maximum rate of df/(dlog_10M_ vir) midway between the two, at a mass of M_ offset. We use non-flat priors for these parameters, both to encode our physical intuition, and to improve the efficiency of our sampling. More details can be found in Appendix <ref>, however, we have ensured that the precise choice of priors does not influence results except where explicitly discussed below. The results of the model after constraining against the three observations are presented in Figures <ref> and the 1-D marginalised posterior distributions of the escape fraction parameters are presented in Figure <ref>. Coloured lines and shaded regions show the results of fitting the escape fraction to match each observation independently, whilst black lines and shaded regions show the results of constraining against all three observational datasets simultaneously. *Thompson scattering optical depth: The Thompson scattering optical depth is an integrated quantity spanning the full history of the IGM back to the surface of last scattering. As such, it is sensitive to both the timing and effective mid-point of reionization. From panel (a) of Figure <ref> we see that the model is able to reproduce the <cit.> observations (dashed line and hatched region) when using a galaxy growth history consistent with observations. The kernel density estimate (KDE) of the 1-D marginalised constraints on the escape fraction parameters are shown by the red lines in Figure <ref>. From here we can see that the optical depth provides very little constraining power on the escape fraction. It merely demands that the escape fraction value be between ∼ 5 - 35% across the full range of contributing halo masses present in the model (10^8 ≤ M_⊙≲ 10^13). Interestingly, our model disfavours τ_e ≲ 0.52, even when not requiring a simultaneous match to the observed ionizing emissivity and neutral fraction evolution (red shaded regions). This suggests that achieving lower optical depths requires an escape fraction model which has a stronger scaling with redshift than is possible with halo mass alone. *Ionizing emissivity: The total ionizing emissivity (Ṅ) directly constrains the number of ionizing photons entering the IGM and thus, when coupled with a fixed UVLF evolution, places the strongest constraints on the escape fraction. From the top two panels of Figure <ref> we see that ionizing emissivity prefers a mass independent escape fraction (f_ min≈ f_ max≈ 7 %). For escape fractions parametrisations which vary with mass, there is a preference for a large positive slope (df/dlog_10M_ vir) centred around M_ vir∼ 10^9 - 10^10 M_⊙. This corresponds to a rapidly increasing escape fraction with decreasing halo mass in our parametrisation, resulting in a constraint at M_ vir = 10^8 M_⊙ of f_ esc∼ 5 - 25 %. This is driven by the observed flattening in the ionizing emissivity beyond z ≲ 6, requiring both a rapid increase in the emissivity using early-forming, low mass haloes and a reduced contribution from high-mass haloes to keep the emissivity as flat as possible at low redshift (see blue shaded regions in panel (b) of Figure <ref>). *Neutral fraction evolution: The range of allowed neutral fraction evolution models is shown by the green shaded regions in panel (c) of Figure <ref>. The dark pixel fraction upper limits of <cit.> ensure that reionization is all but complete by z∼5.5. Combined with the higher redshift constraints, particularly that of <cit.>, the escape fraction parameters are driven towards producing a late and rapid reionization scenario, requiring a minimum escape fraction of ∼ 12 % across all halo masses (68% confidence). The KDEs of the 1-D marginalised parameter distributions in Figure <ref> again indicate that these observations are consistent with a mass independent escape fraction. However, there is a weak preference for a positive slope (df/dlog_10M_ vir) and an increase in escape fraction with increasing halo mass. This is contrary to our physical intuition and results from the desire to have as rapid evolution in the neutral fraction as possible, whilst maintaining a late start by keeping the contribution from early-forming, low mass haloes as small as allowed. *Combined reionization constraints: The black shaded regions in Figure <ref> and black dashed lines Figure <ref> show the result of calibrating the escape fraction model using all three reionization constraints together. For these combined constraints we also present the 2-D marginalised distributions for escape fraction model parameters in Figure <ref> and the corresponding summary statistics in Table <ref>. From Figure <ref> we can see that the model is able to successfully match all of the observational constraints simultaneously. By including all constraints, we also greatly reduce the allowed range of model results, most notably those of the Thompson scattering optical depth (panel a) and ionizing emissivity (panel b). Figures <ref> and <ref> show that a negative df/dlog_10M_ vir (increasing escape fraction with decreasing halo mass) is strongly favoured. The midpoint of the transition between f_ min and f_ max is also restricted to a much narrower range than was the case when constraining against any one observation alone. In Figure <ref> we show the resulting constraint on the escape fraction as a function of halo mass. At M_ vir≳ 10^10.5 M_⊙ the escape fraction is ∼ 5% This is driven largely by a low escape fraction in high mass halos being needed to keep the ionizing emissivity as flat as possible at z = 5 - 6. The lack of ionizing photons entering the IGM from high mass haloes reduces the ability of the model to achieve a rapid reionization, producing optical depths ≳ 0.062 and a slower neutral fraction evolution (see panels (a) and (c) of Figure <ref>). At lower masses, the escape fraction rises to ∼ 15 - 30 %, required to start reionization early enough to match all three constraints. The dotted line in Figure <ref> shows the maximum aposteriori escape fraction parameterisation (see Table <ref> for the corresponding parameter values). It is tempting to draw conclusions about physical processes colluding to put some particular significance on halo masses of M_ vir≈ 10^9.35 M_⊙, where the sharp transition in f_ esc occurs. However, the marginalised 68% highest density interval for the M_ offset parameter is broad (10^8.38 - 10^9.97 M_⊙; Table <ref>). From Figure <ref>, we can also see that the position of the step is correlated with the maximum and minimum escape fraction parameters. Indeed, this correlation is what drives the appearance of a gradual evolution in 68 and 95% confidence intervals of f_ esc vs. M_ vir in Figure <ref>. Figure <ref> shows the corresponding cumulative fractional contribution of halos to the instantaneous ionizing photon rate from halos below a given mass at different redshifts. As expected the typical halo mass producing ionizing photons increases during reionization. However, as noted above, the best fit f_ esc( M_ vir) model favours an escape fraction that is dominated by low mass galaxies, while reionization also supresses star formation in low mass halos. Together these effects result in a very rapid transition in the halo mass above which 50% of photons are produced from M_ vir≳10^8.5M_⊙ at z∼9 to M_ vir≳10^10.5M_⊙ at z∼5. §.§ Escape fraction evolution with galaxy properties Previous studies of escape fraction evolution, both using simulations and observations, have found mean trends with galaxy properties such as stellar mass and colour <cit.>. In this section, we use the MAP f_ esc(M_ vir) parameter values to investigate the predicted evolution of the escape fraction with stellar mass and star formation rate. The upper panel of Figure <ref> shows the mean escape fraction as a function of galaxy stellar mass resulting from the f_ esc( M_ vir) model (Equation <ref>) with the MAP parameter values listed in Table <ref>. The shaded region indicates the 95% confidence intervals on the mean, generated from 1,000 bootstrap samples. Since stellar mass correlates positively with halo mass in our model <cit.>, the results are qualitatively similar to the dependance on halo mass. The typical escape fraction decreases from its maximum of ∼ 20% at M_⋆≲ 10^6 M_⊙ to ∼ 7% at M_⋆≳ 10^8 M_⊙. This decrease begins at M_⋆∼ 10^6.5 M_⊙ at z ∼ 15 and shifts to smaller masses as reionization progresses due to a mild evolution of the typical stellar mass hosted by M_ offset = 10^9.25M_⊙ haloes, the pivot point of our MAP f_ esc(M_ vir) model. The lower panel of Figure <ref> shows the corresponding cumulative fractional contribution of galaxies below a given stellar mass to the instantaneous ionizing photon rate. Since stellar mass correlates positively with halo mass we see a similar trend as Figure <ref> where the stellar mass above which galaxies dominate the ionizing photon budget increases during reionization. The stellar mass above which 50% of photons are produced is predicted to be close to a constant during the reionization era (M_⋆∼10^6M_⊙ at z≳ 7.5), but then increases rapidly to M_⋆∼10^8.5M_⊙ at z≲6. Figure <ref> shows how the mean escape fraction instead varies by star formation rate for our MAP model. We see a similar evolutionary trend as was found with stellar mass. The escape fraction has a more extended evolution with star formation rate as redshift decreases. The lower panel of Figure <ref> illustrates that galaxies with star-formation rates between Ṁ_⋆∼10^-1.5M_⊙yr^-1 and Ṁ_⋆∼10^-2.5M_⊙yr^-1 contribute the dominant sources of ionizing photons throughout reionization. § DISCUSSION Before concluding we compare our population based findings with other recent theoretical results and observational studies. Simulations typically show values of escape fraction that vary between a few and a few 10s of percent <cit.>, which is in agreement with our results and with prior empirical comparisons of galaxy luminosity functions and Ly-alpha forest constraints <cit.>. Hydrodynamic radiative transfer simulations further indicate that escape fractions decrease with halo mass for halos with M_ vir≲ 10^9 M_⊙ <cit.>. Most recently <cit.> have computed the escape fractions of reionizing galaxies within the Thesan project. They find that low-mass galaxies having M_⋆≲10^7M_⊙ are the main drivers of reionization above z≳7, while higher-mass galaxies with M_⋆≳10^8M_⊙ dominate the escaped ionizing photon budget at lower redshifts. When calculating the dependence on mean escape fraction as a function of halo mass, <cit.> report a value of a few percent in larger halos with a sharp rise towards halo masses below M_ vir∼10^9M_⊙. Inference studies by <cit.> also consider similar observational constraints to those used in this work (the UV luminosity function, CMB optical depth and dark pixels). Although their UV ionizing escape fraction has a simpler, power-law relation with the host halos mass, they also find f_ esc around 5–30pc for low-mass haloes, with no significant preference on the power-law index. All of these results are in qualitative agreement with our findings, especially when the different simulation techniques and mode of analysis are considered. In addition to theoretical results we can compare our results in light of observational estimates of the escape fraction. Using stacked spectra of Lyman break galaxies at z∼3 <cit.> <cit.> find an average value for the escape fraction of 0.06 ± 0.01. Subsequently <cit.> find an anti-correlation between the escape fraction and stellar mass. In Figures <ref> and <ref> we reproduce the measurements of escape fraction from <cit.> for comparison with our model constraints (we stress that these measurements were not included as constraints on our model). The masses of these galaxies are at the upper end of those thought to be responsible for reionization (M_⋆≳10^8M_⊙). However both the value and correlation are qualitatively consistent with our results here, as well as with many of the simulation studies referenced above. Finally, we note that, whilst our N-body simulation, Tiamat, provides a good balance between mass resolution and simulated volume, it does not fully resolve all haloes down to the redshift-dependent atomic cooling mass threshold. However, we miss less than 3pc of stellar mass at z ≈ 6 and less than 35pc at z ≲ 12, therefore we do not expect this to significantly alter our conclusions <cit.>. § CONCLUSIONS We have used the Meraxes semi-analytic model to infer the mean ionizing photon escape fraction and its dependence on galaxy properties through joint modelling of the observed high redshift UV galaxy luminosity function and the available constraints on the reionization history with the Meraxes semi-analytic model. Meraxes couples galaxy formation to a semi-numerical description of reionization, and allows the self-consistent modelling of reionization, both temporally and spatially, in tandem with the growth of the galaxy population. In this paper we present the application of nested sampling to Meraxes, allowing statistical exploration of the underlying free parameter space, including identification of the best fit model as well as statistical confidence intervals. Using a flexible model that relates the escape fraction to halo mass, we use the joint constraints of the UV luminosity function, CMB optical depth, and the Lyα forest to evaluate the allowed range of escape fraction values and halo mass dependence. Our results show that available constraints require an escape fraction of (18±5)% for galaxies within halos of M≲10^9M_⊙ and (5±2)% for larger mass halos. Because Meraxes provides the star-formation rates and stellar masses for each dark matter halo at each simulation snapshot, we can use these results to estimate the dependence of escape fraction on stellar mass and redshift. We find that there is a transition from an escape fraction of ∼18% to a smaller value of ∼5% which occurs at stellar masses of M_⋆∼10^7M_⊙. We find that this transition value is quite insensitive to redshift. Early in reionization it corresponds to star formation rates of Ṁ_⋆∼10^-1M_⊙yr^-1, and decreases towards Ṁ_⋆∼10^-2M_⊙yr^-1 by the end of reionization at z∼5. When considering the contribution of galaxies to the ionizing photon budget as a function of redshift, we find that reionization is dominated by the smaller M_⋆≲10^7M_⊙ galaxies with high escape fractions at z≳6, and by the larger galaxies M_⋆≳10^7M_⊙ with lower escape fractions at z≲6. These stellar masses correspond to galaxies with star formation rates of between Ṁ_⋆∼10^-1.5M_⊙yr^-1 and Ṁ_⋆∼10^-2.5M_⊙yr^-1, which represent the dominant sources throughout reionization. In sum, these results agree with recent direct measurements of a ∼5% escape fraction from massive galaxies at the end of reionization, and support results from hydrodynamic modelling and direct observation indicating that the escape of ionizing photons is dominated by low mass galaxies during reionization. § ACKNOWLEDGEMENTS This research was supported by the Australian Research Council Centre of Excellence for All Sky Astrophysics in 3 Dimensions (ASTRO 3D), through project number CE170100013. Parts of this work were performed on the OzSTAR national facility at Swinburne University of Technology. This work was supported by software support resources awarded under the Astronomy Data and Computing Services (ADACS) Merit Allocation Program. ADACS is funded from the Astronomy National Collaborative Research Infrastructure Strategy (NCRIS) allocation provided by the Australian Government and managed by Astronomy Australia Limited (AAL). This research relies heavily, and with great thanks, on the Python open source community, in particular numpy <cit.>, scipy <cit.>, Cython <cit.>, matplotlib <cit.>, h5py, ultranest <cit.>, seaborn <cit.>, mpi4py <cit.>, jupyter <cit.>, jinja2, click, pandas <cit.>, and xarray <cit.>. § DATA AVAILABILITY The data underlying this article will be shared on reasonable request to the corresponding author. mnras § PRIOR AND POSTERIOR PARAMETER DISTRIBUTIONS In this Appendix we present the 2-D marginalised probability distributions (Figure <ref>) for the fits of the Meraxes model to the galaxy UV luminosity function and β-M_ UV relation discussed in Section <ref>. It is worth noting that <cit.> also used Meraxes with the same free galaxy formation and dust parameters as we do, but recovered different posterior distributions for some parameters (see their figure A3). This can largely be attributed to the different redshift range utilised for their constraints (z=7 - 4). The inclusion of lower redshift data, in particular, provides significant extra constraining power. The remaining differences are due to our different choice of priors which can have an impact on poorly constrained parameters. We also provide detail of the prior probability distributions employed for all free parameters in this work. These encode the range in allowed values (e.g. efficiency parameters must be in the range 0–1). In some cases they also weakly encode physical intuition and the authors experience from past studies. We have ensured that the precise choice of priors makes no significant qualitative or quantitative difference to our findings except where explicitly noted in the text. In appendix Table <ref> we present a tabulated description of the priors, and show these graphically in Figures <ref> and <ref>. Note that we do not use uniform priors as commonly employed in the galaxy formation literature. Our reasoning is that flat priors give extra, undue, weight to parameter values which we know from experience and physical intuition to be unlikely. When using such priors, one also must choose bounds for the parameter values, which in itself often imposes prior knowledge or intuition anyway. The use of weakly informative priors, such as the ones we employ, additionally provides numerous other statistical benefits <cit.>.
http://arxiv.org/abs/2303.06920v1
20230313083759
Pixel-wise Gradient Uncertainty for Convolutional Neural Networks applied to Out-of-Distribution Segmentation
[ "Kira Maag", "Tobias Riedlinger" ]
cs.CV
[ "cs.CV" ]
[ Jonathan Wagner, Reshef Meir March 30, 2023 ================================ * equal contribution In recent years, deep neural networks have defined the state-of-the-art in semantic segmentation where their predictions are constrained to a predefined set of semantic classes. They are to be deployed in applications such as automated driving, although their categorically confined expressive power runs contrary to such open world scenarios. Thus, the detection and segmentation of objects from outside their predefined semantic space, i.e., out-of-distribution (OoD) objects, is of highest interest. Since uncertainty estimation methods like softmax entropy or Bayesian models are sensitive to erroneous predictions, these methods are a natural baseline for OoD detection. Here, we present a method for obtaining uncertainty scores from pixel-wise loss gradients which can be computed efficiently during inference. Our approach is simple to implement for a large class of models, does not require any additional training or auxiliary data and can be readily used on pre-trained segmentation models. Our experiments show the ability of our method to identify wrong pixel classifications and to estimate prediction quality. In particular, we observe superior performance in terms of OoD segmentation to comparable baselines on the SegmentMeIfYouCan benchmark, clearly outperforming methods which are similarly flexible to implement. § INTRODUCTION Semantic segmentation decomposes the pixels of an input image into segments which are assigned to a fixed and predefined set of semantic classes. In recent years, deep neural networks (DNNs) have performed excellently in this task <cit.>, providing comprehensive and precise information about the given scene. However, in safety relevant applications like automated driving where semantic segmentation is used in open world scenarios, DNNs often fail to function properly on unseen objects for which the network has not been trained, see for example the bobby car in <ref> (top). These objects from outside the network's semantic space are called of out-of-distribution (OoD) objects. It is of highest interest that the DNN identifies these objects and abstains from deciding on the semantic class for those pixels covered by the OoD object. Another case are OoD objects which might belong to a known class, however, appearing differently to substantial significance from other objects of the same class seen during training. Consequently, the respective predictions are prone to error. For these objects, as for classical OoD objects, marking them as OoD is preferable to the likely case of misclassification which may happen with high confidence. Furthermore, this additional classification task should not substantially degrade the semantic segmentation performance itself outside the OoD region. The computer vision tasks of identifying and segmenting those objects is captured by the notion of OoD segmentation <cit.>. The recent contributions to the emerging field of OoD segmentation are mostly focused on OoD training, i.e., the incorporation of additional training data (not necessarily from the real world), sometimes obtained by large reconstruction models <cit.>. Another line of research is the use of uncertainty quantification methods such as Bayesian models <cit.> or maximum softmax probability <cit.>. Gradient-based uncertainties are considered for OoD detection in the classification task by <cit.>, <cit.> and <cit.> and up to now, have not been applied to OoD segmentation. <cit.> show that gradient norms perform well in discriminating between in- and out-of-distribution. Moreover, gradient-based features are studied by <cit.> for object detection to estimate the prediction quality. <cit.> investigate loss gradients w.r.t. feature activations in monocular depth estimation and show correlations of gradient magnitude with depth estimation accuracy. In this work, we introduce a new method for uncertainty quantification in semantic segmentation and OoD segmentation based on gradient information. Magnitude features of gradients can be computed at inference time and provide information about the uncertainty propagated in the corresponding forward pass. These features represent pixel-wise uncertainty scores applicable to prediction quality estimation and OoD segmentation. An exemplary gradient uncertainty heatmap can be found in <ref> (bottom). Such uncertainty scores have shown improved performance for the quality estimation task in image classification compared to uncertainties contained in the softmax output of DNNs <cit.>. In addition, instance-wise gradient uncertainty outperforms sampling methods like Monte-Carlo (MC) Dropout <cit.> and Ensembles <cit.> in object detection <cit.>. Calculating gradient uncertainty scores does not require any re-training of the DNN or computationally expensive sampling. Instead, only one backpropagation step for the gradients with respect to the final convolutional network layer is performed per inference to produce gradient scores. Note, that more than one backpropagation step can be performed if deeper gradients need to be computed and other parameters of the model are considered. An overview of our approach is shown in <ref>. An application to dense predictions such as semantic segmentation has escaped previous research. Single backpropagation steps per pixel on high-resolution input images quickly become infeasible given that 10^6 gradients have to be calculated. To overcome this issue, we present a new approach to exactly compute the pixel-wise gradient scores in a batched and parallel manner applicable to a large class of segmentation architectures. We use these gradient scores to estimate the model uncertainty on pixel-level and also the prediction quality on segment-level. Segments are connected components of pixels belonging to the same class predicted by the semantic segmentation network. Finally, the gradient uncertainty heatmaps are investigated for OoD segmentation where high uncertainties indicate possible OoD objects. We only assume a pre-trained semantic segmentation network as our method is applicable to a wide range of architectures. In our tests, we employ a state-of-the-art segmentation network <cit.> trained on Cityscapes <cit.> evaluating in-distribution uncertainty estimation and on four OoD segmentation datasets, namely LostAndFound <cit.>, Fishyscapes <cit.>, RoadAnomaly21 and RoadObstacle21 <cit.>, demonstrating OoD detection performance. The source code of our method is publicly available at <https://github.com/tobiasriedlinger/uncertainty-gradients-seg>. Our contributions are summarized as follows: * We introduce a new method for uncertainty quantification in semantic segmentation. Our gradient-based approach is applicable to a wide range of segmentation architectures. * For the first time, we show an efficient way of computing gradients in semantic segmentation on the pixel-level in a parallel manner making our method less computationally expensive than sampling-based methods. * For the first time, we demonstrate the robustness of gradient-based uncertainty quantification with respect to predictive error detection and OoD segmentation. For the OoD segmentation task, we achieve area under precision-recall curve values of up to 69.3% on the LostAndFound benchmark outperforming a variety of methods that have substantially larger requirements. The paper is structured as follows. We discuss the related work on uncertainty quantification and OoD segmentation in <ref>. In <ref>, we introduce our method of computing pixel-wise gradient uncertainty scores. Numerical results are shown in <ref>, followed by concluding remarks in <ref>. § RELATED WORK §.§ Uncertainty Quantification Bayesian approaches <cit.> are widely used to estimate model uncertainty. The well-known approximation, MC Dropout <cit.>, has proven to be practically efficient in uncertainty estimation and is also applied to semantic segmentation <cit.>. In addition, this method is considered to filter out predictions with low reliability <cit.>. <cit.> benchmarked pixel-wise uncertainty estimation methods based on Bayesian models or the network's softmax output. <cit.> extracted uncertainty information on pixel-level by using the maximum softmax probability and MC Dropout. Prediction quality evaluation approaches are introduced by <cit.> and <cit.> working on single objects per image. These methods are based on additional CNNs acting as post-processing mechanism. <cit.> present the concepts of meta classification (false positive detection) and meta regression (performance estimation) on segment-level using features as input extracted from the segmentation network's softmax output. This line of research has been extended by a temporal component <cit.> and transferred to object detection <cit.> as well as to instance segmentation <cit.>. While MC Dropout as a sampling approach is computationally expensive to create pixel-wise uncertainties, our method computes only the gradients of the last layer during a single inference run and can be applied to a wide range of semantic segmentation networks without architectural changes. Compared with the work by <cit.>, our gradient information can extend the features extracted from the segmentation network's softmax output to enhance the segment-wise quality estimation. §.§ OoD Segmentation Uncertainty quantification methods demonstrate high uncertainty for erroneous predictions, so they can intuitively serve for OoD detection as well. For instance, this can be accomplished via maximum softmax (probability) <cit.>, MC Dropout <cit.> or ensembles <cit.> which capture model uncertainty by averaging predictions over multiple sets of parameters. Another line of research is OoD detection training, relying on the exploitation of additional training data, not necessarily from the real world, but disjoint from the original training data <cit.>. In this regard, an external reconstruction model followed by a discrepancy network are considered by <cit.>, <cit.>, <cit.> and <cit.> and normalizing flows are leveraged by <cit.> and <cit.>. <cit.> as well as <cit.> perform small adversarial perturbations on the input images to improve the separation of in- and out-of-distribution samples. Specialized training approaches for OoD detection are based on different kinds of re-training with additional data and often require generative models. Meanwhile, our method does not require OoD data, re-training or complex auxiliary models. Moreover, we do not run a full backward pass as is required for the computation of adversarial samples. In fact we found that it is often sufficient to only compute the gradients of the last convolutional layer. Our method is more related to classical uncertainty quantification approaches like maximum softmax, MC Dropout and ensembles. Note that the latter two are based on sampling and thus, much more computationally expensive compared to single inference. § METHOD DESCRIPTION In the following, we consider a neural network with parameters θ yielding classification probabilities π̂(x, θ) = (π̂_1, …, π̂_C) over C semantic categories when presented with input x. During training on paired data (x, y) where y ∈{1, …, C} is the semantic label given to x, such a model is commonly trained by minimizing some kind of loss function ℒ between y and the predicted probability distribution π̂(x, θ) using gradient descent on θ. The gradient step ∇_θℒ(π̂(x, θ) y) then indicates the direction and strength of training feedback obtained by (x, y). Asymptotically (in the amount of data and training steps taken), the expectation 𝔼_(X, Y) ∼ P [∇_θℒ(π̂(X, θ) Y)] of the gradient w.r.t. the data generating distribution P will vanish since θ sits at a local minimum of ℒ. We assume, that strong models which achieve high test accuracy can be seen as an approximation of such a parameter configuration θ. Such a model has small gradients on in-distribution data which is close to samples (x, y) in the training data. Samples that differ from training data will receive larger feedback. Like-wise, we assume large training gradients from OoD samples that are far away from the effective support of P. In order to quantify uncertainty about the prediction π̂(x, θ), we replace the label y from above by some auxiliary label for which we make two concrete choices in our method. On the one hand, we replace y by the class prediction one-hot vector y^𝑜ℎ_k = δ_k ĉ with ĉ = arg max_k = 1, …, C π̂_k and the Kronecker symbol δ_ij. This quantity correlates strongly with training labels on in-distribution data. On the other hand, we regard a uniform, all-warm label y^𝑢𝑛𝑖_k = 1/C for k = 1, …, C as a replacement for y. To motivate the latter choice, we consider that classification models are oftentimes trained on the categorical cross entropy loss ℒ(π̂ y) = - ∑_k = 1^C y_k log(π̂_k). Since the gradient of this loss function is linear in the label y, a uniform choice will return the average gradient per class which should be high on OoD data where all possible labels are similarly unlikely. The magnitude of ∇_θℒ(π̂ y) serves as uncertainty / OoD score. In the following, we explain how to compute such scores for pixel-wise classification models. §.§ Efficient Computation in Semantic Segmentation We regard a generic segmentation architecture utilizing a final convolution as the pixel-wise classification mechanism. In the following, we also assume that the segmentation model is trained via the commonly-used pixel-wise cross entropy loss ℒ_ab(ϕ(θ) | y) (cf. eq. (<ref>)) over each pixel (a,b) with feature map activations ϕ(θ). Pixel-wise probabilities are obtained by applying the softmax function to each output pixel, i.e., π̂_ab, k = ^k(ϕ_ab(θ)). With eq. (<ref>), we find for the loss gradient ∇_θℒ_ab((ϕ(θ)) y) = ∑_k = 1^C ^k(ϕ_ab) (1 - y_k) ·∇_θϕ^k_ab(θ). Here, θ is any set of parameters within the neural network. Detailed derivations of this and the following formulas of this section are provided in <ref>. Here, ϕ is the convolution result of a pre-convolution feature map ψ (see <ref>) against a filter bank K which assumes the role of θ. K has parameters (K_e^h)_fg where e and h indicate in- and out-going channels respectively and f and g index the spatial filter position. The features ϕ are linear in both, K and ψ, and depend on bias parameters β in the form ϕ_ab^d = (K ∗ψ)_ab^d + β^d = ∑_j = 1^κ∑_p,q=-s^s (K_j^d)_pqψ^j_a + p, b + q + β^d. We denote by κ the total number of in-going channels and s is the spatial extent to either side of the filter K_j^d which has total size (2s+1) × (2s+1). Explicitly for the last layer gradients we find ∂ϕ_ab^d/∂ (K_e^h)_fg = δ_dhψ_a+f, b+g^e. Together with eq. (<ref>), we obtain an explicit formula for computing the correct backpropagation gradients of the loss on pixel-level for our choices of auxiliary labels which we state in the following paragraph. The computation of the loss gradient can be traced in <ref>. If we take the predicted class ĉ as a one-hot label per pixel as auxiliary labels, i.e., y^𝑜ℎ, we obtain for the last layer gradients ∂ℒ_ab((ϕ) y^𝑜ℎ)/∂ K_e^h = ^h(ϕ_ab) · (1 - δ_h ĉ) ·ψ_ab^e which depends on quantities that are easily accessible during a forward pass through the network. Note, that the filter bank K for (1 × 1)-convolutions does not require spatial indices which is a common situation in segmentation networks. Similarly, we find for the uniform label y^𝑢𝑛𝑖_j = 1 / C ∂ℒ_ab((ϕ) y^𝑢𝑛𝑖)/∂ K_e^h = C - 1/C^h(ϕ_ab) ψ_ab^e. Therefore, pixel-wise gradient norms are simple to implement and particularly efficient to compute for the last layer of the segmentation model. In the <ref>, we cover formulas for the more general case of deeper gradients as well. §.§ Uncertainty Scores We obtain pixel-wise scores (still depending on a and b) by computing the partial norm ∇_ Kℒ_ab_p of this tensor over the indices e and h for some fixed value of p. This can again be done in a memory efficient way by the natural decomposition ∂ℒ / ∂ K_e^h = S^h ·ψ^e. In addition to their use in error detection, these scores can be used in order to detect OoD objects in the input, i.e., instances of categories not present in the training distribution of the segmentation network. We identify OoD regions with pixels that have a gradient score higher than some threshold and find connected components like the one shown in <ref> (bottom). Different values of p are studied in the supplementary material. We also consider values 0 < p < 1 in addition to positive integer values. Note, that such choices do not strictly define the geometry of a vector space norm, however, ·_p may still serve as a notion of magnitude and generates a partial ordering. The tensorized multiplications required in eqs. (<ref>) and (<ref>) are far less computationally expensive than a forward pass through the DNN. This means that computationally, this method is preferable over prediction sampling like MC Dropout or ensembles. We abbreviate our method using the pixel-wise gradient norms obtained from eqs. (<ref>) and (<ref>) by PGN_𝑜ℎ and PGN_𝑢𝑛𝑖, respectively. The particular value of p is denoted by superscript, e.g., PGN_𝑜ℎ^p=0.3 for the (p=0.3)-seminorm of gradients obtained from y^𝑜ℎ. § EXPERIMENTS In this section, we present the experimental setting first and then evaluate the uncertainty estimation quality of our method on pixel and segment level. Last, we apply our gradient-based method to OoD segmentation and show some visual results. §.§ Experimental Setting Datasets We perform our tests on the Cityscapes <cit.> dataset for semantic segmentation in street scenes and on four OoD segmentation datasets, i.e., LostAndFound <cit.>, Fishyscapes <cit.>, RoadAnomaly21 and RoadObstacle21 <cit.>^1^1 Benchmark: (<http://segmentmeifyoucan.com/>). The Cityscapes dataset consists of 2,975 training and 500 validation images of dense urban traffic in 18 and 3 different German towns, respectively. The LostAndFound dataset contains 1,203 validation images with annotations for the road surface and the OoD objects, i.e., small obstacles on German roads in front of the ego-car. In <cit.> this dataset is filtered (LostAndFound test-NoKnown) as children and bicycles are considered as OoD objects, although they are included in the Cityscapes training set. The Fishyscapes LostAndFound dataset is based on the LostAndFound dataset and refines the pixel-wise annotations, i.e., it is distinguished between OoD objects, background (Cityscapes classes) and void (anything else). Moreover frames that do not contain OoD objects as well as sequences with children and bikes are removed resulting in 100 validation images (and 275 non-public test images). The RoadObstacle21 dataset (412 test images) is comparable to the LostAndFound dataset as all obstacles appear on the road. However, the RoadObstacle21 dataset contains more diversity in the OoD objects as well as in the situations (night, snowy conditions and dirty roads) compared to the LostAndFound dataset where all sequences are recorded under good weather conditions. In the RoadAnomaly21 dataset the objects (anomalies) appear anywhere on the image which makes it comparable to the Fishyscapes LostAndFound dataset. While the latter dataset consists of frames extracted from a small number of different scenes, every image of the RoadAnomaly21 dataset (100 test images) shows a unique scene and a wider variety of anomalous objects. Segmentation Networks We consider a state-of-the-art DeepLabv3+ network <cit.> with two different backbones, WideResNet38 <cit.> and SEResNeXt50 <cit.>. The network with each respective backbone is trained on Cityscapes achieving a mean value of 90.58% for the WideResNet38 backbone and 80.76% for the SEResNeXt50 on the Cityscapes validation set. We use one and the same model trained exclusively on the Cityscapes dataset for both tasks, the uncertainty estimation and the OoD segmentation, as our method does not need to be re-trained on OoD data. Therefore, our method leaves the entire segmentation performance of the base model completely intact. §.§ Numerical Results In our experiments, we apply different p-norms, p ∈{ 0.1, 0.3, 0.5, 1, 2 }, to our calculated gradients, see <ref>. As we provide only a selection of results in the following, we refer to <ref> for an ablation study on different values for p and to <ref> for further results where the gradients of deeper layers are computed. Pixel-wise Uncertainty Evaluation In order to assess the correlation of uncertainty and prediction errors on the pixel level, we resort to the commonly used sparsification graphs <cit.>. Sparsification graphs normalized w.r.t. the optimal oracle (sparsification error) can be compared in terms of the so-called area under the sparsification error curve (). The closer the uncertainty estimation is to the oracle in terms of Brier score evaluation, i.e., the smaller the , the better the uncertainty eliminates false predictions by the model. The metric is capable of grading the uncertainty ranking, however, does not address the statistics in terms of given confidence. Therefore, we resort to an evaluation of calibration in terms of expected calibration error (, <cit.>) to assess the statistical reliability of the uncertainty measure. As baseline methods we consider quantities that can be obtained without modifying the segmentation model (like MC Dropout) or retraining (like deep ensembles) and which do not need additional data (like re-calibration confidences). Our choices fall on the uncertainty ranking provided by the maximum softmax probabilities native to the segmentation model as well as the softmax entropy. An evaluation of calibration errors requires normalized scores, so we will normalize our gradient scores according to the highest value obtained on the test data for the computation of . The resulting metrics are compiled in <ref> for both architectures evaluated on the Cityscapes val split. We see that both, the uncertainty ranking and the calibration of are roughly on par with the stronger maximum softmax baseline. Generally, we see the trend that has higher calibration error by one order of magnitude and higher sparsification errors of up to 5.2 percentage points (pp) which may indicate that this kind of score is less indicative of in-distribution errors. Note, that although there is no immediate reason for to be calibrated in any way, we find calibration errors that are competitive on pixel-level with those of the maximum softmax. Segment-wise Prediction Quality Estimation To reduce the number of false positive predictions and to estimate the prediction quality, we use meta classification and meta regression introduced by <cit.>. As input for the post-processing models, the authors use information from the network's softmax output which characterize uncertainty and geometry of a given segment like the segment size. The degree of randomness in semantic segmentation prediction is quantified by pixel-wise quantities, like entropy and probability margin. To obtain segment-wise features from these quantities, they are aggregated over segments via average pooling. These features used in <cit.> serve as a baseline in our tests (called MetaSeg). Similarly, we construct segment-wise features from our pixel-wise gradient p-norms for p ∈{ 0.1, 0.3, 0.5, 1, 2 }. We compute the mean and the variance of these pixel-wise values over a given segment. These features per segment are considered also for the inner and the boundary since the gradient scores may be higher on the boundary of a segment, see <ref> (bottom). The inner of the segment consists of all pixels whose eight neighboring pixels are also elements of the same segment. Furthermore, we define some relative mean and variance features over the inner and boundary which characterizes the degree of fractality. These hand-crafted quantities form a structured dataset where the columns correspond to features and the rows to predicted segments which serve as input to the post-processing models. Details on the construction of these features can be found in <ref>. We determine the prediction accuracy of semantic segmentation networks with respect to the ground truth via the segment-wise intersection over union (, <cit.>). On the one hand, we perform the direct prediction of the (meta regression) which serves as prediction quality estimate. On the other hand, we discriminate between = 0 (false positive) and > 0 (true positive) (meta classification). We use linear classification and regression models. For the evaluation, we use (area under the receiver operating characteristic) for meta classification and the determination coefficient R^2 for meta regression. As baselines, we employ the maximum softmax probability <cit.>, the entropy and the MetaSeg framework. A comparison of these methods and our approach for the Cityscapes dataset is given in <ref>. For the evaluation, we separate the gradient features obtained by one-hot () and by uniform () labels. Also, we consider using all gradient features (PGN) as input to the meta models. With PGN, we outperform the maximum softmax and the entropy baselines as well as the MetaSeg performance with the only exception of meta classification for the SEResNeXt backbone where MetaSeg achieves a marginal 0.41 pp higher value than ours. Moreover, we enhance the MetaSeg performance for both networks and both tasks combining the MetaSeg features with PGN by up to 1.02 pp for meta classification and up to 3.98 pp for meta regression. This indicates that gradient features contain information which is orthogonal to the information contained in the softmax output. In particular, the highest value of 93.31% achieved for the WideResNet backbone, shows the capability of our approach to estimate the prediction quality and filter out false positive predictions on the segment-level. OoD Segmentation Our results in OoD segmentation are based on the evaluation protocol of the SegmentMeIfYouCan benchmark<cit.>. Evaluation on the pixel-level involves the threshold-independent area under precision-recall curve (AuPRC) and the false positive rate at the point of 0.95 true positive rate (FPR_95). The latter constitutes an interpretable choice of operating point for each method where a minimum true positive fraction is dictated. On segment-level, an adjusted version of the mean intersection over union (sIoU) which represents the accuracy of the segmentation obtained by thresholding at a particular point, positive predictive value (PPV or Precision) playing the role of binary instance-wise accuracy and the F_1-score. The latter segment-wise metrics are averaged over thresholds between 0.25 and 0.75 with a step size of 0.05 leading to the quantities sIoU, PPV and F_1. In contrast to the previous evaluations on predictive errors, we do not report here results for both of our models, rather we compare gradient scores as an OoD score as such against other methods on the benchmark and report the best result obtained for both, and . As baselines, we include the same methods as for error detection before since these constitute a reasonable comparison in addition to some of the well-established methods of estimating epistemic uncertainty like MC Dropout and deep ensemble. Note, that the standard entropy baseline is not featured in the official leaderboard, so we report our own results obtained by the softmax entropy with the WideResNet backbone which performed better. We include a full table of methods in <ref> and find that our method is in several cases competitive with some of the stronger methods utilizing adversarial examples, auxiliary data or significant alterations of the model architecture. The results verified by the official benchmark are compiled in <ref> and <ref>. Across the board, PGN shows strong performance, almost exclusively delivering the best or second-best results with few exceptions. The only prominent exception is in the segment-based PPV metric on LostAndFound test-NoKnown where both, and come in behind the maximum softmax and entropy baseline. Meanwhile, the segmentation accuracy in terms of sIoU, as well as the F_1 score which is the harmonic mean of Recall and Precision are far superior to these two baselines. This indicates still better OoD segmentation quality and in particular better Recall achieved by PGN. Gradient scores perform perhaps the least convincingly on the RoadObstacle21 benchmark, where in three cases only the second-best performance is achieved. Overall however, we conclude strong performance of our method in terms of out-of-distribution segmentation across different datasets. We find a slight trend of performing better in the Obstacle track which can be seen to be closer to in-distribution data in semantic segmentation for autonomous driving. This connection would be consistent with our finding in actual in-distribution errors, while performs better on the Anomaly track which is more clearly out-of-distribution for street scene recognition. In several cases, our method even beats some of the stronger OoD segmentation methods utilizing, for example on RoadAnomaly21, adversarial samples (ODIN/Mahalanobis by over 9 pp in AuPRC), OoD data (Void Classifier by over 6 pp AuPRC) or generative models (JSRNet/Embedding Density by over 5 pp AuPRC and Image Resynthesis by over 10 pp in PPV). <ref> shows segmentation predictions of the pre-trained DeepLabv3+ network with the WideResNet38 backbone together with its corresponding ^p=0.5-heatmap. The two panels on the left show an in-distribution prediction on Cityscapes where uncertainty is mainly concentrated around segmentation boundaries which are always subject to high prediction uncertainty. Moreover, we see some false predictions in the far distance around the street crossing which can be found as a region of high gradient norm in the heatmap. In the two panels to the right, we see an OoD prediction from the RoadAnomaly21 dataset of a sloth crossing the street which is classified as part vegetation, terrain and person. The outline of the segmented sloth can be seen brightly in the gradient norm heatmap to the right indicating clear separation. Limitations While our method performs well in terms of segment-wise error detection and raises accuracy compared with previous methods, we declare that our method is merely on-par with other uncertainty quantification methods for pixel-level considerations. Moreover, there have been submissions to the SegmentMeIfYouCan benchmark which significantly outperform our method, however, due to the simplicity and flexibility of our method this comes at no surprise. Note, that there are some light architectural restrictions when it comes to our method in that it is required for the final layer to be a convolution. § CONCLUSION In this work, we presented an efficient method of computing gradient uncertainty scores for a wide class of deep semantic segmentation models. Moreover, we appreciate a low computational cost associated with them. Our experiments show that large gradient norms obtained by our method statistically correspond to erroneous predictions already on the pixel-level and can be normalized such that they yield similarly calibrated confidence measures as the maximum softmax score of the model. On a segment-level our method shows considerable improvement in terms of error detection. Gradient scores can be utilized to segment out-of-distribution objects significantly better than any other softmax- or output-based method on the SegmentMeIfYouCan benchmark and has competitive results with a variety of methods, in several cases clearly outperforming all of them. We hope that our contributions in this work and the insights into the computation of pixel-wise gradient feedback for segmentation models will inspire future work in uncertainty quantification and pixel-wise loss analysis. We thank Hanno Gottschalk and Matthias Rottmann for discussion and useful advice. This work is supported by the Ministry of Culture and Science of the German state of North Rhine-Westphalia as part of the KI-Starter research funding program. The research leading to these results is funded by the German Federal Ministry for Economic Affairs and Climate Action within the project “KI Delta Learning“ (grant no. 19A19013Q). The authors would like to thank the consortium for the successful cooperation. The authors gratefully acknowledge the Gauss Centre for Supercomputing e.V. <www.gauss-centre.eu> for funding this project by providing computing time through the John von Neumann Institute for Computing (NIC) on the GCS Supercomputer JUWELS at Jülich Supercomputing Centre (JSC). § APPENDIX § COMPUTATIONAL DERIVATIONS AND IMPLEMENTATION DETAILS §.§ Computations In this work we assume that the final activation in the segmentation network is given by a softmax activation of categorical features ϕ in the last layer ^j (ϕ) = ϕ^j/∑_i = 1^C ϕ^i where C is the number of classes and ϕ = ϕ(θ) is now dependent on a set of parameters θ. In order to compute the gradients of the categorical cross entropy at pixel (a,b) given any auxiliary label y ℒ_ab(ϕ(θ) y) = - ∑_j = 1^C y_ab, jlog(^j(ϕ_ab(θ))), we require the derivative of the softmax function ∇_θ^j(ϕ(θ)) = ϕ^j∇_θϕ^j/∑_i = 1^C ϕ^i - ϕ^j∑_k = 1^C ϕ^k∇_θϕ^k/( ∑_i = 1^C ϕ^i)^2 = ^j(ϕ) ·∇_θϕ^j ∑_k = 1^C ^k(ϕ) - ^j(ϕ) ∑_k = 1^C ^k(ϕ) ·∇_θϕ^k = ^j(ϕ) ( ∑_k = 1^C ^k(ϕ) ·∇_θϕ^j - ^k ∇_θϕ^k) = ^j(ϕ) ∑_k = 1^C ^k(ϕ) (δ_kj - 1) ∇_θϕ^k. Note, that the auxiliary label y ∈ [0, 1]^C may be anything, e.g., actual ground truth information about pixel (a,b), the predicted probability distribution at that location, the one-hot encoded prediction or a uniform class distribution. In the following, we regard y to be independent of ϕ. The gradient of the cross entropy loss is ∇_θℒ_ab(ϕ(θ) y) = - ∑_j = 1^C y_ab,j1/^j(ϕ_ab)∇_θ^j(ϕ_ab) = ∑_j = 1^C ∑_k = 1^C (y_ab,j^k(ϕ_ab) - y_j ^k(ϕ_ab) δ_kj) ·∇_θϕ^k_ab(θ) = ∑_k = 1^C ^k(ϕ_ab) (1 - y_k) ·∇_θϕ^k_ab(θ) The feature maps are the result of convolution 𝒞_K, β against a filter bank K ∈^κ_in×κ_out× (2 s + 1) × (2 s + 1) and addition of a bias vector β∈^κ_out. Here, κ_in and κ_out denote the number of in- and out-going channels, respectively. K has parameters (K_e^h)_fg where e and h indicate in- and out-going channels respectively and f and g index the spatial filter position. In particular, we obtain the value ϕ_ab^d at pixel location (a, b) in channel d by ϕ_ab^d(K, β, ψ) = [𝒞_K, β(ψ)]_ab^d = (K ∗ψ)_ab^d + β^d = ∑_c = 1^κ_in∑_q=-s^s ∑_r = -s^s (K_c^d)_qrψ^c_a + q, b + r + β^d. Here, we assume the filters of size (2 s + 1) × (2 s + 1) indexed symmetrically around their center and ψ is the feature map pre-convolution. Note, also that the bias is constant across the indices a and b. Taking explicit derivatives of this expression with respect to one of the parameters in K yields ∂ (K∗ϕ)_ab^d/∂ (K_e^h)_fg = ∑_c = 1^κ_in∑_q,r = -s^s ∂ (K_c^d)_qr/∂ (K_e^h)_fg ψ_a+q, b+r^c = ∑_c = 1^κ_in∑_q,r = -s^s δ^dhδ_ceδ_pfδ_qgψ_a+q, b+r^c = δ^dhψ_a+f, b+g^e. When utilizing the predicted one-hot vector (self-learning gradient), i.e., y^𝑜ℎ_k = δ_k ĉ and using the fact that the last-layer convolution is (1 × 1), we obtain ∂/∂ K_e^fℒ_ab = ∑_k = 1^C ^k(ϕ_ab) (1 - δ_k ĉ) ∂ϕ_ab^k/∂ K_e^f = ^f(ϕ_ab) (1 - δ_f ĉ) ψ_ab^e. while the uniform categorical label y_k = 1C yields ∂/∂ K_e^fℒ_ab = ∑_k = 1^C ^k(ϕ_ab) (1 - 1/C) ·∇_θϕ^k_ab(θ) = C - 1/C^f(ϕ_ab) ψ_ab^e. §.§ Computing Deeper Gradients via Explicit Backpropagation While for the last-layer gradients the computation from above simplifies significantly due to the fact that pixel-wise gradients only depend on the feature map values at the same pixel-location. Deeper layers are usually not (1 × 1), so the forward pass couples feature map values over a larger receptive field, e.g., (3 × 3). However, gradients for the second-to-last layer can still be computed with moderate effort by extracting feature map patches via the unfold function. Here, we consider a DeepLabv3+ implementation^2^2<https://github.com/NVIDIA/semantic-segmentation/tree/sdcnet> <cit.> for which the feature maps depend in the following way on the weights of the second-to-last layer T - 1 (where T indicates the last layer): ϕ(K_T - 1) = 𝒞_K_T, β_T∘𝖱𝖾𝖫𝖴∘𝖡𝖭_T ∘𝒞_K_T - 1, β_T - 1(ψ_T - 1), where 𝖡𝖭_T is a batch normalization layer and ψ_T - 1 are the features prior to the convolution 𝒞_K_T - 1, β_T - 1 in question. With fully expanded indices, this amounts to ϕ_ab^d = ∑_k_T K_k_T^d 𝖱𝖾𝖫𝖴( 𝖡𝖭_T ∑_k_T-1∑_q,r((K_T-1)_k_T-1^k_T)_qr (ψ_T-1)_a+q, b+r^k_T-1 + β_T-1^k_T) + β_T^d with k_T, k_T-1 indexing the respective amount of channels and q, r indexing the filter coordinates of K_T-1. Note, that we still assume here that the last convolutional layer has spatial extent 0 into both directions, so K_T ∈^κ_in× C × 1 × 1. The chain rule for this forward pass is then ∂ϕ_ab^d/∂ ((K_T-1)_e^f)_gh = ∑_k_T K_k_T^d 𝖱𝖾𝖫𝖴'(·) ·𝖡𝖭_T' · ·[∑_k_T-1 ∑_q,r∂ ((K_T-1)_k_T-1^k_T)_qr/∂ ((K_T-1)_e^f)_gh (ψ_T-1)_a+q, b+r^k_T-1] = ∑_k_T K_k_T^d 𝖱𝖾𝖫𝖴'(·) ·𝖡𝖭'_T · ·[∑_k_T-1 ∑_q,rδ^k_T fδ_k_T-1eδ_gpδ_hq (ψ_T-1)_a+q, b+r^k_T-1] = K_f^d (𝖱𝖾𝖫𝖴')_ab^f · (𝖡𝖭'_T)_ab^f · ·[(ψ_T-1)_a+g, b+h^e] The term with the derivative of the 𝖱𝖾𝖫𝖴 activation is simply the Heaviside function evaluated at the features pre-activation which have been computed in the forward pass anyway (the discontinuity at zero has vanishing probability of an evaluation). The derivative of the batch normalization layer is multiplication by the linear batch norm parameter which is applied channel-wise. The running indices g and h only apply to the last factor which can be computationally treated by extracting (3 × 3)-patches from ψ_T-1 using the unfold operation. In computing the norm of ∇_K_T-1ϕ_ab^d with respect to the indices e, f, g and h, we note that the expression in eq. (<ref>) is a product of two tensors S_f ·Ψ_gh^e for each pixel (a,b). L^p-norms of such tensors T_ij = S_i Ψ_j factorize which makes their computation feasible: T_p = ( ∑_i, j |T_ij|^p )^1/p = (∑_i, j |S_i|^p |Ψ_j|^p)^1/p = (∑_i[|S_i|^p ∑_j |Ψ_j|^p])^1/p = S_p Ψ_p. § DETAILS ON THE FEATURE CONSTRUCTION FOR SEGMENT-WISE PREDICTION QUALITY ESTIMATION The tasks of meta classification (false positive detection) and meta regression (prediction quality estimation) based on uncertainty measures extracted from the network's softmax output were introduced in <cit.>. The neural network provides for each pixel z given an input image x a probability distribution f_z(y|x) over a label space C = {y_1, …, y_c}, with y ∈ C. The degree of randomness in the semantic segmentation prediction f_z(y|x) is quantified by pixel-wise dispersion measures, like entropy E_z(x) =-1/log(c)∑_y∈𝒞f_z(y|x)log f_z(y|x) and probability margin M_z(x) = 1 - f_z(ŷ_z(x)|x) + max_y∈𝒞∖{ŷ_z(x)} f_z(y|x) where ŷ_z(x)=_y∈𝒞f_z(y|x) is the predicted class for each pixel z. To obtain segment-wise features from these dispersion measures which characterize uncertainty, they are aggregated over segments via average pooling obtaining mean dispersions μ E and μ M. As erroneous or poor predictions oftentimes have fractal segment shapes, it is distinguished between the inner of the segment (consisting of all pixels whose eight neighboring pixels are also elements of this segment) and the boundary. This results in segment size S and mean dispersion features per segment also for the inner (in) and the boundary (bd). Furthermore, relative segment sizes S̃ = S/S_bd and S̃_in = S_in/S_bd as well as relative mean dispersions μD̃ = μ D S̃ and μD̃_in = μ D_inS̃_in where D ∈{E,M} are defined. Moreover, the mean class probabilities P(y) for each class y ∈ C are added resulting in the set of hand-crafted features { S, S_in, S_bd, S̃, S̃_in}∪{ P(y) : y=1,…,c } ∪{μ D, μ D_in, μ D_bd, μD̃, μD̃_in : D ∈{E,M}} . These features serve as a baseline in our tests. The computed gradients in <ref> with applied p-norm, p ∈{ 0.1, 0.3, 0.5, 1, 2 }, are denoted by G_z^p=#(x), #∈{ 0.1, 0.3, 0.5, 1, 2 }, for image x. Similar to the dispersion measures, we compute the mean and additionally the variance of these pixel-wise values of a given segment to obtain μ G^p=# and vG^p=#, respectively. Since the gradient uncertainties may be higher on the boundary of a segment, the mean and variance features per segment are considered also for the inner and the boundary. Furthermore, we define relative mean and variance features to quantify the degree of fractality. This results in the following gradient features {μ G^p=#, μ G_in^p=#, μ G_bd^p=#, μG̃^p=#, μG̃_in^p=#, vG^p=#, vG_in^p=#, vG_bd^p=#, v G̃^p=#, v G̃_in^p=# : #∈{ 0.1, 0.3, 0.5, 1, 2 }} . Note, these features can be computed for the gradient scores obtained from the predictive one-hot () and the uniform label () as well as for gradients of deeper layers (see <ref>). § EXTENDED OOD SEGMENTATION RESULTS In <ref>, we have compared our approach with comparable uncertainty estimation methods such as entropy and maximum softmax. Moreover, we considered two sampling approaches, MC Dropout and ensembles, as baselines. In <ref> and <ref>, we provide the comparison of our method with more methods from the benchmark. In detail, the first block consists of approaches using OoD data, i.e., Void Classifier <cit.>, SynBoost <cit.>, Maximized Entropy <cit.>, PEBAL <cit.> and DenseHybrid <cit.>. The methods of the second block use complex auxiliary/generateive models, namely Image Resynthesis <cit.>, Road Inpainting <cit.>, embedding density <cit.>, NFlowJS <cit.>, JSRNet <cit.> and ObsNet <cit.>. The ODIN <cit.> and Mahalanobis <cit.> baselines (in the third block) perform adversarial attacks on the input images and thus, require a full and expensive backward pass. Per block we indicate the best method for each of the considered metrics. We outperform the two latter baselines (ODIN and Mahalanobis) for the LostAndFound as well as the RoadAnomaly21 dataset. In detail, we obtain AuPRC values up to 22.8 pp higher on segment-level and F_1 values values up to 24.8 pp higher on pixel-level. For the other two datasets we achieve similar results. Furthermore, we beat the Void Classifier method, that uses OoD data during training, in most cases. We improve the AuPRC metric by up to 64.5 pp and the sIoU metric by up to 48.2 pp, both for the LostAndFound dataset. In addition, our gradient norms outperform in most cases the Embedding Density approach which is based on normalizing flows. Summing up, we have shown superior OoD segmentation performance in comparison to the other uncertainty based methods (see <ref>) and we outperform some of the more complex approaches (using OoD data, adversarial samples or generative models). § ABLATION: DIFFERENT P-NORMS In this section, we present an ablation study for different p-norms, p ∈{ 0.1, 0.3, 0.5, 1, 2 }, that are applied to the calculated gradients of the last convolutional layer. Pixel-wise Uncertainty Evaluation The area under the sparsification error curve () is considered to access the correlation of uncertainty and prediction errors on pixel level and the expected calibration error () to assess the statistical reliability of the uncertainty measure. In <ref> the results for the different p-norms in terms of these two metrics are given. We observe improved performance for the gradient scores obtained from the predictive one-hot label with respect to both metrics. These scores are better calibrated for greater values of p, whereas there is no clear trend for the metric. In contrast, for the gradient scores obtained from the uniform label the calibration ability as well as the sparsification error enhance mostly for decreasing values of p. Segment-wise Prediction Quality Estimation For the segment-wise prediction quality estimation, we consider meta classification, i.e., classifying between = 0 (false positive) and > 0 (true positive), and meta regression, i.e., direct prediction of the . The gradient features (see eq. (<ref>)) which are computed for each value of p, also separated for predictive one-hot and uniform labels, serve as input for the meta models. The results are given in <ref> and visualized in <ref>. The WideResNet backbone outperforms the SEResNeXt for meta classification and regression. Moreover, higher and R^2 performances are achieved for greater values of p independent of the architecture or the label (predictive one-hot or uniform) used for gradient scores computation. OoD Segmentation Our approach provides pixel-wise uncertainty scores obtained by computing the partial norm. In <ref> the pixel-wise heatmaps for both backbones, different p-norms and the predictive one-hot as well as the uniform label are shown. We observe that for higher p values the number of uncertain pixels increases, the gradients are more sensitive to unconfident predictions. For a p value of 0.1 only a few pixels of OoD object have high uncertainty while the background is completely certain. For values of p=1 and p=2, in particular using the uniform label, the gradient scores show higher uncertainties in more sectors. To identify out-of-distribution regions, we threshold per pixel on our gradient scores, i.e., high uncertainty corresponds to out-of-distribution. Here, the OoD objects are mostly covered (and not so many background pixels) for p values of 0.3 and 0.5. These observations are reflected in the OoD segmentation results, given in <ref> and <ref>. For the LostAndFound dataset and the Fishyscapes LostAndFound dataset, the best results are achieved for the 0.3 and 0.5 p-norms. For the RoadAnomaly21 dataset, also for higher p values strong (in one case even the best) results are obtained. Across these three datasets, there is no favorability which backbone architecture or label (predictive one-hot or uniform) performs better. In comparison for the RoadObstacle21 dataset, the WideResNet backbone with gradient scores obtained from the predictive one-hot performs best. In summary, there is no clear tendency which p-norm outperforms the others for the different tasks of pixel- and segment-wise uncertainty estimation as well as for OoD segmentation. However, there is a strong trend towards p ∈{0.3, 0.5} performing especially strongly. § ABLATION: DEEPER LAYERS In <ref>, we have shown how to compute the gradients also for deeper layers than the last convolutional one. In this section, we discuss the numerical results for the second-to-last layer in comparison to the last. Pixel-wise Uncertainty Evaluation The results for the pixel-wise uncertainty estimation measured by and are given in <ref> for both layers. For the gradient scores obtained from the predictive one-hot, the evaluation metrics are mainly similar showing only small performance gaps. The results differ for the uniform labels, although there is no trend to which layer achieves the higher ones. Segment-wise Prediction Quality Estimation The segment-wise meta classification and regression results are shown in <ref>. We observe the same behavior for the second-to-last as for the last one, namely that as p increases, performance improves for both metrics. Furthermore, the performance is almost equal for the second-to-last and the last layer for the 1 and the 2 norm independent of the backbone and labels to obtain the gradient scores. OoD Segmentation In <ref> the OoD segmentation results are given. In comparison to the performance of the gradient scores of the last layer (see <ref> and <ref>), the performance of the second-to-last layer is poor, i.e., the results for all evaluation metrics are worse than these of the last layer. In some cases, there is no detection capability at all for the gradient scores obtained from the uniform label. In conclusion, the gradients of the second-to-last layer do not improve the uncertainty estimation (at pixel- and segment-level) nor the OoD segmentation quality, rather they perform worse in some cases. The finding that deeper layer gradients contain less information than the final layer has been observed before outside the semantic segmentation setting by <cit.> and <cit.>.
http://arxiv.org/abs/2303.07019v1
20230313113242
Crossover from Boltzmann to Wigner thermal transport in thermoelectric skutterudites
[ "Enrico Di Lucente", "Michele Simoncelli", "Nicola Marzari" ]
cond-mat.mtrl-sci
[ "cond-mat.mtrl-sci" ]
Theory and Simulation of Materials (THEOS) and National Centre for Computational Design and Discovery of Novel Materials (MARVEL), École Polytechnique Fédérale de Lausanne, Lausanne 1015, Switzerland TCM Group, Cavendish Laboratory, University of Cambridge, 19 JJ Thomson Avenue, Cambridge, CB3 0HE UK Theory and Simulation of Materials (THEOS) and National Centre for Computational Design and Discovery of Novel Materials (MARVEL), École Polytechnique Fédérale de Lausanne, Lausanne 1015, Switzerland Laboratory for Materials Simulations, Paul Scherrer Institut, 5232 Villigen PSI, Switzerland Skutterudites are crystals with a cage-like structure that can be augmented with filler atoms (“rattlers”), usually leading to a reduction in thermal conductivity that can be exploited for thermoelectric applications. Here, we leverage the recently introduced Wigner formulation of thermal transport to elucidate the microscopic physics underlying heat conduction in skutterudites, showing that filler atoms can drive a crossover from the Boltzmann to the Wigner regimes of thermal transport, i.e., from particle-like conduction to wave-like tunnelling. At temperatures where the thermoelectric efficiency of skutterudites is largest, wave-like tunneling can become comparable to particle-like propagation. We define a Boltzmann deviation descriptor able to differentiate the two regimes and relate the competition between the two mechanisms to the materials' chemistry, providing a design strategy to select rattlers and identify optimal compositions for thermoelectric applications. Crossover from Boltzmann to Wigner thermal transport in thermoelectric skutterudites Nicola Marzari March 30, 2023 ==================================================================================== Heat is a waste product of many and diverse energy intensive technologies, from vehicle exhausts in transportation to nuclear and natural gas power plants production, to large-scale manufacturing. Ongoing research is focused on finding strategies to convert such waste heat into electricity, and thermoelectric materials are among the most promising candidates <cit.> for this task, and for augmenting sustainable energy supplies in the near future. The thermoelectric figure of merit reaches a record value of 3.1 at 783 K in polycrystalline SnSe <cit.>, even greater than the value obtained for single crystals <cit.> due to enhanced scattering. While many efforts have focused on designing materials with enhanced thermoelectric performance <cit.>, understanding how to maximise energy-conversion efficiency by decreasing thermal conductivity has been hindered by the lack of a microscopic theory capturing the mechanisms of heat conduction in poor thermal conductors. Fittingly, the recently developed Wigner formulation of thermal transport <cit.> allows to describe heat conduction in anharmonic crystals and in solids with ultralow or glass-like conductivity; this is exactly the case of thermoelectrics. The Wigner formulation offers a comprehensive approach to describe heat transport across different regimes, covering on the same footing harmonic “Boltzmann crystals”, anharmonic “Wigner crystals” and amorphous solids and glasses. A Boltzmann crystal is characterized by phonon interband spacings much larger than the phonon linewidths; in Boltzmann crystals particle-like heat conduction dominates <cit.> and the Peierls-Boltzmann transport equation <cit.> describes accurately thermal conductivity <cit.>. In amorphous solids and glasses wave-like tunneling dominates and the Wigner formulation recovers the Allen-Feldman formulation <cit.> accounting also for anharmonicity <cit.>. Last, Wigner crystals can be considered as the intermediate regime between the first two and are characterized by interband spacings which are comparable to phonon linewidths. The Peierls-Boltzmann equation fails to describe the wave-like contributions <cit.> in materials with ultralow thermal conductivity, that are captured by the Wigner transport equation <cit.>. Among others, skutterudites have been extensively studied for their possible applications in thermoelectrics <cit.>showing both high electrical and low thermal conductivities. The cage-like structure of skutterudites is a critical feature for thermoelectricity <cit.>: the voids present in the structure can be occupied by loosely bound atoms (“fillers” or “rattlers”) that can reduce thermal conductivity and enhance the thermoelectric figure of merit <cit.>. However, the interpretation of filler vibrations remain controversial <cit.>; here, we aim to clarify the fundamental mechanisms behind the reduction of thermal conductivity – and thus the related thermoelectric performance – applying the Wigner transport equation and its resulting lattice thermal conductivity κ^αβ_tot: 0.98!κ^αβ_tot=κ^αβ_P, SMA+1/(2π)^3_BZ∑_s s'ω(q)_s+ω(q)_s'/4[C(q)_s/ω(q)_s+C(q)_s'/ω(q)_s']v^α(q)_s,s'v^β(q)_s',s1/2[Γ(q)_s+Γ(q)_s']/[ω(q)_s'-ω(q)_s]^2+1/4[Γ(q)_s+Γ(q)_s']^2 d^3q, where ω(q)_s is the angular frequency of a phonon having wavevector q and mode s, C(q)_s=ħ^2ω^2(q)_s/k_BT^2N̅(q)_s[N̅(q)_s+1] is the specific heat of that phonon population, N̅(q)_s is the equilibrium Bose-Einstein distribution at temperature T, v^α(q)__s,s' and v^β(q)__s,s' are the cartesian components of the velocity operator, which generalizes the concept of group velocity, and Γ(q)_s=1/τ(q)_s is the phonon linewidth of a phonon with lifetime τ(q)_s. The symbol BZ in Eq. (<ref>) represents an integral over the Brillouin zone. κ^αβ_P, SMA in Eq. (<ref>) is the Peierls-Boltzmann particle-like conductivity, which is driven by phonon-phonon scattering in the single-mode relaxation time approximation (SMA). The additional Wigner term in Eq. (<ref>) is a positive-definite tensor (κ^αβ_C) emerging from the phase “coherences” between pairs of phonon eigenstates; i.e., from the wave-tunneling between two nondegenerate bands (s s') <cit.>. In order to explore the relative strength of the particle-like and wave-like heat-conduction mechanisms, we study three different families of skutterudites, where we compute from first-principles (see Supplementary Information (SI) <cit.> for details) all the quantities needed to evaluate Eq. (<ref>) for unfilled FeSb3, CoSb3 and IrSb3, and for the filled compounds RFe4Sb12 (R = Ba, Ca, Nd, Yb), RCo4Sb12 (R = I, In, La, Yb) and RIr4Sb12 (R = Yb). We note, in passing, that skutterudites contain elements for which DFT+U <cit.> might improve upon self-interaction errors for localized electrons <cit.>; these aspects are discussed in the SI <cit.>. The resulting thermal conductivities, together with their good agreement with the available experimental data, are shown in Fig. <ref> in the temperature range from 100 to 800 K. By focusing on the high-performance high-temperature regime (T≥600K) and comparing κ_P and κ_C, it is clearly seen how unfilled skutterudites behave as Boltzmann crystals, displaying dominant particle-like conduction. Moreover, in the high-temperature region, κ≃κ_P∝ T^-1, as predicted by the Peierls-Boltzmann equation <cit.>. On the other hand, for filled skutterudites, the behaviour is that of a Wigner crystal, with a milder decay of κ_tot as also observed for many highly anharmonic crystals <cit.>. We highlight how Yb-filled materials show a stronger Wigner-crystal behavior, i.e. κ_P∼κ_C, while for BaFe4Sb12 the behaviour is more similar to that of a Boltzmann crystal, i.e. κ_P>κ_C. It is worth noting that some experimental measurements show an increase in conductivity at very high temperatures (≥700 K); this could be understood as driven by radiative and electronic heat transfer <cit.>, unrelated to the increase in coherences' conductivity. At high temperatures, radiative effects on thermal transports are expected to be important because radiative thermal conductivity should increase as T^3 <cit.>, while in semiconductors the electronic contribution can be important when, as temperature rises, electrons are excited to the conduction band <cit.>. In order to elucidate the physics underlying the low thermal conductivity of efficient thermoelectric skutterudites, we make a comparison between phonon lifetimes and average phonon interband spacing Δω_avg=ω_max/3N_at (ω_max being the maximum phonon frequency and N_at the number of atoms in the primitive cell) <cit.>, to describe how much each phonon contributes to the wave-like vs. the particle-like conduction mechanisms. As shown in Ref. <cit.>, the ratio between the two is approximately equivalent to the ratio between the phonon linewidth and the average phonon interband spacing, κ_C^avg(q)_s/κ_P^avg(q)_s≃Γ(q)_s/Δω_avg=1/τ(q)_sΔω_avg. From this one can define the Wigner limit in time τ^ω=1/Δω_avg, that determines the crossover from a regime of dominant particle-like conduction to one of dominant wave-like conduction. In Fig. <ref> we show the distribution τ(q)_s of the phonon lifetimes as a function of the energy ħω(q)_s for the unfilled (upper panels) and Yb-filled (lower panels) skutterudites at 800 K. Phonons above the Wigner limit in time (i.e. with τ(q)_s>τ^ω) contribute mainly to particle-like conductivity, while phonons below this limit (i.e. with τ(q)_s<τ^ω) contribute mainly to the wave-like conductivity. We note that in all the compounds studied <cit.> the phonon lifetimes sit well above the Ioffe-Regel limit in time τ^IR=ω^-1 <cit.> (dashed-purple), confirming that phonons in these materials are well defined quasi particles and that the Wigner formulation is valid <cit.>. If this were not the case, then full spectral function approaches <cit.> would be required. The clouds of phonon lifetimes in Fig. <ref> remain distinctly above the Wigner limit for the unfilled compounds, while they are centered around the Wigner limit for the Yb-filled compounds. This allows to identify the crossover from the Boltzmann-crystal behaviour of unfilled skutterudites to the Wigner-crystal behaviour of Yb-filled ones, where phonon coherences become significant. Moreover, Fig. <ref> also shows the atom-resolved energies and lifetimes (see Eqs. 3 and 4 of SI <cit.>), indicating how, in general, different atoms contribute to different regions of the distribution. We see that Yb fillers drive the characteristic lifetimes towards the Wigner limit in time, while the characteristic energies of the Ir/Co/Fe atoms, and of Sb are only slightly shifted higher. Given a certain phonon lifetime, the frequency associated to the filler is significantly lower than that of the other atom types in the structure, suggesting that indeed Yb behaves like a rattler <cit.>. These findings extend those discussed in Ref. <cit.>, where it was suggested that fillers interact with the host matrix coherently, albeit without resolving the single-atom contributions in the energy-lifetime distribution. In fact, the present analysis shows how filling with Yb lowers all the lifetimes, not only those of the filler itself. Then, we want to describe how each chemical species that composes the skutterudite structure influences the relative strengths of κ_P and κ_C. Since the Boltzmann or Wigner crystal behaviour is regulated by the competition between the phonon lifetimes and the Wigner limit in time <cit.> (see Eq. (<ref>)), we introduce a Boltzmann deviation descriptor (B) defined as the inverse of the product between the skutterudite characteristic lifetime – i.e. the Matthiessen' sum of the average lifetimes resolved on atom types (see SI <cit.> for details) – and the average phonon interband spacing <cit.>: B=1/τ̅Δω_avg= 1/τ^UΔω_avg , with τ^U=τ_Mτ_Sb/τ_M+τ_Sb 1/τ^FΔω_avg , with τ^F=τ_Rτ_Mτ_Sb/τ_Rτ_M+τ_Rτ_Sb+τ_Mτ_Sb, where τ̅ is the average lifetime <cit.>, F and U superscripts symbolize filled and unfilled skutterudites, R the rattler, and M the Ir/Co/Fe metal. In the upper panel of Fig. <ref> we show the correlation between κ_P/κ_C and B at 800 K. Interestingly, we find to a good approximation the power relation: κ_P/κ_C≃ B^-3/4. It can be shown analytically <cit.> that for a constant DOS, κ_P/κ_C=B^-1; so, we can attribute the -3/4 exponent (<1) to the fact that the real DOS is not constant. Finally, we want to understand how skutterudites' chemistry comes into play in discriminating the ability of the filler atom to move inside the cage and how this is related to B. The mean-square displacement (MSD) is often used in the literature to describe vibrating systems characterized by loosely bound atoms with long and elongated bonds <cit.>. From this follows that the ratio between the MSD of the filler atom (MSD_R) and that of the cage atoms (MSD_Sb) can be used to quantify the relative effect of the filler atom's vibrations in the host structure. On the other hand, the ratio between the filler-cage atoms distance and the average bond length of the structure keeps track of the nature of the chemical bond, i.e., the effective distance along which the filler can move. We can then define a heuristic parameter that describes how the relative structural oscillations of the filler atom vary depending on the length of the chemical bonds it affects: η=MSD_R/MSD_Sbd_Sb-R/d_avg, where d_Sb-R is the distance between the filler atom and the atoms of the cage and d_avg is the average bond length of the structure. In the lower panel of Fig. <ref> we show the distribution of B obtained for each of the materials studied. This confirms the trend obtained for κ_P/κ_C in the upper panel of Fig. <ref>, and validates numerically the predictions from Eq. (<ref>). Most importanly, η (used for the color scale) allows to connect the physics behind Wigner heat transport to the chemistry of the skutterudites: the larger the B, the larger η. This underscores how B is proportional to the rattling motion of the filler, quantified by MSD_R, and is therefore able to distinguish between optimal filler atoms for the reduction of κ_tot from those for which the thermal behavior remains similar to that of unfilled skutterudites. E.g., the filled skutterudite BaFe4Sb12 behaves very close to a Boltzmann crystal, since its η is significantly lower than that of the other filled skutterudites. We also observe that a rescaling of the filler's atomic weight translates into negligible changes of κ_tot, thus confirming that thermal transport is determined by bonding chemistry <cit.>. In the end, it is worth noting that only the MSDs (harmonic properties) and the crystal chemical bonds enter the definition of η, and thus already at this level it might be possible to predict the degree of Wigner behavior of a thermoelectric material. Since harmonic properties are much less computationally demanding than anharmonic ones, one could screen for thermoelectric materials with a strong wave-like contribution to conductivity through the descriptor η, at least for cage-like materials showing rattling motion. In conclusion, we have used the Wigner formulation of thermal transport to investigate the microscopic physics underlying heat conduction in skutterudites, showing a crossover from Boltzmann to Wigner thermal transport when filling with, e.g., Yb atoms. Unfilled skutterudites behave as Boltzmann crystals, while filled ones change behavior from Boltzmann to Wigner depending on the filler atom and its bonding properties. We showed that, given the same host structure, the materials displaying the lowest conductivity are precisely those in which the κ_P/κ_C ratio between particle-like and wave-like contributions is larger. We also elucidated how the degree of Wigner heat conduction is correlated to the relative motion between the filler atom and the cage; the latter being dependent on the chemical composition of the skutterudite structure. This study paves the way for the identification of the most suitable chemical compositions to engineer new and efficient cage-like thermoelectric materials. This research was supported by the Swiss National Science Foundation (SNSF), through Grant No. CRSII5_189924 (“Hydronics” project). apsrev4-1 56 fxundefined [1] ifx#1 fnum [1] #1firstoftwo secondoftwo fx [1] #1firstoftwo secondoftwo noop [0]secondoftwo ref[1]@startlink#1@href href[1]#1@endlink anitize@url [0]` 12`$12`&12`#12`1̂2`_12`%12 startlink[1] endlink[0] rl [1]href #1 @bib@innerbibempty [Snyder and Toberer(2008)]snyder2008complex author author G. J. Snyder and author E. S. Toberer, @noop journal journal Nature materials volume 7, pages 105 (year 2008)NoStop [Zhou et al.(2021)Zhou, Lee, Yu, Byun, Luo, Lee, Ge, Lee, Chen, Lee et al.]zhou2021polycrystalline author author C. Zhou, author Y. K. Lee, author Y. Yu, author S. Byun, author Z.-Z. Luo, author H. Lee, author B. Ge, author Y.-L. Lee, author X. Chen, author J. Y. Lee, et al., @noop journal journal Nature materials volume 20, pages 1378 (year 2021)NoStop [Zhao et al.(2014)Zhao, Lo, Zhang, Sun, Tan, Uher, Wolverton, Dravid, and Kanatzidis]zhao2014ultralow author author L.-D. Zhao, author S.-H. Lo, author Y. Zhang, author H. Sun, author G. Tan, author C. Uher, author C. Wolverton, author V. P. Dravid, and author M. G. Kanatzidis, @noop journal journal nature volume 508, pages 373 (year 2014)NoStop [Rowe(2018)]rowe2018crc author author D. M. Rowe, @noop title CRC handbook of thermoelectrics (publisher CRC press, year 2018)NoStop [Slack and Hussain(1991)]slack1991maximum author author G. A. Slack and author M. A. Hussain, @noop journal journal Journal of applied physics volume 70, pages 2694 (year 1991)NoStop [Simoncelli et al.(2019)Simoncelli, Marzari, and Mauri]simoncelli2019unified author author M. Simoncelli, author N. Marzari, and author F. Mauri, @noop journal journal Nature Physics volume 15, pages 809 (year 2019)NoStop [Simoncelli et al.(2022a)Simoncelli, Marzari, and Mauri]simoncelli2021wigner author author M. Simoncelli, author N. Marzari, and author F. Mauri, @noop journal journal Physical Review X volume 12, pages 041011 (year 2022a)NoStop [Simoncelli et al.(2020)Simoncelli, Marzari, and Cepellotti]simoncelli2020generalization author author M. Simoncelli, author N. Marzari, and author A. Cepellotti, @noop journal journal Physical Review X volume 10, pages 011019 (year 2020)NoStop [Peierls(1929)]peierls1929kinetischen author author R. Peierls, @noop journal journal Annalen der Physik volume 395, pages 1055 (year 1929)NoStop [Peierls and Peierls(1955)]peierls1955quantum author author R. Peierls and author R. E. Peierls, @noop title Quantum theory of solids (publisher Oxford University Press, year 1955)NoStop [Garg et al.(2011)Garg, Bonini, Kozinsky, and Marzari]garg2011role author author J. Garg, author N. Bonini, author B. Kozinsky, and author N. Marzari, @noop journal journal Physical review letters volume 106, pages 045901 (year 2011)NoStop [Broido et al.(2007)Broido, Malorny, Birner, Mingo, and Stewart]broido2007intrinsic author author D. A. Broido, author M. Malorny, author G. Birner, author N. Mingo, and author D. Stewart, @noop journal journal Applied Physics Letters volume 91, pages 231922 (year 2007)NoStop [Allen and Feldman(1993)]allen1993thermal author author P. B. Allen and author J. L. Feldman, @noop journal journal Physical Review B volume 48, pages 12581 (year 1993)NoStop [Simoncelli et al.(2022b)Simoncelli, Mauri, and Marzari]simoncelli2022thermal author author M. Simoncelli, author F. Mauri, and author N. Marzari, @noop journal journal arXiv preprint arXiv:2209.11201 (year 2022b)NoStop [Donadio and Galli(2009)]donadio2009atomistic author author D. Donadio and author G. Galli, @noop journal journal Physical review letters volume 102, pages 195901 (year 2009)NoStop [Li and Mingo(2015)]li2015ultralow author author W. Li and author N. Mingo, @noop journal journal Physical Review B volume 91, pages 144304 (year 2015)NoStop [Weathers et al.(2017)Weathers, Carrete, DeGrave, Higgins, Moore, Kim, Mingo, Jin, and Shi]weathers2017glass author author A. Weathers, author J. Carrete, author J. P. DeGrave, author J. M. Higgins, author A. L. Moore, author J. Kim, author N. Mingo, author S. Jin, and author L. Shi, @noop journal journal Physical Review B volume 96, pages 214202 (year 2017)NoStop [Zhu and Ertekin(2019)]zhu2019mixed author author T. Zhu and author E. Ertekin, @noop journal journal Energy & Environmental Science volume 12, pages 216 (year 2019)NoStop [Bauer et al.(2002)Bauer, Paul, Della Mea, Hilscher, Michor, Reissner, Steiner, Grytsiv, Rogl, Scheidt et al.]bauer2002crystal author author E. Bauer, author C. Paul, author M. Della Mea, author G. Hilscher, author H. Michor, author M. Reissner, author W. Steiner, author A. Grytsiv, author P. Rogl, author E. Scheidt, et al., @noop journal journal Physical Review B volume 66, pages 214421 (year 2002)NoStop [Zong et al.(2017)Zong, Hanus, Dylla, Tang, Liao, Zhang, Snyder, and Chen]zong2017skutterudite author author P.-a. Zong, author R. Hanus, author M. Dylla, author Y. Tang, author J. Liao, author Q. Zhang, author G. J. Snyder, and author L. Chen, @noop journal journal Energy & Environmental Science volume 10, pages 183 (year 2017)NoStop [Kanatzidis et al.(2012)Kanatzidis, Hogan, and Mahanti]kanatzidis2003chemistry author author M. G. Kanatzidis, author T. Hogan, and author S. Mahanti, @noop title Chemistry, physics, and materials science of thermoelectric materials: beyond bismuth telluride (publisher Springer Science & Business Media, year 2012)NoStop [Uher(2016)]uher2016materials author author C. Uher, @noop title Materials aspect of thermoelectricity (publisher CRC press, year 2016)NoStop [Tritt(2000)]tritt2000recent author author T. Tritt, @noop title Recent trends in thermoelectric materials research, part two (publisher Academic Press, year 2000)NoStop [Qiu et al.(2011)Qiu, Yang, Liu, Shi, Huang, Snyder, Zhang, and Chen]qiu2011 author author P. Qiu, author J. Yang, author R. Liu, author X. Shi, author X. Huang, author G. Snyder, author W. Zhang, and author L. Chen, @noop journal journal Journal of Applied Physics volume 109, pages 063713 (year 2011)NoStop [Stokes et al.(1998)Stokes, Ehrlich, and Nolas]CoSb3_tc_1 author author K. L. Stokes, author A. Ehrlich, and author G. Nolas, @noop journal journal MRS Online Proceedings Library Archive volume 545 (year 1998)NoStop [Kawaharada et al.(2001)Kawaharada, Kurosaki, Uno, and Yamanaka]CoSb3_tc_2 author author Y. Kawaharada, author K. Kurosaki, author M. Uno, and author S. Yamanaka, @noop journal journal Journal of alloys and compounds volume 315, pages 193 (year 2001)NoStop [Li et al.(2014)Li, Xu, Zhang, Duan, Yan, Yang, and Tian]ICo4Sb12_1 author author X. Li, author B. Xu, author L. Zhang, author F. Duan, author X. Yan, author J. Yang, and author Y. Tian, @noop journal journal Journal of alloys and compounds volume 615, pages 177 (year 2014)NoStop [Zhang et al.(2015)Zhang, Xu, Li, Duan, Yan, and Tian]ICo4Sb12_2 author author L. Zhang, author B. Xu, author X. Li, author F. Duan, author X. Yan, and author Y. Tian, @noop journal journal Materials Letters volume 139, pages 249 (year 2015)NoStop [Mallik et al.(2009)Mallik, Stiewe, Karpinski, Hassdorf, and Müller]mallik2009thermoelectric author author R. C. Mallik, author C. Stiewe, author G. Karpinski, author R. Hassdorf, and author E. Müller, @noop journal journal Journal of electronic materials volume 38, pages 1337 (year 2009)NoStop [Nolas et al.(1998)Nolas, Cohn, and Slack]nolas1998effect author author G. S. Nolas, author J. Cohn, and author G. Slack, @noop journal journal Physical Review B volume 58, pages 164 (year 1998)NoStop [Mohamed Bashir(2017)]mohamed2017thermoelectric author author A. B. Mohamed Bashir, title Thermoelectric properties of LaCo4Sb12 skutterudite materials by addition of Al, In, Ni & Te/Mohamed Bashir Ali Bashir, @noop Ph.D. thesis, school University of Malaya (year 2017)NoStop [Nolas et al.(2000)Nolas, Kaeser, Littleton IV, and Tritt]nolas2000high author author G. Nolas, author M. Kaeser, author R. Littleton IV, and author T. Tritt, @noop journal journal Applied Physics Letters volume 77, pages 1855 (year 2000)NoStop [Wang et al.(2016)Wang, Salvador, Yang, Wei, Duan, and Yang]wang2016high author author S. Wang, author J. R. Salvador, author J. Yang, author P. Wei, author B. Duan, and author J. Yang, @noop journal journal NPG Asia Materials volume 8, pages e285 (year 2016)NoStop [Nolas et al.(1996)Nolas, Slack, Morelli, Tritt, and Ehrlich]IrSb3_1 author author G. Nolas, author G. Slack, author D. Morelli, author T. Tritt, and author A. Ehrlich, @noop journal journal Journal of Applied Physics volume 79, pages 4002 (year 1996)NoStop [Slack and Tsoukala(1994)]slack1994 author author G. A. Slack and author V. G. Tsoukala, @noop journal journal Journal of Applied Physics volume 76, pages 1665 (year 1994)NoStop [Sun and Allen(2010)]sun2010lattice author author T. Sun and author P. B. Allen, @noop journal journal Physical Review B volume 82, pages 224305 (year 2010)NoStop [Keppens et al.(1998)Keppens, Mandrus, Sales, Chakoumakos, Dai, Coldea, Maple, Gajewski, Freeman, and Bennington]keppens1998localized author author V. Keppens, author D. Mandrus, author B. C. Sales, author B. Chakoumakos, author P. Dai, author R. Coldea, author M. Maple, author D. Gajewski, author E. Freeman, and author S. Bennington, @noop journal journal Nature volume 395, pages 876 (year 1998)NoStop [Feldman et al.(2000)Feldman, Singh, Mazin, Mandrus, and Sales]feldman2000lattice author author J. Feldman, author D. Singh, author I. Mazin, author D. Mandrus, and author B. Sales, @noop journal journal Physical Review B volume 61, pages R9209 (year 2000)NoStop [Rossi(2011)]rossi2011theory author author F. Rossi, @noop title Theory of semiconductor quantum devices: microscopic modeling and simulation strategies (publisher Springer Science & Business Media, year 2011)NoStop [Iotti et al.(2005)Iotti, Ciancio, and Rossi]iotti2005quantum author author R. C. Iotti, author E. Ciancio, and author F. Rossi, @noop journal journal Physical Review B volume 72, pages 125347 (year 2005)NoStop [sup()]supplementary @noop journal See Supplementary Information at (link) NoStop [Ioffe and Regel(1960)]ioffe1960non journal author author A. Ioffe and author A. Regel, @noop journal journal Prog. Semicond volume 4, pages 237 (year 1960)NoStop [Anisimov et al.(1991)Anisimov, Zaanen, and Andersen]anisimov1991band author author V. I. Anisimov, author J. Zaanen, and author O. K. Andersen, @noop journal journal Physical Review B volume 44, pages 943 (year 1991)NoStop [Anisimov et al.(1997)Anisimov, Aryasetiawan, and Lichtenstein]anisimov1997first author author V. I. Anisimov, author F. Aryasetiawan, and author A. Lichtenstein, @noop journal journal Journal of Physics: Condensed Matter volume 9, pages 767 (year 1997)NoStop [Dudarev et al.(1998)Dudarev, Botton, Savrasov, Humphreys, and Sutton]dudarev1998electron author author S. Dudarev, author G. Botton, author S. Savrasov, author C. Humphreys, and author A. Sutton, @noop journal journal Physical Review B volume 57, pages 1505 (year 1998)NoStop [Di Lucente and Marzari(2023)]DiLucente_FeSb3 author author E. Di Lucente and author N. Marzari, @noop journal journal Manuscript in Preparation (year 2023)NoStop [Kulik et al.(2006)Kulik, Cococcioni, Scherlis, and Marzari]kulik2006density author author H. J. Kulik, author M. Cococcioni, author D. A. Scherlis, and author N. Marzari, @noop journal journal Physical Review Letters volume 97, pages 103001 (year 2006)NoStop [Shenogin et al.(2009)Shenogin, Bodapati, Keblinski, and McGaughey]shenogin2009predicting author author S. Shenogin, author A. Bodapati, author P. Keblinski, and author A. J. McGaughey, @noop journal journal Journal of Applied Physics volume 105, pages 034906 (year 2009)NoStop [Cahill et al.(1992)Cahill, Watson, and Pohl]cahill1992lower author author D. G. Cahill, author S. K. Watson, and author R. O. Pohl, @noop journal journal Physical Review B volume 46, pages 6131 (year 1992)NoStop [Howell et al.(2020)Howell, Mengüç, Daun, and Siegel]howell2020thermal author author J. R. Howell, author M. P. Mengüç, author K. Daun, and author R. Siegel, @noop title Thermal radiation heat transfer (publisher CRC press, year 2020)NoStop [Ziman(1972)]ziman1972principles author author J. M. Ziman, @noop title Principles of the Theory of Solids (publisher Cambridge university press, year 1972)NoStop [Keppler et al.(2008)Keppler, Dubrovinsky, Narygina, and Kantor]keppler2008optical author author H. Keppler, author L. S. Dubrovinsky, author O. Narygina, and author I. Kantor, @noop journal journal Science volume 322, pages 1529 (year 2008)NoStop [Dangić et al.(2021)Dangić, Hellman, Fahy, and Savić]dangic2021origin author author Đ. Dangić, author O. Hellman, author S. Fahy, and author I. Savić, @noop journal journal npj Computational Materials volume 7, pages 1 (year 2021)NoStop [Caldarelli et al.(2022)Caldarelli, Simoncelli, Marzari, Mauri, and Benfatto]caldarelli2022many author author G. Caldarelli, author M. Simoncelli, author N. Marzari, author F. Mauri, and author L. Benfatto, @noop journal journal arXiv preprint arXiv:2202.02246 (year 2022)NoStop [Feng et al.(2020)Feng, Fu, Zhang, and Singh]feng2020characterization author author Z. Feng, author Y. Fu, author Y. Zhang, and author D. J. Singh, @noop journal journal Physical Review B volume 101, pages 064301 (year 2020)NoStop [Sales et al.(2000)Sales, Chakoumakos, and Mandrus]sales2000thermoelectric author author B. Sales, author B. Chakoumakos, and author D. Mandrus, @noop journal journal Physical Review B volume 61, pages 2475 (year 2000)NoStop
http://arxiv.org/abs/2303.06630v1
20230312104956
Can gravitational vacuum condensate stars be a dark energy source?
[ "P. P. Avelino" ]
gr-qc
[ "gr-qc", "astro-ph.CO", "astro-ph.GA" ]
12 12
http://arxiv.org/abs/2303.07338v1
20230313175902
Revisiting Class-Incremental Learning with Pre-Trained Models: Generalizability and Adaptivity are All You Need
[ "Da-Wei Zhou", "Han-Jia Ye", "De-Chuan Zhan", "Ziwei Liu" ]
cs.LG
[ "cs.LG", "cs.CV" ]
Revisiting Class-Incremental Learning with Pre-Trained Models: Generalizability and Adaptivity are All You Need Da-Wei Zhou^1, Han-Jia Ye^1[2], De-Chuan Zhan^1, Ziwei Liu^2[2] ^1 State Key Laboratory for Novel Software Technology, Nanjing University ^2 S-Lab, Nanyang Technological University {zhoudw, yehj, zhandc}@lamda.nju.edu.cn, ziwei.liu@ntu.edu.sg March 30, 2023 =============================================================================================================================================================================================================================================================== empty [1]Work done when Da-Wei Zhou was a visiting scholar at NTU [2]Correspondence to: Han-Jia Ye and Ziwei Liu Class-incremental learning (CIL) aims to adapt to emerging new classes without forgetting old ones. Traditional CIL models are trained from scratch to continually acquire knowledge as data evolves. Recently, pre-training has achieved substantial progress, making vast pre-trained models (PTMs) accessible for CIL. Contrary to traditional methods, PTMs possess generalizable embeddings, which can be easily transferred for CIL. In this work, we revisit CIL with PTMs and argue that the core factors in CIL are adaptivity for model updating and generalizability for knowledge transferring. 1) We first reveal that frozen PTM can already provide generalizable embeddings for CIL. Surprisingly, a simple baseline (SimpleCIL) which continually sets the classifiers of PTM to prototype features can beat state-of-the-art even without training on the downstream task. 2) Due to the distribution gap between pre-trained and downstream datasets, PTM can be further cultivated with adaptivity via model adaptation. We propose ADapt And Merge (), which aggregates the embeddings of PTM and adapted models for classifier construction. is a general framework that can be orthogonally combined with any parameter-efficient tuning method, which holds the advantages of PTM's generalizability and adapted model's adaptivity. 3) Additionally, we find previous benchmarks are unsuitable in the era of PTM due to data overlapping and propose four new benchmarks for assessment, namely ImageNet-A, ObjectNet, OmniBenchmark, and VTAB. Extensive experiments validate the effectiveness of with a unified and concise framework. Code is available at: <https://github.com/zhoudw-zdw/RevisitingCIL> § INTRODUCTION With the advancement of deep learning, deep models have achieved impressive feats in many fields <cit.>. However, most research focuses on recognizing a limited number of classes in static environments. In the real world, applications often deal with streaming data with incoming new classes <cit.>. To address this issue, Class-Incremental Learning (CIL) has been proposed, which allows the model to learn from the evolving data and continuously build a unified classification model. Nevertheless, when new classes are added sequentially, the notorious catastrophic forgetting occurs<cit.>, which erases the previously learned knowledge. Many prior works <cit.> are designed to continually build a holistic embedding without forgetting. While typical methods assume that the model is “trained from scratch,” recent advancements in pre-training <cit.> have made Pre-Trained Models (PTMs) more accessible for designing models in downstream tasks. These PTMs are often trained on massive corpus <cit.> or countless images <cit.> with handcrafted tricks <cit.>, resulting in strong generalizability. Consequently, several methods <cit.> propose to leverage PTM for better incremental learning. Powerful PTMs alleviate the burden of the learning process, substantially surpassing the performance upper bound of non-PTM-based methods <cit.>. However, upon revisiting the objective of CIL, we find essential differences between these protocols. Without PTMs, CIL models are trained to continually acquire the knowledge of new classes and build a unified embedding space, which requires the adaptivity for sequential updating. In contrast, PTMs are trained with massive datasets, which makes it easier to achieve an ideal knowledge and embedding space with strong generalizability. To use a human learning analogy, non-PTM methods aim to teach an infant to grow up and continually acquire knowledge through college, while PTM-based methods rely on a professor to do the same thing, which is as easy as pie. To evaluate the generalizability of PTM, we formulate a CIL task using VTAB <cit.> dataset and test the performance of state-of-the-art PTM-based methods <cit.> with pre-trained ViT-B/16-IN1K in Figure <ref>. As a comparison, we present a simple baseline SimpleCIL to evaluate the quality of the pre-trained feature. With the pre-trained embedding function frozen, SimpleCIL sets the classifier weights to the average embeddings <cit.> of each new class for classification. If PTMs already possess generalizable features, directly matching the average pattern to each query instance could also achieve competitive results. To our surprise, we find that SimpleCIL outperforms the current SOTA by 5% even without any tuning on these downstream tasks, verifying its strong generalizability in knowledge transfer. Although PTMs are generalizable for CIL, a domain gap may still exist between pre-trained and incremental datasets <cit.>. For instance, the ImageNet pre-trained model may not generalize well to out-of-distribution <cit.> or specialized tasks <cit.>. Under such circumstances, freezing the embedding for knowledge transferring is not a “panacea.” Accordingly, adaptivity becomes essential to enable the model to grasp task-specific features. Nevertheless, sequentially tuning the PTM will harm the structural information and weaken the generalizability <cit.>, leading to the irreversible forgetting of previously learned knowledge. Is there a way to unify the generalizability of PTM with the adaptivity of the adapted model? In this paper, we present ADapt And Merge (), which employs PTM to enhance generalizability and adaptivity in a unified framework. To improve adaptivity, we adapt the PTM in the first incremental stage via parameter-efficient tuning. Adapting the model helps to obtain task-specific features and fills the domain gap between PTM and incremental data. We then concatenate the adapted model with the PTM to extract average embeddings as the classifier, thereby maintaining generalizability. restricts model tuning in the first stage, striking a balance between adaptivity and generalizability. Moreover, typical CIL benchmarks, such as ImageNet100/1000, are unsuitable for evaluation due to overlapping between pre-trained and downstream tasks. Therefore, we benchmark PTM-based CIL with four new datasets that have large domain gaps with the pre-trained data. Extensive experiments under various settings demonstrate the effectiveness of . § RELATED WORK Class-Incremental Learning (CIL): enables a learning system to continually incorporate new concepts without forgetting old ones <cit.>. Typical CIL methods can be roughly divided into four categories. The first group saves and replays exemplars from old classes to recover former knowledge <cit.>. The second group utilizes knowledge distillation <cit.> to align the outputs of old and new models, thereby maintaining knowledge of old concepts <cit.>. The third group rectifies the inductive bias in the incremental model through normalization and logit/feature adjustment <cit.>. Lastly, other works expand the network when needed to enhance representation ability. The network expansion techniques are further divided into neuron-wise <cit.>, backbone-wise <cit.>, and token-wise <cit.>. CIL with PTM: is becoming a popular topic with the increasing prevalence of PTMs <cit.>. The aim is to sequentially adjust the PTM to stream data with new classes. L2P <cit.> applies visual prompt tuning <cit.> to CIL based on the pre-trained Vision Transformer <cit.> and learns a prompt pool to select the instance-specific prompt. DualPrompt <cit.> extends L2P with two kinds of prompts, , general and expert prompts. Different from the key-value search in L2P, CODA-Prompt <cit.> improves the prompt selection process with an attention mechanism. <cit.> explores the anchor-based energy self-normalization strategy to aggregate multiple pre-trained classifiers. When changing ViT into CLIP <cit.>, <cit.> extend L2P by learning prompts for both text and image modalities <cit.>. Parameter-Efficient Tuning for PTM: aims to adapt the PTM to downstream tasks by tuning only a small number of (extra) parameters. Compared to fully finetuning, parameter-efficient tuning obtains competitive or even better performance at a much lower cost. VPT <cit.> prepends tunable prefix tokens <cit.> to the input or hidden layers. LoRA <cit.> learns low-rank matrices to approximate parameter updates. <cit.> learn extra adapter <cit.> modules with downsize and upsize projection. <cit.> merges the learned adapters with a fusion module. SSF <cit.> addresses the scaling and shifting operation for model tuning. Apart from additional modules in the network, <cit.> proposes learning tunable parameters in the input space. Finally, <cit.> formulates these works in a unified framework, and NOAH <cit.> searches for the optimal design of prompt modules for downstream tasks. § FROM OLD CLASSES TO NEW CLASSES This section first introduces the setting of class-incremental learning and then discusses naive baselines to utilize the pre-trained model for CIL. §.§ Class-Incremental Learning Class-incremental learning aims to learn from an evolving data stream with new classes to build a unified classifier <cit.>. There is a sequence of B training tasks {^1, ^2, ⋯, ^B}, where ^b={(_i^b, y_i^b)}_i=1^n_b is the b-th incremental step with n_b instances. Here, the training instance _i^b ∈^D belongs to class y_i ∈ Y_b, where Y_b is the label space of task b. Y_b ∩ Y_b^' = ∅ for b≠ b^'. During the b-th training stage, we can only access data from ^b for model updating. This paper focuses on the exemplar-free CIL setting <cit.>, where no historical data can be fetched for rehearsal. The goal of CIL is to incrementally build a unified model for all seen classes, , acquiring knowledge from new classes and meanwhile preserving knowledge from former ones. The model's capability is evaluated over all seen classes 𝒴_b=Y_1 ∪⋯ Y_b after each incremental task. Formally, the target is to fit a model f(): X→𝒴_b that minimizes the empirical risk across all testing datasets: ∑_(𝐱_j, y_j) ∈𝒟_t^1∪⋯𝒟_t^bℓ(f (_j), y_j) , where ℓ(·,·) measures the discrepancy between prediction and ground-truth label. 𝒟_t^b denotes the testing set of task b. A good CIL model satisfying Eq. <ref> has discriminability among all classes, which strikes a balance between learning new classes and remembering old ones. Following <cit.>, we assume the availability of a pre-trained model (, a ViT <cit.> or ResNet <cit.>) on ImageNet <cit.>, which we use as the initialization of f(). For clarity, we decouple the deep model into two parts: f()=W^⊤ϕ(), where ϕ(·):ℝ^D→ℝ^d is the embedding function and W∈ℝ^d× |𝒴_b| is the classification head. We denote the classifier for class k as _k: W=[_1,⋯,_|𝒴_b|]. We refer to the features after pooling as ϕ() for convolutional networks. In a plain ViT, the input encoding layer transforms the image into a sequence-like output features _e∈^L× d, where L is the sequence length. We assume the first token in _e as the token to simplify notation. _e is then fed into the subsequent layers (, multi-head self-attention and MLP) to produce the final embeddings. We treat the embedded token as ϕ() for ViT. §.§ Adaptivity and Generalizability in CIL CIL with Adaptivity: Before introducing PTMs into CIL, models are trained from scratch to gradually acquire knowledge of new classes. The naive idea is to update the incremental model with cross-entropy loss, which equips the model with adaptivity to adapt to new tasks: ℒ= ∑_(𝐱_i, y_i) ∈𝒟^bℓ(f (_i) , y_i)+ ℒ_reg , where ℒ_reg stands for the regularization terms to resist forgetting, , knowledge distillation <cit.>. CIL with Generalizability: PTMs are born with generalizability, which can be transferred to downstream tasks. Specifically, we define a simple baseline, SimpleCIL, to transfer PTM for incremental tasks. With the embedding function ϕ(·) frozen throughout the learning process, we extract average embedding (, prototype <cit.>) of each class: _i=1/K∑_j=1^|𝒟^b|𝕀(y_j=i)ϕ(_j) , where K=∑_j=1^|𝒟^b|𝕀(y_j=i), 𝕀(·) is the indicator function. The averaged embedding represents the most common pattern of the corresponding class. We set the prototype as the classifier, , _i=_i, to directly adjust the PTM for CIL. SimpleCIL demonstrates competitive performance in Figure <ref>, confirming the strong generalizability of PTM. Generalizability vs. Adaptivity: Eq. <ref> and Eq. <ref> address different aspects of CIL models. The former aims to enhance the adaptivity by enabling the model to be gradually tuned. By contrast, the latter highlights the model's generalizability by freezing it throughout the learning process. To understand their roles in CIL, we conduct an experiment on CIFAR100 with 20 incremental tasks, and compare the performance of finetuning versus SimpleCIL. These methods are based on pre-trained ViT-B/16-IN21K, and we separately report the performance of new (Y_b) and old (𝒴_b-1) classes in Figure <ref>. Specifically, SimpleCIL relies on the generalizability of PTM, which works competitively even without training on the target dataset. However, it can be further improved to grasp the task-specific features, and finetuning shows better performance in new classes with the help of adaptivity. However, finetuning suffers catastrophic forgetting of old classes since features are continually changing. To summarize, these characteristics are two core aspects of CIL — adaptivity enables the model to bridge the domain gap, while generalizability encourages knowledge transfer. Therefore, both of them should be cultivated to facilitate CIL. § ADAM: ADAPT AND MERGE PTMS FOR CIL Motivated by the potential for enhancing both generalizability and adaptivity, can we achieve these characteristics in a unified framework? Specifically, we aim to achieve this goal from two aspects. On the one hand, to bridge the domain gap between the PTM and downstream datasets, model adaptation is essential to move the PTM towards incremental data. On the other hand, since the adapted model may lose the generalizability of high-level features, we attempt to merge the adapted model and PTM into a unified network for future tasks. The merged embedding function is kept frozen throughout the incremental learning process, transferring the generalizable embedding of model sets to incoming new classes. In this way, generalizability and adaptivity are achieved in the unified framework. We first introduce the general framework of and then discuss the specific techniques for model adaptation. §.§ Training Procedure of Although PTMs have discriminating features, there may exist a significant domain gap between the pre-trained dataset and incremental data. For example, the PTM is optimized to capture the characteristics of classes in ImageNet, while the incremental data stream may correspond to specialized data that requires domain knowledge or has extensive concept drift from ImageNet. To bridge this gap, an adapting process can be developed with the incremental data: f^*()=ℱ(f(),,Θ) , where the adapting algorithm ℱ takes the current model f() and the dataset as input. It optimizes the parameter set Θ and produces the adapted model f^*() that gains the domain-specific knowledge in the corresponding dataset. We introduce the variations of ℱ in Section <ref>. If we could obtain all the incremental training sets at once, adapting the model via ℱ(f(),^1∪^2⋯∪^B,Θ) can transfer the knowledge from PTM to the incremental dataset and grasp the task-specific features for better performance. However, since data in CIL arrive sequentially, we cannot hold the training sets at once. Continuously adapting the model would consequently result in catastrophic forgetting (as shown in Figure <ref>). Hence, a naive solution is to adapt the model only in the first incremental stage: f^*()=ℱ(f(),^1,Θ) . Since ^1 is a subset of the incremental data stream, it also possesses domain-specific knowledge that could facilitate model adaptation. The tuning process enhances the adaptivity of the CIL model, and the next question is to ensure generalizability. Since Eq. <ref> forces the original generalizable feature to become more specialized to the downstream task, high-level features irrelevant to ^1 shall be overwritten and forgotten. Therefore, a better solution is to concatenate the features extracted by the PTM and the adapted model, , [ϕ^*(),ϕ()], where ϕ^*() and ϕ() stand for the adapted and pre-trained embedding functions, respectively. To maintain generalizability, we freeze the concatenated embedding functions [ϕ^*(·),ϕ(·)] after adaptation and extract prototypes for the following classes: _i=1/K∑_j=1^|𝒟^b|𝕀(y_j=i)[ϕ^*(_j),ϕ(_j)] , where K=∑_j=1^|𝒟^b|𝕀(y_j=i). In comparison to Eq. <ref>, Eq. <ref> contains additional information from the adapted model, which incorporates domain-specific features for better recognition. These prototypes reveal the most common patterns from the adapted and pre-trained models, ensuring both generalizability and adaptivity. We directly adopt the class prototype as the classifier weight, , _i=_i, and utilize a cosine classifier for classification: f(𝐱)=(W/W_2)^⊤([ϕ^*(),ϕ()]/[ϕ^*(),ϕ()]_2). Based on the similarity between instance embedding and class prototype, it assigns a higher probability to the class with a more similar prototype. Effect of Adapt and Merge: We give the visualizations of in Figure <ref> (left). Although ^1 is a subset of the entire training set, adapting with it still helps transfer the PTM from the upstream dataset to the downstream task. The adapting process can be viewed as a further pre-training procedure, which adapts the PTM to the incremental dataset and bridges the domain gap. By merging the embedding functions of the PTM and the adapted model, the extracted features are more representative than any one of them alone. Additionally, since the model is only trainable in the first incremental task, the efficiency of is comparable to SimpleCIL, which does not require sequential tuning. On the other hand, since the model is frozen in the subsequent tasks, it does not suffer catastrophic forgetting of former concepts. We give the pseudo-code of in Algorithm <ref>. In the extreme case where the adaptation process in Line <ref> does nothing to the PTM, will degrade to SimpleCIL, which guarantees the performance lower bound. §.§ Adapting the PTM To bridge the distribution gap between the pre-trained and incremental datasets, 's performance depends on the effective adapting algorithm ℱ. In this section, we discuss six specializations of ℱ in that can handle different types of PTMs, such as ViTs and CNNs. Fully Finetune: is a naive idea when transferring the model to downstream tasks. It involves tuning all parameters in the adapting process, , Θ=θ_ϕ∪θ_W, and minimizing the discrepancy between model's output and the ground truth: min_θ_ϕ∪θ_W∑_(𝐱_j, y_j) ∈𝒟^1ℓ(f (_j), y_j) . However, the tuning cost could be relatively high for large-scale PTMs, , ViTs. Therefore, some parameter-efficient tuning techniques can alleviate the tuning cost. Visual Prompt Tuning (VPT) <cit.>: is a lightweight tuning technique for adapting ViTs, which only prepends some learnable prompts 𝐏∈^p× d to form the extended features [𝐏,_e], where _e is the encoded features of the input image. The extended features are then fed into the subsequent layers of ViT to calculate the final embeddings. There are two variations of VPT: VPT-Deep, which prepends the prompts at every attention layer, and VPT-Shallow, which only prepends the prompts at the first layer. During optimization, it freezes the pre-trained weights in the embedding function and optimizes these prompts and classification head, , Θ=θ_𝐏∪θ_W. Scale & Shift (SSF) <cit.>: aims to adjust the feature activation by scaling and shifting. It appends an extra SSF layer after each operation layer (, MSA and MLP) and adjusts the output of these operations. Given the input _i∈^L× d, the output _o∈^L× d is formulated as: _o=γ⊗_i+β , where γ∈^d and β∈^d are the scale and shift factors, respectively. ⊗ is Hadamard product (element-wise multiplication). The model optimizes the SSF layers and classifier, , Θ=θ_SSF∪θ_W, to trace the features of new tasks. Adapter <cit.>: is a bottleneck module which contains a down-projection W_down∈^d× r to reduce the feature dimension, a non-linear activation function, and an up-projection W_up∈^r× d to project back to the original dimension. We follow <cit.> to equip the original MLP structure in ViT with the adapter. Denote the input of the MLP layer as _ℓ, the output of AdaptMLP is formatted as: MLP(_ℓ)+ReLU(_ℓ W_down)W_up . With pre-trained weights frozen, it optimizes the adapter and classification head, , Θ=θ_W_down∪θ_W_up∪θ_W. Batch Normalization Tuning: If the PTM is a residual network, we can adjust the BN <cit.> parameters. Since the running mean and variance in BN are compatible with the upstream data distribution, they could be unstable for downstream tasks. Correspondingly, we can zero the running statistics in BN and adapt to the current data via forward passing. No backpropagation is required. Discussions: We visualize the adapting process of in Figure <ref>. Compared to fully finetuning, parameter-efficient tuning adjusts the PTM towards the downstream task and preserves its generalizability. The adapted model can capture the specialized features in the incremental data, leading to better adaptivity. Since L2P and DualPrompt are based on pre-trained ViT, they cannot be deployed with CNN. In contrast, is a general framework that efficiently handles diverse structures. Specifically, can be combined with VPT/SSF/Adapter for ViT and SSF/BN Tuning for CNN. Since adopts the prototype-based classifier, the linear classifier W will be dropped after adaptation. § EXPERIMENTS In this section, we compare with state-of-the-art methods on benchmark datasets to show the superiority. Due to the overlap between pre-trained datasets and traditional CIL benchmarks, we also advocate four new benchmarks for evaluating PTM-based methods. Ablations and visualizations verify the effectiveness of with new classes. We also explore the performance of different PTMs in CIL. More details and extra results are included in the supplementary. §.§ Implementation Details Dataset: Following <cit.>, we evaluate the performance on CIFAR100 <cit.>, CUB200 <cit.>, and ImageNet-R <cit.>. Since PTMs are often trained with ImageNet21K <cit.>, evaluating PTM-based methods with ImageNet is meaningless. Hence, we advocate four new datasets that have large domain gap with ImageNet, namely ImageNet-A <cit.>, ObjectNet <cit.>, Omnibenchmark <cit.> and VTAB <cit.>. Among them, ImageNet-A and ObjectNet contain challenging samples that ImageNet pre-trained models cannot handle, while Omnibenchmark and VTAB contain diverse classes from multiple complex realms. To construct the CIL task, we sample 200 classes from ObjectNet and ImageNet-A, and 300 from Omnibenchmark. We sample 5 datasets from VTAB, each containing 10 classes, to construct the cross-domain CIL setting. More details are reported in the supplementary. Dataset split: Following the benchmark setting <cit.>, we adopt two types of dataset splits, , training from half and training from scratch. We unify them as `B/Base-m, Inc-n,' which means the first incremental dataset contains m classes, and each following dataset contains n classes. m=0 means the total classes are equally divided into each task. All classes are randomly shuffled with the same random seed <cit.> before splitting for fair comparison. The testing set is the same as the original one to evaluate holistically. Comparison methods: We first compare to the state-of-the-art PTM-based CIL methods L2P <cit.> and DualPrompt <cit.>. We also modify classical CIL methods LwF <cit.>, DER <cit.>, FOSTER <cit.>, MEMO <cit.>, FACT <cit.> to utilize the same PTM as the initialization. Apart from SimpleCIL, we also report the baseline, sequentially tuning the model, denoted as Finetune. All methods are initialized with the same PTM. Training details: We use PyTorch <cit.> to deploy all models on Tesla V100 with the same network backbone. As there are various PTMs publicly available <cit.>, we follow <cit.> to choose the most representative ones, denoted as ViT-B/16-IN1K and ViT-B/16-IN21K. Both are pre-trained on ImageNet21K, while the former is additionally finetuned on ImageNet1K. During adaptation, we train the model with a batch size of 48 for 20 epochs and use SGD with momentum for optimization. The learning rate starts from 0.01 and decays with cosine annealing. The prompt length p is 5 for VPT, and the projection dim r is 16 for Adapter. The source code will be publicly available upon acceptance. Evaluation protocol: Following <cit.>, we denote the Top-1 accuracy after the b-th stage as 𝒜_b. We use 𝒜_B (the performance after the last stage) and 𝒜̅=1/B∑_b=1^B𝒜_b (average performance along incremental stages) as measurements. §.§ Benchmark Comparison We report the incremental performance against SOTA methods in Table <ref>, where all methods are based on the pre-trained ViT-B/16-IN21K. We also train these models with pre-trained ViT-B/16-IN1K and show the incremental trend in Figure <ref>∼<ref>. These data splits include settings with large and small base classes for a holistic evaluation. Firstly, we can infer that the embeddings of PTMs are generalizable and can be directly applied for CIL to beat the SOTA. Specifically, the baseline SimpleCIL outperforms DualPrompt by 20% on CUB and 8% on ImageNet-A in terms of 𝒜_B. However, strong PTMs can be further improved if they are adapted by , as downstream tasks have a large domain gap with the pre-trained dataset. Specifically, we find consistently outperforms SimpleCIL in seven benchmark datasets. In contrast, sequentially finetuning the model suffers severe forgetting, which verifies the effectiveness of the adapt and merge protocol. Since only requires tuning the PTM in the first stage, it requires less training time and extra parameters than L2P and DualPrompt, as shown in Figure <ref>. Among the variations of adapting techniques, SSF and Adapter are more efficient than VPT. We also compare to SOTA traditional CIL methods and modify their backbones into pre-trained ViT for a fair comparison. However, we can infer from Table <ref> that these methods cannot work competitively without exemplars. Apart from ViTs, also works well with pre-trained CNNs. We adopt the pre-trained ResNet18 <cit.> for evaluation and plot the incremental performance in Figure <ref>,<ref>. Results show that consistently boosts the performance of pre-trained ViTs and CNNs. Lastly, as shown in Table <ref>, the performance on typical benchmarks is approaching saturation as they have a small domain gap with ImageNet. By contrast, due to the large domain gap between our newly established benchmarks and ImageNet, there is still space for improvement, indicating the effectiveness and necessity of these new benchmarks. §.§ Ablation Study Downscale features: Since the feature of is aggregated with PTM and adapted model, which is twice that of a PTM. We conduct an ablation with w/ SSF on CIFAR100 Base50 Inc5 to show whether these features are essential for CIL. Specifically, we train a PCA <cit.> model in the first incremental stage to reduce embedding dimension for the following stages. Denote the target dimension as k, we train the PCA model PCA([ϕ^*(),ϕ()]):^d→^k, and append it to the feature extractor. Hence, the features and prototypes are projected to k dimensions. We plot the performance with the change of k in Figure <ref>. Specifically, obtains competitive performance to DualPrompt (with 768 dims) even if the features are projected to 50 dims. We also experiment by randomly sampling k features from the original feature space and report the results in Figure <ref>. The conclusions are consistent with the former ones, showing that randomly sampling 200 dimensions of achieves the same performance scale as DualPrompt. The accuracy-dimension curves are shown in Figure <ref>. Sub-modules: Since is concatenated with PTM and adapted model, we conduct ablations on ImageNet-A Base100 Inc5 with ViT-B/16-IN21K to compare w/ Finetune and its sub-modules. Specifically, we build SimpleCIL with ϕ(·) and ϕ^*(·), respectively, denoted as SimpleCIL-PTM and SimpleCIL-Adapted. The former represents the capability of PTM, while the latter stands for the power of the adapted model. Both are compositional modules in . Besides, we build SimpleCIL based on concatenated pre-trained ViT-B/16-IN21K and ViT-B/16-IN1K, denoted as SimpleCIL-21K+1K. It utilizes the aggregated features of two embedding functions, which has the same dimension as . As shown in Figure <ref>, SimpleCIL-Adapted outperforms SimpleCIL-PTM, indicating the importance of model adaptation. However, adapting the model also overwrites the high-level features, which reduces the model's generalizability. The adapted model suffers larger performance degradation than vanilla SimpleCIL, indicating the effect of generalizability in resisting forgetting. Finally, outperforms any of these sub-modules with the help of unified adaptivity and generalizability. Different PTMs: Observing the performance gap between ViT-B/16-IN21K and ViT-B/16-IN1K, we seek to explore different kinds of PTMs on ImageNet-R Base0 Inc20. We choose publicly available PTMs, , ResNet18/50/152 <cit.>, ViT-B/16-IN1K/21K, ViT-L/16-IN1K, ViT-B/16-DINO <cit.>, ViT-B/16-SAM <cit.>, ViT-B/16-MAE <cit.>, ViT-B/16-CLIP <cit.> (image encoder) for a holistic evaluation, and report the results in Figure <ref>. We can draw three main conclusions. 1) Pre-trained ViTs show better generalizability than ResNets. 2) Larger ViTs generalize better than small ones, and ViTs trained with supervised loss perform better than unsupervised ones. 3) Owing to the massive training corpus and the contrastive loss <cit.>, CLIP performs better than ImageNet21K pre-trained ViTs. Finally, we find w/ Finetune consistently improves the performance of SimpleCIL for any PTM, thus validating its effectiveness. §.§ Visualization of Incremental Sessions In this section, we visualize the learned decision boundaries with t-SNE <cit.> on CIFAR100 dataset between two incremental stages, as shown in Figure <ref>, <ref>. We visualize the classes from the first and second incremental tasks with colorful dots and triangles. Correspondingly, the class prototypes are represented by squares. As we can infer from these figures, PTM works competitively, which well separates the instances into their corresponding classes. The class prototypes are situated at the center of each class, verifying their representativeness in recognition. When extending the model from the first to the second stage, we find performs well on both old and new classes. Visualizations verify the generalizability and adaptivity of . We also visualize the Grad-CAM <cit.> results on OmniBenchmark dataset based on pre-trained ResNet18. Grad-CAM is utilized to highlight the critical regions in the image for predicting the corresponding concept. The results are shown in Figure <ref> (bottom), indicating concentrates more on the task-specific features than vanilla PTMs. § CONCLUSION Learning with incremental classes is of great importance in real-world applications, which requires adaptivity for updating and generalizability for knowledge transfer. In this paper, we systematically revisit CIL with PTMs and draw three conclusions. Firstly, a frozen PTM can provide generalizable embeddings for CIL, enabling a prototype-based classifier to outperform the current state-of-the-art. Secondly, due to the distribution gap between pre-trained and downstream datasets, PTMs can be further harnessed to enhance their adaptivity. To this end, we propose , which can be orthogonally combined with any parameter-efficient tuning method to unify generalizability and adaptivity for CIL. Lastly, due to data overlapping, traditional ImageNet-based benchmarks are unsuitable for evaluation in the era of PTM. Hence, we propose four new benchmarks to evaluate PTM-based CIL methods. Extensive experiments verify 's state-of-the-art performance. Future work include exploring task-specific tuning methods and structures. Limitations: Possible limitations include the restriction of exemplars. It turns into exemplar-based CIL if sufficient instances from old classes are available, where adaptivity can be further addressed through exemplar replay. ieee_fullname Supplementary Material Class-incremental learning (CIL) is of great importance to the machine learning community, and Pre-Trained Models (PTMs) have boosted its performance in recent years. In the main paper, we revisit PTM-based CIL and draw three conclusions. 1) We empirically prove that frozen PTM can provide generalizable embeddings for CIL. To our surprise, a simple baseline (SimpleCIL) that continually sets the classifiers of PTM to prototype features can beat state-of-the-art performance even without training on the downstream task. 2) We show that PTM can be further cultivated with adaptivity through model adaptation. We propose ADapt And Merge (), which holds the advantages of PTM’s generalizability and adapted model’s adaptivity. 3) previous benchmarks are unsuitable in the era of PTM due to data overlapping. Hence, we propose four new benchmarks, namely ImageNet-A, ObjectNet, OmniBenchmark, and VTAB that have a large domain gap with ImageNet pre-trained model for evaluation. In the supplementary, we provide more details about the experimental results mentioned in the main paper, as well as additional empirical evaluations and discussions. The supplementary material is organized as follows: * Section <ref> provides background information on vision transformer and parameter-efficient tuning methods. It also includes a discussion on model tuning in ; * Section <ref> discusses the implementation details in the main paper, including the introduction of compared methods, hyper-parameters, pre-trained models, and datasets; * Section <ref> presents additional ablations of , including the influence of adapting stages, hyper-parameters and classifier types. It also contains extra experimental evaluations that could not be included in the main paper due to page limit, such as more visualizations of Grad-CAM; * Section <ref> reports the full experimental results of 7 datasets and 45 splits, including the numerical results and performance curves. It also includes experiments with pre-trained ResNets. § BACKGROUNDS ABOUT VIT AND PARAMETER-EFFICIENT TUNING In this section, we provide background information on vision transformers and parameter-efficient tuning techniques adopted in the main paper. §.§ Vision Transformer The concept of Vision Transformers (ViTs) is first introduced in <cit.> to the computer vision field. In a plain ViT, an RGB image ∈^3× H× W is first divided into non-overlapping patches, where (H, W) denotes the height and width of the input image. These patches are then appended with a class token and then fed into an embedding layer followed by the vision transformer blocks with self-attention <cit.> as the core operation. Following the notations in the main paper, we denote the features after the embedding layer as _e∈^L× d, and the first element in _e is the token. L is the length of sequence, and d is the embedding dim. Each vision transformer block mainly consists of two modules, , a multi-head self-attention layer (MSA) and a two-layer MLP. In MSA, the tokens _e are first linearly projected into query Q∈^L× d, key K∈^L× d, and value V∈^L× d. The self-attention is performed via: Attention(Q, K, V)=Softmax(Q K^T/√(d)) V . The output tokens are then sent to a LayerNorm <cit.> and the MLP block. Denote the output of Eq. <ref> as _ℓ, this process is formulated as: _ℓ+ MLP(LN(_ℓ)) , which aggregates the projected features and the original features for further information extraction. After the transformation of N cascaded transformer blocks, ViT takes the token as the feature for final recognition. We refer the readers to the original work <cit.> for more details about ViT. §.§ Parameter-Efficient Tuning In this section, we introduce more details about the parameter-efficient tuning techniques adopted in the main paper, including visual prompt tuning (VPT) <cit.>, adapters <cit.>, scale & shift (SSF) <cit.>, and batch normalization tuning. Before addressing these methods, we revisit the target of parameter-efficient tuning, which aims to adapt the model with the least tunable parameters. Denote the tuning process as: f^*()=ℱ(f(),^1,Θ) , which freezes the parameters in the pre-trained model and only adjusts the parameters in Θ. In the main paper, we optimizes the selected parameters via cross-entropy loss: min_Θ∑_(𝐱_j, y_j) ∈𝒟^1ℓ(f (_j), y_j) . §.§.§ Visual Prompt Tuning (VPT) VPT <cit.> aims to prepend some learnable prompts 𝐏∈^p× d to form the extended embedding features [𝐏,_e], where _e is the encoded features of the input image. The extended features are then fed into the subsequent transformer blocks of ViT to calculate the final embeddings. Depending on where the prompts are inserted, VPT can be further divided into two types: VPT-Deep and VPT-Shallow. Specifically, VPT-Shallow only learns the prompts in the first transformer block. Denote the function of k-th transformer block as L_k, the operations of VPT-Shallow can be denoted as: [𝐙_1, 𝐄_1] =L_1([ 𝐏, _e]) [ 𝐙_i, 𝐄_i] =L_i([ 𝐙_i-1, 𝐄_i-1]) i=2,3, …, N , where 𝐙_i∈^p× d denotes the encoded feature of prompts, N is the number of transformer blocks. Correspondingly, VPT-Deep learns the prompts in each transformer block: [, 𝐄_i]=L_i([𝐏_i-1, 𝐄_i-1]) i=1,2, …, N , where 𝐄_0=_e is the encoded feature of image patches. During optimization, VPT freezes the pre-trained weights in the embedding layer and only optimizes these learnable prompts and classification head[Note that the classification head W is only optimized in the adaptation process. Since we use prototype-based classifier for classification after model merge, W will be dropped after adaptation. ], , Θ=θ_𝐏∪θ_W. Specifically, the number of tunable parameters in VPT-Shallow is p× d, and that of VPT-Shallow is p× d × N, where N is the number of transformer blocks. For example, we set the prompt length to 5 for the ViT-B/16 model. The tunable parameters are 5× 786=0.004 million in VPT-Shallow and 5× 786× 12=0.046 million for VPT-Deep, which is negligible compared to the ViT-B/16 with 86 million parameters. §.§.§ Adapter Adapter <cit.> is a bottleneck module that allows adjusting the output of ViT. Formally, it comprises a down-projection W_down∈^d× r to reduce the feature dimension, a non-linear activation function, and an up-projection W_up∈^r× d to project back to the original dimension. Following the implementation of AdaptFormer <cit.>, we replace the original MLP structure in ViT with the AdaptMLP structure. Specifically, denote the input of the MLP layer as _ℓ, the output of AdaptMLP is formatted as: MLP(_ℓ)+s ·ReLU(_ℓ W_down)W_up , which is a residual structure. s is an optional learnable parameter for re-scaling the output. During adaptation, the model freezes the pre-trained weights and only optimizes the extra parameters, , Θ=θ_W_down∪θ_W_up∪θ_W. Specifically, we set the hidden dim r to 16, and the number of tunable parameters in the Adapter is approximately 0.3 million, which is negligible compared to the ViT-B/16 with 86 million parameters. §.§.§ Scale & Shift Scale & Shift (SSF) <cit.> aims to adjust the feature activation by scaling and shifting operations. SSF only appends an extra SSF layer after each operation layer (, MSA and MLP), and adjusts the output of these operations. Given the input _i∈^L× d, the output _o∈^L× d follows: _o=γ⊗_i+β , where γ∈^d and β∈^d are the scale and shift factors, respectively. ⊗ is Hadamard product (element-wise multiplication). The model optimizes the SSF layers and classification head, , Θ=θ_SSF∪θ_W, to trace the features of new tasks. In the implementation, we add the SSF layer after the MSA and MLP operations, and the number of tunable parameters in SSF is around 0.2 million, which is negligible compared to the ViT-B/16 with 86 million parameters. Note that the SSF layer can also be deployed for the pre-trained residual networks. We append SSF layers after the residual blocks to re-scale the output for better adaptation. §.§.§ Batch Normalization Tuning If the PTM uses ResNet structures, we can also adjust the BN <cit.> parameters, including the running mean and running variance. Specifically, BN is designed to normalize each feature dimension and overcome internal covariate shift. It records the running mean and variance in the training stage: μ_ℬ = 1/m∑_i=1^m x_i σ_ℬ^2 = 1/m∑_i=1^m(x_i-μ_ℬ)^2 , where x_i denotes the feature of the i-th instance and m is the batch size. μ_ℬ and σ_ℬ^2 are then utilized to normalize the instances in the testing process. However, since the running mean and variance in PTM are compatible with the upstream data distribution, they could be unstable for the downstream tasks, leading to abnormal outputs <cit.>. To handle the incompatible BN statistics in pre-trained and incremental datasets, we first zero the running statistics in BN and then forward pass the data in ^1 to record the current data distribution. In other words, BN can be updated by feeding the model with new class instances, , f(). These statistical parameters are then fit for the current data to alleviate the domain gap. Notably, BN tuning does not require backpropagation, making it an efficient solution. §.§ Summary of PTM Tuning Parameter-efficient tuning enables the model adaptation with least number of tunable parameters, which guarantees the model's adaptivity. Specifically, we also observe that fully finetuning could fail in cases where training data is rare. In such circumstances, parameter-efficient tuning could be a better solution for model adaptation. Accordingly, we notice w/ Finetune performs worse than SimpleCIL on CUB B0 Inc10, ObjectNet B0 Inc10, and OmniBenchmark B0 Inc30, while with other tuning methods perform better. On the other hand, since parameter-efficient tuning freezes the pre-trained weights, the generalizability of the model is also maintained. It must be noted that the PTM in the model merge is the same as the PTM before the model adaptation. In summary, is a general framework for class-incremental learning, which can be applied with different types of backbones and tuning techniques. Specifically, we can use VPT-Deep, VPT-Shallow, Scale & Shift, Adapter for ViT, and Scale & Shift and BN tuning for CNN. In the implementation, we only choose one specific tuning structure among these techniques, and do not consider the combination of multiple the tuning methods. § IMPLEMENTATION DETAILS In this section, we discuss the detailed implementation in , including the introduction of compared methods, hyper-parameters, selection of pre-trained models, and discussion about datasets. §.§ Compared Methods We first introduce the compared methods in the main paper. These methods are as follows: * Finetune: directly trains the model with new datasets incrementally, which leads to catastrophic forgetting; * Finetune Adapter <cit.>: freezes the pre-trained weights and sequentially optimizes the adapter module. To improve its performance, only the specific classifiers in the current dataset (, _i, i∈Y_b), are tuned, and the classifiers for former classes (, _i, i∈𝒴_b-1) are frozen; * LwF <cit.>: utilizes knowledge distillation <cit.> as regularization term to overcome forgetting, which relies on the supervision of old model to produce soft targets; * DER <cit.>: state-of-the-art class-incremental learning method, which creates a new backbone for each new incremental task. All these features are concatenated together to learn the unified classifier; * FOSTER <cit.>: state-of-the-art class-incremental learning method, which extends DER with a model compression stage to control the memory budget; * MEMO <cit.>: state-of-the-art class-incremental learning method. It creates new residual layers instead of the whole backbone to reduce memory cost. In the implementation, we change the residual layers into transformer blocks to keep consistent with the ViT structure; * FACT <cit.>: state-of-the-art class-incremental learning method, which also builds a prototype-based classifier. It reserves the embedding space for new classes in the incremental learning process; * L2P <cit.>: state-of-the-art PTM-based CIL method. It freezes the pre-trained model and optimizes a prompt pool to fit new patterns. To determine which prompt to use, it designs a `key-value' pair for prompt matching and utilizes an extra pre-trained model to provide the embeddings for prompt retrieval; * DualPrompt <cit.>:state-of-the-art PTM-based class-incremental learning method. It extends L2P with two kinds of prompts, namely general and expert prompts. Similar to L2P, it also relies on another pre-trained model for prompt retrieval. Note that all methods are based on the pre-trained ViT in the main paper. For methods requiring backbone expansion (, DER, MEMO, and FOSTER), we also use pre-trained ViT as the initialization of new backbones. Discussion about total parameters: Since L2P and DualPrompt have prompt pools, they rely on another pre-trained ViT as the `retriever' to search for the instance-specific prompt. Hence, shares the same scale of total parameters as these methods. We list the total number of parameters of these methods in Figure <ref>, which indicates that obtains better performance than the compared methods with the same scale or fewer parameters. §.§ Implementations and Hyper-Parameters For compared methods, we adopt the PyTorch implementation[The original implementation <https://github.com/google-research/l2p> is based on JAX.] of L2P[<https://github.com/JH-LEE-KR/l2p-pytorch>] <cit.> and DualPrompt[<https://github.com/JH-LEE-KR/dualprompt-pytorch>] <cit.>. We follow the implementations in PyCIL[<https://github.com/G-U-N/PyCIL>] <cit.> to re-implement other compared methods with ViT, , Finetune, Finetune Adapter, LwF, DER, FOSTER, MEMO, and FACT. Specifically, for , the number of the prompt length p in VPT is set to 5, and the projected dimension of the Adapter r is set to 16. There are no other hyper-parameters for to set, which ensures the robustness of our proposed method. We conduct experiments to investigate the influence of these parameters in Section <ref>. Following <cit.>, we use the same data augmentation for all methods, , random resized crop and horizontal flip. Input images are resized to 224×224 before feeding into the model. Following <cit.>, all classes are randomly shuffled with Numpy random seed 1993 before splitting into incremental tasks. A specific case is VTAB, where we force the classes to emerge from domain to domain, as discussed in Section <ref> and <ref>. §.§ Pre-Trained Models Since there are various kinds of pre-trained models publicly available, we follow <cit.> to choose the most commonly used ones in the main paper for evaluation, denoted as ViT-B/16-IN1K and ViT-B/16-IN21K. Specifically, both models are pre-trained on ImageNet21K <cit.>, while ViT-B/16-IN1K is further finetuned with ImageNet1K. We follow timm <cit.> implementation and report the details about these models in Table <ref>. For ResNet, we utilize the Pytorch <cit.> pre-trained models. Additionally, we report the backbones adopted in the ablation study, including ViT-L/16-IN1K, ViT-B/16-DINO <cit.>, ViT-B/16-SAM <cit.>, ViT-B/16-MAE <cit.>, ViT-B/16-CLIP <cit.> (image encoder), in the table. Among them, ViT-B/16-DINO and ViT-B/16-MAE are trained with self-supervised loss, and ViT-B/16-CLIP is trained on 400 million image-text pairs with contrastive loss. §.§ Datasets In this section, we provide an introduction to the datasets used in the main paper. We list the details of seven adopted datasets in Table <ref>. Specifically, CIFAR100, CUB200, and ImageNet-R are benchmark CIL datasets widely adopted in <cit.>. However, due to the data overlap between ImageNet-based benchmarks and the pre-trained dataset, ImageNet is unsuitable for evaluating PTM-based CIL methods <cit.>. As a result, we introduce four new benchmarks for CIL that 1) do not overlap with the ImageNet dataset, 2) have a large domain gap with ImageNet, increasing the burden of PTM to generalize, and 3) contain large-scale datasets from multiple realms that can form the cross-domain class-incremental benchmark. We list the detailed information below. * CIFAR100 <cit.> contains 100 classes with 60,000 images, of which 50,000 are training instances and 10,000 are testing ones, with 100 images per class. * CUB200 <cit.> is a widely-used dataset for fine-grained visual categorization task. It contains 11,788 images of 200 subcategories belonging to birds, with 9,430 for training and 2,358 for testing. * ImageNet-R <cit.> is introduced into CIL by <cit.>. It contains newly collected data of different styles, such as cartoon, graffiti, and origami, as well as hard examples from ImageNet that standard ImageNet pre-trained models fail to classify. Following <cit.>, there are 24,000 training instances and 6,000 testing instances from 200 classes. * ImageNet-A <cit.> ImageNet-A is a dataset of real-world adversarially filtered images that fool current ImageNet pre-trained classifiers. It was exported from sites including iNaturalist, Flickr, and DuckDuckGo, and adversarially selected by removing examples that fail to fool ResNet50. We select 5,981 training instances and 1,519 testing instances from 200 classes. * ObjectNet <cit.> is a large, real-world dataset for object recognition with controlled variations in object backgrounds, rotations, and imaging viewpoints, making finetuning a challenge due to only small performance increases. When tested on ObjectNet, object detectors experience a 40∼45% drop in performance compared to their performance on other benchmarks. The original ObjectNet contains classes from 313 classes, and we select a subset of 200 classes for class-incremental learning. Among them, 26,509 instances are for training, and 6,628 are for testing. * OmniBenchmark <cit.> is a concise and diverse benchmark for evaluating pre-trained model generalization across semantic super-concepts/realms. It contains 21 semantic realm-wise datasets that have no overlapping concepts. The original OmniBenchmark is constituted of 7,372 classes, from which we sample 300 categories to construct the class-incremental learning dataset. The subset contains 89,697 training instances and 5,985 testing instances. As these selected classes are from multiple realms, it is harder to conduct incremental learning with OmniBenchmark than other datasets due to the domain gap among different classes. * VTAB <cit.> includes 19 evaluation tasks spanning a variety of domains that can be grouped into three categories — natural, specialized, and structured. The Natural group includes images of the natural world captured through standard cameras, representing generic objects, fine-grained classes, or abstract concepts. The Specialized group utilizes images captured using specialist equipment, such as medical images or remote sensing. The Structured group derives from artificial environments that target understanding of specific changes between images, such as predicting the distance to an object in a 3D scene, counting objects, or detecting orientation. Since the original VTAB contains 19 datasets, we select 5 to construct a cross-domain class-incremental learning setting, , Resisc45 <cit.>, DTD <cit.>, Pets <cit.>, EuroSAT <cit.>, and Flowers <cit.>. In VTAB, we do not shuffle the classes and make the classes emerge from domain to domain, which is a more realistic incremental learning setting. We give the visualizations of our newly introduced datasets in Figure <ref>. As shown in the figure, ImageNet-A and ObjectNet contain hard samples that could be misclassified by the ImageNet pre-trained model. In contrast, OmniBenchmark and VTAB contain cross-domain instances, which increase the difficulty of incremental learning. Since the distribution gap from domain to domain has not been explored in former CIL tasks, exploring the cross-task incremental learning problem with OmniBenchmark and VTAB is very challenging. § EXTRA EXPERIMENTAL EVALUATIONS In this section, we conduct experiments to investigate the variations of . Specifically, we compared the results of model adaptation with different incremental stages to determine the best solution in model adaptation. We also explore the influence of hyper-parameters in model adaptation, , the prompt length in VPT and the projection dimension in Adapter. Additionally, we provide additional Grad-CAM results for better visualization. §.§ Influence of Adapting Stages As discussed in the main paper, we only adapt the pre-trained model in the first incremental stage with ^1 in . There are two reasons: 1) Sequentially tuning the model will suffer catastrophic forgetting. 2) Since we utilize a prototype-based classifier, tuning the model with multiple stages will result in incompatible features between former and new prototypes. In this section, we conduct an ablation to determine the influence of adapting stages and report the results in Figure <ref>. We conduct the experiment on CIFAR100 Base0 Inc10 setting with pre-trained ViT-B/16-IN21K. There are 10 incremental stages in total. Wedenote the tuning stages as T, and train w/ Adapter for ablation. Specifically, we change the tuning stages among {0,1,2,⋯,10} to determine the influence on the final performance. In the first T stages, we adapt the PTM incrementally with adapter and replace the classifier with prototypes. Afterward the T-th stage, we freeze the encoding functions and only extract prototypes for the following stages. T=0 denotes vanilla SimpleCIL. To prevent forgetting, we freeze the classifier weight of former classes when learning new classes. As shown in Figure <ref>, tuning the model with the first stage achieves the best performance among all settings. Specifically, multi-stage tuning harms generalizability and results in the incompatible features of former and new classes. We also plot the trend of average/last accuracy with the change of tuning stages in Figure <ref>, where T=1 achieves the best performance in both measures. §.§ Influence of Hyper-Parameters In this section, we explore the influence of hyper-parameters in . Specifically, since is optimized with parameter-efficient tuning, the only hyper-parameters come from these tuning methods, , the prompt length p in VPT and the projection dim r in Adapter. We train the model on CIFAR100 B50 Inc5 with pre-trained ViT-B/16-IN1K in this section. Firstly, we investigate the influence of the prompt length in Figure <ref>. The figure shows that 's performance is robust with the change of the prompt length. Therefore, we use p=5 as a default parameter for all settings. Similarly, we observe similar phenomena in Figure <ref>, where the performance is robust with the change of the projection dimension. As a result, we set r=16 as a default parameter for all settings. §.§ More Grad-CAM Results In this section, we provide more Grad-CAM results of compared to PTM. As shown in Figure <ref>, concentrates more on task-specific features than vanilla PTM, confirming the effectiveness of model adaptation in capturing task-specific features. §.§ Influence of Cosine Classifier In this section, we verify the necessity of using a cosine classifier in . Specifically, we report the performance of SimpleCIL and and their variations without the cosine classifier in Table <ref>. As we can infer from the table, replacing the cosine classifier with an unnormalizedd classifier will lead to a performance gap of approximately 5%. Therefore, the cosine classifier is essential in building PTM-based models with prototypical classifiers. § FULL EXPERIMENTAL RESULTS ON 7 DATASETS In this section, we report the full experimental performance on seven benchmark datasets with the numerical results and accuracy curves. We also report the results of residual networks with . Specifically, there are 45 dataset splits from 7 datasets, and we report the performance of two backbones (ViT-B/16-IN1K and ViT-B/16-IN21K) on them. §.§ CIFAR100 Results For CIFAR100, we design 6 dataset splits to divide these 100 classes, namely Base0 Inc5, Base0 Inc10, Base0 Inc20, Base 50 Inc5, Base50 Inc10, Base50 Inc25. We report the results in Table <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, and plot the corresponding incremental performance in Figure <ref>. §.§ CUB200 Results For CIFAR100, we design 8 dataset splits to divide these 200 classes, namely Base0 Inc5, Base0 Inc10, Base0 Inc20, Base0 Inc40, Base 100 Inc5, Base100 Inc10, Base100 Inc20, Base100 Inc50. We report the results in Table <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, <ref> and plot the corresponding incremental performance in Figure <ref>. §.§ ImageNet-R Results For ImageNet-R, we design 8 dataset splits to divide these 200 classes, namely Base0 Inc5, Base0 Inc10, Base0 Inc20, Base0 Inc40, Base 100 Inc5, Base100 Inc10, Base100 Inc20, Base100 Inc50. We report the results in Table <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, <ref> and plot the corresponding incremental performance in Figure <ref>. §.§ ImageNet-A Results For ImageNet-A, we design 8 dataset splits to divide these 200 classes, namely Base0 Inc5, Base0 Inc10, Base0 Inc20, Base0 Inc40, Base 100 Inc5, Base100 Inc10, Base100 Inc20, Base100 Inc50. We report the results in Table <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, <ref> and plot the corresponding incremental performance in Figure <ref>. §.§ ObjectNet Results For ObjectNet, we design 8 dataset splits to divide these 200 classes, namely Base0 Inc5, Base0 Inc10, Base0 Inc20, Base0 Inc40, Base 100 Inc5, Base100 Inc10, Base100 Inc20, Base100 Inc50. We report the results in Table <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, <ref> and plot the corresponding incremental performance in Figure <ref>. §.§ OmniBenchmark Results For OmniBenchmark, we design 6 dataset splits to divide these 300 classes, namely Base0 Inc15, Base0 Inc30, Base0 Inc50, Base150 Inc15, Base 150 Inc30, Base150 Inc50. We report the results in Table <ref>, <ref>, <ref>, <ref>, <ref>, <ref>, and plot the corresponding incremental performance in Figure <ref>. §.§ VTAB Results Since VTAB is a complex dataset with multiple domains, we select five domains to construct a cross-domain class-incremental learning setting. Specifically, we fix the domain order to “Resisc45 → DTD → Pets → EuroSAT → Flowers”. Each domain contains 10 classes, and we formulate the VTAB Base0 Inc10 setting. We report the results in Table <ref> and plot the corresponding incremental performance in Figure <ref>. §.§ with ResNet In this section, we give the visualizations of to boost the performance of pre-trained ResNet. Specifically, we choose one split from each dataset and choose pre-trained ResNet18/50/101/152 as the backbone to evaluate the performance of . We report the numerical results in Table <ref>, <ref>, <ref>, <ref>, <ref>, <ref> and plot the incremental performance in Figure <ref>. Results indicate also works competitively with ResNets.
http://arxiv.org/abs/2303.07100v1
20230313134009
A Feature-based Approach for the Recognition of Image Quality Degradation in Automotive Applications
[ "Florian Bauer" ]
cs.CV
[ "cs.CV" ]
A Feature-based Approach for the Recognition of Image Quality Degradation in Automotive Applications Co-funded by Bayerisches Staatsministerium für Wirtschaft, Landesentwicklung und Energie (stmwi.bayern.de). Florian Bauer b-plus technologies GmbH Deggendorf, Germany florian.bauer@b-plus.com March 30, 2023 ================================================================================================================================================================================================================== Cameras play a crucial role in modern driver assistance systems and are an essential part of the sensor technology for automated driving. The quality of images captured by in-vehicle cameras highly influences the performance of visual perception systems. This paper presents a feature-based algorithm to detect certain effects that can degrade image quality in automotive applications. The algorithm is based on an intelligent selection of significant features. Due to the small number of features, the algorithm performs well even with small data sets. Experiments with different data sets show that the algorithm can detect soiling adhering to camera lenses and classify different types of image degradation. feature-based, image quality, degradation, soiling, fisheye camera § INTRODUCTION The functionality of in-vehicle visual perception systems relies on the quality of the images captured by the cameras. The performance of visual perception algorithms is known to degrade significantly in adverse conditions. Adverse weather conditions can be rain, snow, or fog. Further adverse conditions can be caused by poor lighting, or simply soil, ice, dust, or water adhering to the camera's lens. Unlike cameras behind the windshield, fisheye cameras are typically mounted at a low position on a vehicle and are directly exposed to the environment. Thus, the lenses of these cameras tend to get soiled, e.g., by splashes of mud or water or by raindrops forming on the lens <cit.>. Because of their extensive field of view, which typically covers areas with varying lighting conditions, images from fisheye cameras are also susceptible to local overexposure or underexposure. Soiling and incorrect exposure can degrade the quality of images significantly. Algorithms that can detect image quality degradation are essential to higher levels of vehicle automation. They allow the system to issue warnings about malfunction or even to disable affected functions <cit.>. However, these algorithms may also be applied in the development process of the automation system. Poor image quality may cause unexpected, challenging, or dangerous situations, often referred to as corner cases <cit.>. It is essential to detect such situations and include them in the data that is used for the development of machine learning algorithms. Fig. <ref> shows a selection of images (converted to grayscale) captured by four surround-view fisheye cameras on a test vehicle, along with some common effects that can degrade image quality. The work presented here focuses on the recognition of image quality degradation in automotive applications, caused by soiling adhering to the lens (raindrops, dust, mud, ice), noise, blur, underexposure, or glare. The key contribution of this paper is the development of a feature-based approach. This approach is based on a set of features that can be computed from a single grayscale image. The features are derived from the statistical moments of the distributions of quantities that result from the application of different filter operations on the grayscale image. § RELATED WORK The recognition and detection of reduced image quality have been studied in various fields of engineering. For instance, in image quality assessment (IQA) the appearance of an image to a human viewer is most important <cit.> and a score may be used to quantify quality. Whereas for images used in visual perception, the “quality” refers to the amount of useful information the image contains, e.g., the number of identifiable objects <cit.>. Depending on the application, different terminology has been introduced to define image quality and its degradation.  This section briefly introduces this terminology along with some previously developed methods to evaluate and detect image quality degradation. In IQA, the algorithms presented in <cit.> use scene statistics of “locally normalized luminance coefficients” to quantify possible losses of “naturalness” in the image due to the presence of “distortions”.  Here, the term distortion refers to artificial blur, noise, or the result of extensive compression that affects image quality. Based on the statistics, a representative feature vector is computed, which is used to evaluate the perceptual quality of an image. In visual perception applications, adverse weather conditions (e.g., fog, mist, rain, and snow) are known to degrade the performance of many image- and video-based algorithms.  Often, adverse weather conditions not only reduce the visible range of on-board cameras and cause a loss of contrast, but also cause soiling on the camera's lens.  In the past, the effect of rain in particular has been studied in this context.  The detection of raindrops has for instance been studied in <cit.>. The survey paper <cit.> summarizes methods for the detection of raindrops adhering to a vehicle’s windshield. However, soiling on lenses of in-vehicle cameras may not only be caused by raindrops. In <cit.> a method to detect “image artifacts” that arise from raindrops, dirt, and scratches on the camera lens is discussed. The method is based on a pixel-wise correlation between several frames captured on moving systems. Recent approaches use Convolutional Neural Networks (CNNs) to detect “soiling” on camera lenses. Different networks that can detect “opaque” and “transparent” soiling on image-, tile-, or pixel-level are presented in <cit.>. Although the networks are “elatively small-sized” data sets with many thousands of annotated images are used for training (e.g., WoodScape <cit.>).  Before the rise of deep learning, feature-based approaches were commonly used in computer vision applications. These approaches typically use the statistics of handcrafted features and a classical machine learning model to perform the final classification <cit.>.  E.g., the well-known method in <cit.> proposes features based on the “histogram of gradients” (HoG) that enables high accuracy for human detection. In <cit.>, a method is presented that uses features derived from histograms of different image properties (brightness, contrast, sharpness, hue, and saturation). The histograms are computed for multiple regions of interest in the image and the features are compiled into one large vector. A support vector machine (SVM) classifier is applied to estimate the weather situation (clear weather, light rain, heavy rain) based on the vector.  § FEATURE EXTRACTION This paper presents a feature-based algorithm that can recognize common effects of image quality degradation in automotive applications. The proposed set of features can be derived from a single grayscale image. An SVM is used to recognize different classes of degradation effects based on the features. Fig. <ref> gives an overview of the algorithm. First, different filters are applied to the grayscale image to determine local quantities for blur, sharpness, and others. Next, features based on the statistical distribution of these quantities are computed. A machine learning algorithm is applied to recognize different classes of image quality degradation. Although color images may contain additional valuable information, the proposed algorithm uses grayscale images only. This allows the algorithm to be applied to a wider range of cameras given that some of the color filter arrays used in the automotive industry do not provide color information (e.g. RCCC). §.§ Image filtering First, a series of filter operations is applied to a grayscale image. Fig. <ref> shows a grayscale image captured by a fisheye camera with lens affected by soiling and the five quantities that are computed based on it. Let I(i,j) with 0 ≤ I(i,j) ≤ 1 denote the intensity of each pixel in the initial grayscale image, where i = 1, 2, … H, and j = 1, 2, … W are the pixel indices, and H and W are the height and width of the image, respectively. §.§.§ Local Mean Subtracted Field To compute the local mean subtracted field (I(i,j) - μ(i,j)) the local mean field μ(i,j) is required, which is defined by μ(i,j) = ∑_k=-K^K ∑_l=-L^L w_k,l I(i+k, j+l) . In this equation, w is a circular Gaussian weighting function sampled out to three standard deviations and scaled to unit volume, as suggested in <cit.>. K and L determine the size of the filter. For K = L = 3 this results in a filter of 7 pixels by 7 pixels. The operation defined by (<ref>) returns the weighted sum of pixel values of the grayscale image within a small neighborhood of a pixel and is commonly used to blur images. The local mean field μ is subtracted pixel-wise from the grayscale image to obtain the local mean subtracted field (I - μ). §.§.§ Local Contrast Field This quantity is defined as: σ (i,j) = (∑_k=-K^K ∑_l=-L^L w_k,l (I(i+k, j+l) - μ(i,j))^2)^1/2 . It gives the local variance of an image and can be used as a measure for local image sharpness <cit.>. §.§.§ Gradient field The edges in an image are known to be important for visual perception such as object detection but can also be affected by different types of image degradation. Edges in images can be identified by various measures, like the magnitude of the first-order gradients in the horizontal and vertical directions (Sobel), or the Laplacian of an image. Experiments with different filters show that the Laplacian operator yields the most distinctive features for soiled images. In Cartesian coordinates, the Laplacian operator gives the sum of the second-order derivatives in horizontal and vertical directions of an image and can be approximated by a discrete filter. §.§.§ Mean Subtracted Contrast Normalized (MSCN) Coefficients This quantity is inspired by image quality assessment (IQA) algorithms <cit.>. It is defined as: Î(i,j) = I(i,j) - μ(i,j) /σ(i,j) + e , where e is a constant that prevents division by zero. These coefficients have been observed to follow a certain statistical distribution for images that contain little or no distortion. The presence of image distortion (noise, blur, artifacts from compression) alters the distribution of the coefficients significantly. §.§.§ Pair-Wise Product of MSCN coefficients Similarly, the products of pairs of MSCN coefficients provide valuable information on image distortion <cit.>. The products Î_H(i,j) along the horizontal direction can be computed from Î_H(i,j) = Î(i,j) Î(i+1,j) . All the quantities defined in this section can be computed very efficiently and are assumed to provide valuable information to identify image degradation. For instance, the local mean subtracted field (I - μ) provides a local measure of blurriness in the image. In Fig. <ref> b it can be seen that the mean subtracted field exhibits small magnitudes (color-coded by gray) in the parts of the image that are soiled. §.§ Computation of Statistical features Examining the quantities in Fig. <ref> showed that their distributions (histograms) exhibit characteristic shapes corresponding to certain effects of image degradation. Thus, it can be hypothesized that the statistical properties of these distributions can be used to recognize certain types of image quality degradation. However, the number of features directly influences the complexity of the classification problem. A large number of features may increase the accuracy, but will also increase computation time and the size of the required training set in particular. Thus, a small number of highly significant features should be selected. The proposed features are the first- and second-order moments (mean and variance) of the distributions of the quantities in Fig. <ref>. They are assumed to be highly significant, because for several distribution functions the shape parameters can be estimated based on these two statistical properties. These properties are also often used for functions that do not have a closed form to determine the estimates <cit.>. Because the distributions may be asymmetric, the moments are calculated for the non-negative and negative values separately. μ_pos = 1/H W∑_i=1^H∑_j=1^W x(i, j) ∀ x(i,j) ≥ 0 V_pos = 1/H W∑_i=1^H∑_j=1^W (x(i, j) - μ_pos)^2 ∀ x(i,j) ≥ 0 Equations (<ref>) and (<ref>) give the features μ_pos and V_pos based on the non-negative values x ≥ 0. For features μ_neg and V_neg the negative values x < 0 are used, resulting in four features per distribution. Only two features are computed for the distributions I(i,j) and σ(i,j) because they merely have non-negative values. In total, this results in a feature vector 𝐟 with 20 scalar elements. §.§ Classification The feature vector 𝐟 is used as input for a classifier that maps from feature space into classes. For this task, supervised machine learning algorithms such as Decision Trees, Neural Networks, or Support Vector Machines can be used. Due to its robustness, computational efficiency, and applicability to small and imbalanced data sets, an SVM with an RBF (Radial Basis Function) kernel is used. The algorithm is implemented in Python based on the libraries contained in Scikit-learn <cit.>. § EXPERIMENTS AND RESULTS §.§ Data Sets Table <ref> provides information on each of the four data sets used for the experiments in this section. All data sets contain at least images from two classes: clean and soiled. Data Set 1 has additional images according to four more effects of image degradation. The images in Data Set 1 were sampled from video recordings captured by four surround-view fisheye cameras which are mounted on the front and rear of a test vehicle as well as on both mirrors. Sample images can be seen in Fig. <ref>. The images in Data Set 2 were extracted from a collection of videos that were taken during every day driving situations by a rear view camera in a modern production car. The images clearly exhibit some artifacts originating from the lossy compression that was applied to the video data. Data Set 3 is the subset of the WoodScape data set that is publicly available <cit.>. Data set 4 is a combination of data sets 1, 2, and 3. The images are selected in a way that the three data sets and two classes are roughly balanced. §.§ Recognition of soiled images The proposed algorithm is applied to the four data sets to classify the input images as either clean or soiled (binary classification). The data set is split into training (75%) and test data (25%). The features are mean removed and scaled to unit variance first. An SVM classifier with an RBF kernel is trained on each of the four data sets. The regularization parameter C and the kernel coefficient γ (see <cit.>) are adjusted for each of the data sets individually. Table <ref> summarizes the performed experiments and accuracies achieved on the test data. The accuracy is defined as the ratio of the number of correctly predicted test images to the total number of test images. One of the major advantages of the proposed, feature-based algorithm is its low complexity, because the classification of the images is based on merely 20 features. Even for training sets with only 500 images, accuracies ≥ 95% can be achieved. §.§ Accuracy Compared to CNN To compare the feature-based approach to a CNN (see <cit.>), the same experiments as described in <cit.> are performed. In these experiments, different subsets of the WoodScape data set are used: (I) training and testing on images captured by front (FV) and rear (RV) cameras only, (II) training on FV and RV cameras and testing on all cameras, and (III) training and testing on all cameras. The results are shown in Table <ref>. The accuracy achieved by the CNN is given in the bottom row. It is computed based on the raw confusion matrices presented in <cit.>. The results of experiment (II) provide insight into how well the algorithm generalizes across images taken by cameras mounted on different positions (different perspectives, e.g. Fig. <ref>, a and b). Although the number of images available for the training of the algorithm is significantly smaller, the feature-based approach outperforms the CNN in this task. §.§ Classification of Degradation Effects In this experiment the proposed algorithm is applied to the entire Data Set 1 (multi-class classification). The results presented in Fig. <ref> show that the feature-based algorithm is able to recognize more than just soiled images. Other degradation effects can be classified even more accurately. The algorithm achieves an overall accuracy of 96.52%. § CONCLUSION This paper presents a feature-based algorithm that is based on an intelligent selection of features that are significant for the detection of image quality degradation. From experiments with different image data sets it is found that the algorithm can reliably detect soiling on camera lenses. A comparison with another approach (based on Deep Learning) shows that it generalizes better across images captured from different camera positions. The algorithm is also capable of classifying different effects of image quality degradation, such as soiling, blur, glare, noise, or underexposure. The major advantages of the presented algorithm are that small data sets suffice to train the classifier and that it can be computed very efficiently. IEEEtran
http://arxiv.org/abs/2303.06655v1
20230312130907
Single-Particle Spectra in Relativistic Heavy-Ion Collisions Within the Thermal Quantum Field Theory
[ "Dmitry Anchishkin" ]
nucl-th
[ "nucl-th", "hep-ph", "quant-ph" ]
Bogolyubov Institute for Theoretical Physics, 03143 Kyiv, Ukraine Taras Shevchenko National University of Kyiv, 03022 Kyiv, Ukraine Frankfurt Institute for Advanced Studies, 60438 Frankfurt am Main, Germany 12.40.Ee, 12.40.-y A quantum generalization of the Cooper-Fry recipe is proposed. The single-particle spectrum arising from relativistic collisions of particles and nuclei is calculated within the thermal quantum field theory framework. The starting point of consideration is the solution of the initial-value problem of particle emission from a space-like hypersurface. In the following steps, we obtain the single-particle spectrum using the “smaller” Green's function associated with the fireball medium. Based on this result, several specific examples of particle emission are considered. Single-Particle Spectra in Relativistic Heavy-Ion Collisions Within the Thermal Quantum Field Theory D. Anchishkin ==================================================================================================== § INTRODUCTION Models and approaches that are used to describe the processes occurring in the reaction region during relativistic nucleus collisions are investigated by comparing the predictions made with experimental data on one-, two-, and many-particle momentum spectra, which contain information about the source at an early stage (photons, dileptons) and at the stage of the so-called freeze-out (hadron spectra). The freeze-out hypersurface Σ is a kind of spatial surface moving in time, which is an imaginary boundary between two regions: there is strong dynamics inside the surface, and outside the surface, particles freely propagate outward. Wave function at the freeze-out times can be considered as the initial one for its further history, and, since its further evolution is free, it can be easily taken into account (we do not discuss final state interactions so far). Intuitively, free evolution can be reversed, making it possible that the cross section and other measurable physical quantities are determined through the initial values of the wave function, i.e. the values of the wave function at the times of freezing. Rigorous evaluations give exactly this result. On the other hand, the strong dynamics acting inside a freeze-out hyper-surface leads to the creation of a certain quantum state at freeze-out times. Consequently, the wave function at the freeze-out times is the final state of strong dynamics. By representing experimentally measured quantities with the help of these states, we can study strong interactions in dense and hot nuclear matter. Because of this creativity, the separation of the scales of interaction in space and time, which is carried out using the freeze-out hypersurface, looks very attractive. In this article, we consider the emission of hadrons from a space-like hypersurface, which is related to the initial-value problem. The particles are emitted by the donor system (fireball), which exhibits sharp kinetic freezing: space-like and time-like hypersurfaces separate the excited (interacting) particle system from its noninteracting stage in the evolutionary process. § NOTION OF FREEZE-OUT HYPERSURFACE An important question that can be clarified by studying the reaction zone is how the space-time boundary of the fireball is related to the so-called sharp freeze-out hypersurface. (A discussion of various approaches to the design and use of freeze-out hypersurface can be found in <cit.>.) Usually, the sharp freeze-out hypersurface is defined by the parameter P(t, r) taking the critical value P_ c on the hypersurface. That is, the equation of the hypersurface has a form P(t, r) = P_ c . The parameter to for defining the hypersurface can be selected as: 1) The density of particles <cit.>: n(t, r) = n_ c ; 2) The energy density <cit.>: ϵ(t, r) = ϵ_ c ; 3) The temperature <cit.>: T(t, r) = T_ c . It should be noted that any definition of sharp freeze-out is possible precisely with the selected accuracy. Let us list the basic notions of the relativistic kinetic theory <cit.>. Invariant particle number density: n(x) = N^μ (x) u_μ (x) , where N^μ(x) = ∫ (d^3 p/p^0) p^μ f(x,p) = (n_ lab, n_ lab v__ E) is the particle four-flow with f(x,p) as the distribution function, and u^μ(x) = N^μ/(N^ν N_ν)^1/2 = (γ__ E, γ__ E v__ E) is the collective four-velocity (the Eckart definition). Invariant particle energy density: ϵ(x) = u_μ (x) T^μν (x) u_ν (x) , where T^μν(x) = ∫ (d^3 p/p^0) p^μ p^ν f(x,p) is the energy-momentum tensor. With the help of relativistic transport model, the last two equations (<ref>) and (<ref>) were used to determine the freeze-out hypersurface for pions <cit.>. In Fig. <ref> these freeze-out hypersurfaces, together with the corresponding projections on three planes, can be seen for different collision energies. The critical value was taken as n_ c = 0.08 fm^-3 for the particle density and ε_ c = 0.035 GeV/fm^3 for the energy density. The freeze-out hypersurfaces in the figures are represented in quasi-four-dimensional form, the compactification of spatial transverse coordinates is made in the form (x,y) → r = √(x^2+y^2). Then the coordinates of the four-dimensional surfaces are (t, r, z), note the coordinate r is reflected symmetrically to negative values. From comparing each pair of plots for the same energy, we can see that there is no difference in determining the freeze-out hypersurface based on particle density or based on energy density. This can be considered as a statement that for the pion particle density n = n_ c = 0.035 GeV/fm^3 or the pion energy density ε = ε_ c = 0.035 GeV/fm^3 the behavior of a pion system is very close to an ideal gas (for details see <cit.>). § RADIATION OF QUANTUM FIELDS FROM SPACE-LIKE HYPERSURFACE: THE CAUCHY PROBLEM The space-like hypersurface, together with the time-like hypersurface, determines the boundary of the four-dimensional volume occupied by a many-particle system. Kinetic freeze-out that occurs from a space-like hypersurface (any tangent to this surface lies outside the light cone) can be treated as an initial-value problem for the radiation of particles from a fireball. In the present approach, we first use a simplified shape of the freeze-out hypersurface. The space-like part of the total hypersurface will simply be a surface of constant time t=t_0. It should be noted that such a condition is a standard approach that is commonly used in mathematical physics. On the other hand, we do not lose generality, because the results obtained for an equal-time hypersurface can be converted to results for a space-like hypersurface of a given shape, as we will show later. An example of an equal-time hypersurface for a spherically symmetric expansion of a fireball is shown in Fig. <ref>, on left panel. One more way is shown, how a complete freeze-out hypersurface, which also includes a time-like part, can be reduced to an equal-time space-like hypersurface even in the general case (see the right panel). So, our goal is to solve the initial-value problem for the propagation of free particles to the detector when they are “emitted from the space-like hypersurface”. In fact, we would like to reproduce and generalize the Cooper-Frye formula <cit.> for the emission of particles from a finite space-time volume. After freeze-out, the particles propagate without interaction (this is the freeze-out condition). This system of “traveling” free particles is described by the field operator φ̂ (x), which satisfies the Klein-Gordon equation (∂_μ∂^μ + m^2) φ̂ (x) = 0 , where ∂_μ∂^μ =∂_t^2-∇⃗^2. The Cauchy problem or the initial conditions for this equation are specified on a space-like hyper-surface. Without loss of generality, for simplicity, this hypersurface has the form x^0 = t_0 = const (see Fig. <ref>) φ̂ (x^0, x)|_x^0=t_0 = Φ̂_0( x) , ∂φ̂(x^0, x)/∂ x^0|_x^0=t_0 = Φ̂_1( x) . As it is shown in the textbook <cit.>, equation (<ref>) together with the initial conditions (<ref>) can be written as an inhomogeneous differential equation (for details see <cit.>) (∂_μ∂^μ +m^2) φ̂(x) = δ(x^0-t_0)Φ̂_1( x) + δ'(x^0-t_0)Φ̂_0( x) , where using the δ'(t) function is well known: ∫ dt F(t)δ'(t)=-∫ dt dF(t)/dtδ(t). This equation can be solved with the help of the retarded Green's function of the Klein-Gordon equation (see, for example, <cit.> or <cit.>) (∂_μ∂^μ + m^2)G_R(x-y) = δ ^4(x-y) , where G_R(x-y) = -∫d^4k/(2π )^4 e^- ik· (x-y)/(k_0 + iδ)^2- k^2 - m^2 = i θ( x^0-y^0 ) ∫d^3k/(2π )^3 2ω ( k) [ f_ k(x) f^*_ k(y)- f^*_ k(x) f_ k(y) ] with f_ k(x)=e^- i ω ( k)x^0+i k· x and ω( k) = √(m^2+ k^2). Hence, for the field operator, φ̂(x), from (<ref>) one obtains φ̂(x) = ∫ d^4y G_R(x-y) [ δ(y^0-t_0)Φ̂_1( y) + δ'(y^0-t_0)Φ̂_0( y) ] = ∫ d^4y δ(y^0-t_0) [ G_R(x-y) ↔∂/∂ y^0Φ̂(y^0, y) ] , where we update notations of the initial conditions in the following way: Φ̂_0( y) = Φ̂(y^0, y)|_y^0=t_0 and Φ̂_1( y) = ∂Φ̂(y^0, y)/∂ y^0 |_y^0=t_0. Indeed, we associate the field Φ̂(y^0, y) with the interacting system which exists before freeze-out, i.e. at the times which are less then that on the hyper-surface, which represents the initial conditions. In particular case of the flat hyper-surface, y^0 = t_0, the field Φ̂(y^0, y) exists at times y^0 < t_0. Hence, this field and its derivatives determine the initial conditions for particles emitted from the freeze-out hyper-surface which we described by the field φ̂(x). We note, for the arbitrary space-like hyper-surface, σ(y), solution (<ref>) looks like <cit.> φ̂(x) = ∫_σ dσ^μ(y) [ G_R(x-y) ↔∂/∂ y^μΦ̂(y) ] . On the other hand, in the free space for the system without interaction solution of the Klein-Gordon equation (<ref>) can be written as expansion over eigne functions of the operator of momentum with the infinite boundary conditions, that coincides with expansion in the Fourier integral φ̂ (x^0, x) = ∫d^3k/(2π)^3 2ω_k [b( k) e^-iω_k t+i k· x + b^+( k) e^iω_k t-i k· x] = ∫d^4k/(2π)^4 2πδ( k^2-m^2) e^-ik· x b( k) , where ω_k=√(m^2+ k^2), b( k) and b^+( k) are the annihilation and creation operators which satisfy the following commutation relation [b( k), b^+( p)] = (2π)^3 2ω_k δ^3( k- p) . For the real field, which we consider, these operators should obey equality b(- k) = b^+( k) ⇒ φ̂^+ ( x) = φ̂ ( x) . We assume that the detector measures asymptotic momentum eigenstates, i.e. that it acts by projecting the emitted single-particle state onto ϕ^ out_ k( x,t) = e^ -i ω_k t+i k· x ≡ f_ k(x) , where ω_k=ω( k)=√(m^2+ k^2) is the energy of the particle and we label out-state by the value of measured momentum, i.e. k. Evidently, these functions are the solutions of eq.(<ref>). So, we defined the set of the basic functions (asymptotic states) f_ k(x) ≡ e^- i k· x | _k^0=ω ( k) , which are orthogonal with respect to the scalar product ∫ d^3x f^*_ k(x) i ↔∂_x^0 f_ p(x) = (2π )^3 2ω ( k) δ ^3( k- p) , ∫ d^3x f_ k(x) i ↔∂_x^0 f_ p(x) = 0 . In fact, the expansion (<ref>) is made in terms of the asymptotic states (<ref>). Then, if the field operator, φ̂(x), is known the annihilation and creation operators can be evaluated b( k) = ∫ d^3x f^*_ k(x) i ↔∂_x^0φ̂(x) , b^+( k) = - ∫ d^3x f_ k(x) i ↔∂_x^0φ̂^+(x) . The goal of our investigation is a calculation of the single- and two-particle spectra which can be written with the help of annihilation and creation operators in the following way (see, for instance, <cit.>) P_1( p) = ⟨ b^+( p) b( p) ⟩ , P_2( p_1, p_2) = ⟨ b^+( p_1) b^+( p_2) b( p_2) b( p_1) ⟩ , where averaging is taking with respect to the states of the donor system described by the field Φ̂(x). That is why we are interesting in exact expressions of the creation b^+( k) and annihilation b( k) operators at asymptotic times, t →∞. Inserting solution (<ref>) into (<ref>) one obtains b( k) = lim_x^0 →∞ ∫ d^3x d^4y δ(y^0-t_0) f^*_ k(x) i ↔∂/∂ x^0[ G_R(x-y) ↔∂/∂ y^0Φ̂(y) ] = ∫ d^4y δ(y^0-t_0)[ f^*_ k(y) i ↔∂/∂ y^0Φ̂(y) ] , and b^+( k) = lim_x^0 →∞ - ∫ d^3x d^4y δ(y^0-t_0) f_ k(x) i ↔∂/∂ x^0[ G_R(x-y) ↔∂/∂ y^0Φ̂^+(y) ] = -∫ d^4y δ(y^0-t_0) [ f_ k(y) i ↔∂/∂ y^0Φ̂^+(y) ], where we use representation of the Green's function (<ref>) and the orthogonal relations (<ref>). It is seen that the projection of the donor field Φ̂(y) is taken at the times of the freeze-out and all evolution history of the free propagation (after freeze-out) is ridded out. Actually, integration over measure d^4y δ(y^0-t_0) in (<ref>) and (<ref>) is nothing more as integration over the flat space-like hyper-surface, y^0=t_0. For the arbitrary space-like hyper-surface, σ(x), the annihilation and creation operators expressed through the field operator Φ̂(x) look like b( k) = i ∫_σ dσ^μ(x) [ f^*_ k(x) ↔∂/∂ x^μ Φ̂(x) ] , b^+( k) = - i ∫_σ dσ^μ(x) [ f_ k(x) ↔∂/∂ x^μ Φ̂^+(x) ] . § SINGLE-PARTICLE SPECTRUM With creation and annihilation operators in hand we come to the evaluation of the single-particle spectrum. We write 2E_p d N/d^3p= ⟨ b^+( p) b( p) ⟩ , where E_p=ω_p=√(m^2+ p^2). Next, introducing here creation b^+( k) and annihilation b( k) operators from (<ref>) and (<ref>) one gets 2E_p d N/d^3p = ∫ d^4x_1 d^4x_2 δ(x_1^0-t_0) δ(x_2^0-t_0) ⟨[ f_ p(x_1) ↔∂/∂ x_1^0Φ̂^+ (x_1) ] [ f^*_ p(x_2) ↔∂/∂ x_2^0Φ̂ (x_2) ] ⟩ = ∫ d^4x_1 d^4x_2 δ(x_1^0-t_0) δ(x_2^0-t_0) ⟨[ f_ p(x_1) ∂/∂ x_1^0Φ̂^+ (x_1) - (∂/∂ x_1^0 f_ p(x_1)) Φ̂^+ (x_1)] ×[ f^*_ p(x_2) ∂/∂ x_2^0 Φ̂ (x_2) - ( ∂/∂ x_2^0 f^*_ p(x_2)) Φ̂ (x_2) ] ⟩ . All this can be written in a compact form 2E_p d N/d^3p = ∫ d^4x_1 d^4x_2 δ(x_1^0-t_0) δ(x_2^0-t_0) [ f_ p(x_1) f^*_ p(x_2) ↔∂/∂ x_1^0↔∂/∂ x_2^0⟨Φ̂^+ (x_1) Φ̂ (x_2) ⟩] . One immediately recognize that angle brackets on the r.h.s. of this equation give us the correlation function or the lesser Green's function <cit.> i G^<(x_2,x_1) = ± ⟨Φ̂^+(x_1) Φ̂(x_2) ⟩ , where the plus sign reads for bosons and the minus sign for fermions (see Appendix). As an example, in what follows we consider the Bose statistics. Hence, for the single-particle spectrum, we obtain the following basic expression 2E_p d N/d^3p = i ∫ d^4x_1 d^4x_2 δ(x_1^0-t_0) δ(x_2^0-t_0) [ f_ p(x_1) f^*_ p(x_2) ↔∂/∂ x_1^0↔∂/∂ x_2^0 G^<(x_2,x_1) ] . As seen from (<ref>) in covariant form the single-particle spectrum looks like 2E_p d N/d^3p = i ∫ dσ^μ(x_1) dσ^ν(x_2) [ f_ p(x_1) f^*_ p(x_2) ↔∂/∂ x_1^μ↔∂/∂ x_2^ν G^<(x_2,x_1) ] . The formula (<ref>) (and (<ref>)) forms the basis for further approximations that take into account the special properties of the system emitting particles. §.§ A note on the description of fermionic radiation Let us assume that polarization effects are not taken into account when registering fermionic particles. In this case, all polarized states are summed, and the description of the free state of the propagating particle does not require the details of the fermionic spin state. Therefore, for such an experiment, it is quite satisfactory to describe freely propagating fermions as solutions of the Klein-Gordon equation. Indeed, let us consider freeze-out of the fermionic system. After freeze-out the fermions are described by the field operator ψ̂(x), which satisfies the free Dirac equation (iγ^μ∂_μ - m) ψ̂(x) = 0 , where ψ̂ is the four-spinor (four-component column vector), and the γ-matrices satisfy the anticommutation relations {γ^μ, γ^ν} = 2g^μν with g^μν as the metric tensor, sign(g^μν) = (1,-1,-1,-1). In eq. (<ref>) the “Dirac” operator can be acted on from the left by the adjoint operator (iγ^ν∂_ν + m). Using the anticommutation relations of the γ-matrices, we obtain that each component of ψ̂(x) must satisfy the Klein-Gordon equation (<ref>), i.e., (∂_μ∂^μ + m^2) ψ̂(x) = 0. So, we can conclude that if the experimental registration of fermions does not fix the polarization of particles, then we can use the solutions of the Klein-Gordon equation to describe the free propagation of fermions and use the quantum generalization of the kinetic approach proposed in the present paper to describe fermion radiation. §.§ Single-particle spectrum from homogeneous system For a homogeneous system the correlation function can be expanded in the Fourier integral only with respect to a difference of coordinates G^<(x_2,x_1) = G^<(x_2-x_1) = ∫d^4k/(2π)^4 e^-ik· (x_2-x_1) G^<(k^0, k) . Substituting then the Green's function in this form into (<ref>) we obtain 2E_p d N/d^3p = ∫d^4k/(2π)^4 d^3x_1 d^3x_2 iG^<(k^0, k) e^i( p- k)· ( x_1- x_2) × × ∫ dx_1^0 dx_2^0 δ(x_1^0-t_0) δ(x_2^0-t_0) [ e^-ip^0 (x_1^0-x_2^0) ↔∂/∂ x_1^0↔∂/∂ x_2^0 e^ik^0 (x_1^0-x_2^0)] , where p^0=ω_p. For two arbitrary functions we have f(t_1,t_2) ↔∂/∂ t_1↔∂/∂ t_2 g(t_1,t_2) = f ↔∂_t_1∂ g/∂ t_2 - ∂ f/∂ t_2 ↔∂_t_1 g = f ∂ ^2 g/∂ t_1 ∂ t_2 - ∂ f/∂ t_1 ∂ g/∂ t_2 - ∂ f/∂ t_2 ∂ g/∂ t_1 + ∂ ^2 f/∂ t_1 ∂ t_2 g . Then, expression in square brackets in the last line in (<ref>) can be easily calculated and one can rewrite (<ref>) in the following way 2E_p d N/d^3p = ∫d^4k/(2π)^4 d^3x_1 d^3x_2 iG^<(k^0, k) e^i( p- k)· ( x_1- x_2)( p^0+k^0 )^2 × ∫ dx_1^0 dx_2^0 δ(x_1^0-t_0) δ(x_2^0-t_0) e^-i(p^0-k^0)(x_1^0-x_2^0) , what finally gives 2E_p d N/d^3p = ∫d^4k/(2π)^4 i G^<(k^0, k) ∫ d^3x_1 d^3x_2 e^i( p- k)· ( x_1- x_2)( E_p + k^0 )^2 . Expansion (<ref>) assumes that the donor many-particle system is big enough to neglect the surface effects. On the other hand, following the common point of view <cit.> we assume that the Green's function significantly different from zero only when the differences of arguments, x_1- x_2, are close to zero. Hence, the integrations on the r.h.s. of (<ref>) with respect to the spatial coordinates x= x_1- x_2 can be done with infinite limits, then, it gives the δ-function: (2π)^3δ^3( p- k). Thus, the single-particle spectrum in a homogeneous system in the rest frame of the fireball reads 2E_p d N/d^3p = V ∫dω/2π ( E_p + ω)^2 i G^<(ω, p) , where V =∫ d^3X with X=( x_1+ x_2 )/2 as the 3D-volume of the element from which particles are emitted. To represent the single-particle spectrum (<ref>) in covariant form, insert (<ref>) into (<ref>) and get 2E_p d N/d^3p = ∫d^4k/(2π)^4 iG^<(k) ∫ dσ^μ(x_1) dσ^ν(x_2) [ f_ p(x_1) f^*_ p(x_2) ↔∂/∂ x_1^μ↔∂/∂ x_2^ν e^-ik· (x_2-x_1) ] . Calculating the derivatives on the right-hand side of this equation, we find that the single-particle spectrum of particles emitted by a homogeneous system in covariant form is written as 2E_p d N/d^3p= ∫d^4k/(2π)^4 (p+k)_μ (p+k)_ν iG^<(k) ∫_σ dσ^μ(x_1) dσ^ν(x_2) e^-i(p-k)· (x_1-x_2) = ∫d^4k/(2π)^4 iG^<(k) | ∫_σ dσ^μ(x) (p+k)_μ e^-i(p-k)· x |^2 , where p^0 = E_p = √(m^2 + p^2). §.§ Single-particle spectrum from homogeneous system in thermodynamic equilibrium If the system possesses a global thermodynamic equilibrium, which is an attribute of the homogeneous system under consideration, the correlation function G^<(k) can be expressed (see <cit.>, in particular in Ref. <cit.>, eq.(2.19)) with the help of the spectral function and the equilibrium distribution function i G^<(k) = θ(k_0) A(k) f(k^0) - θ(-k_0) A(k) f(-k^0) with f(k^0) = 1/e^ (k^0-μ)/T + a , where a = - 1 for the Bose statistics, a = 1 for the Fermi statistics and a = 0 for the classical Boltzmann gas. To be specific, we consider the Bose statistics below and therefore take the Bose-Einstein distribution function, that is, a = - 1 in (<ref>). If the emitted 3D-area is an element of the freeze-out hyper-surface, one can assume an absence of interaction on this surface. For the system of free particles which are in thermal equilibrium (ideal gas) the spectral function expresses that all particles are on the mass shell. Hence, the spectral function of the free fields can be found as <cit.> A_0(k) = 2π δ(k^2-m^2) [ θ(k^0)-θ(-k^0) ] , and satisfies the sum-rule <cit.> ∫dk^0/2π k^0 A(k^0, k) = 1 . Using (<ref>), we can write the representation of the Green's function G^<(k) given in eq. (<ref>) as follows i G^<(k) = π/ω_k δ(k_0-ω_k) f__ BE (k^0) - π/ω_k δ(k_0+ω_k) f__ BE (-k^0) . For the single-particle spectrum (<ref>) we need the Green's function, G^<(k^0, p), where the measured momentum p is put on place of the momentum k (remind, that is due to an integration with infinite limits of the spatial coordinates x= x_1- x_2 in (<ref>)) i G^<(ω, p) = π/E_p δ(ω - E_p) f__ BE(ω) - π/E_p δ(ω + E_p) f__ BE(-ω) . Inserting this in <ref>) one gets 2E_p d N/d^3p = V ∫dω/2π ( E_p + ω)^2 π/E_p [ δ(ω - E_p) f__ BE(ω) - δ(ω + E_p) f__ BE(-ω) ] . Due to the presence of the factor (E_p + ω_p)^2 under the integral in (<ref>), the second term in square brackets does not contribute at all, because ω = - E_p due to the delta-function. This means that antiparticles do not contribute to the particle spectrum. Then the single-particle spectrum in the fireball rest frame in the case of global thermodynamic equilibrium has the form d N/d^3p = V f__ BE(E_p) , where V is the spatial volume of the system from which the particles are emitted, and the system of bosons is taken as an example. §.§ The local thermodynamic equilibrium We can go further. In general case the Fourier expansion of the Green's function looks like G^<(x_2,x_1) = ∫d^4k/(2π)^4 e^-ik· x G^<(X;k) , where we have made the following transformation of coordinates: x = x_1 - x_2 and X = (x_1 + x_2)/2. Inserting this representation of the Green's function into basic eq. (<ref>) and then calculating the derivatives on the right-hand side of this equation, we obtain 2E_p d N/d^3p = i ∫d^4k/(2π)^4 d^4X d^4x δ(X^0-t_0) δ(x^0) e^-i(p-k) · x [( p^0+k^0 )^2 G^<(X;k) + ∂^2 G^<(X;k)/4 ∂ X_0^2] , where p^0 = E_p = √(m^2 + p^2) and we used identity dX^0 dx^0 δ(X^0+x^0/2-t_0) δ(X^0-x^0/2-t_0) = dX^0 dx^0 δ(X^0-t_0) δ(x^0) . In fact, eq. (<ref>) is a generalization of equation (<ref>), which was derived for a completely homogeneous system. We can write also a generalization of the formula (<ref>) for the single-particle spectrum of particles emitted by the system from a space-like freeze-out hypersurface in covariant form 2E_p d N/d^3p= i ∫d^4k/(2π)^4 ∫_σ dσ^μ(x_1) dσ^ν(x_2) e^-i(p-k)· (x_1-x_2) ×[(p+k)_μ (p+k)_ν G^<(X;k) + 1/4∂^2 G^<(X;k)/∂ X_μ∂ X^ν] , where p^0 = E_p and X = (x_1 + x_2)/2. Here we returned to the variables of integration (x_1,x_2) and used the transition d^4x_1 δ(x_1^0-t_0) p^0 = dσ^μ(x_1) p_μ and the same for the x_2 coordinate. If the Green's function G^<(X;k) weakly depends on the sum of arguments, X, it can be represented in the form <cit.> i G^<(X; k) = θ(k_0) A(X; k) f(X;k) - θ(-k_0) A(X; k) [ f(X;-k) + 1 ] , where A(X;k) is the spectral function and f(X;k) is the distribution function, which in the kinetic approach is defined as θ(k_0) A(X;k) f(X;k) = θ(k_0) i G^<(X;k) . The unit in the square brackets on the r.h.s. of (<ref>) is due to the tadpole contributions and can be rid out upon subtracting of the vacuum values as in the case of the vacuum quantum field theory. Hence, we will skip it in the future. To take into account the local equilibrium of the radiating system, we use eq. (<ref>) with several approximations. Indeed, in the kinetic approach, the second derivatives of the distribution function are usually neglected due to the weak dependence on the coordinates X = (x_1 + x_2)/2. Therefore, we neglect the second derivative of the Green's function on the right-hand side of (<ref>) and write 2E_p d N/d^3p = i ∫d^4k/(2π)^4 d^4X δ(X^0-t_0) (2π)^3 Δ(p-k) ( E_p+k^0 )^2 G^<(X;k) . Here (2π)^3 Δ(p - k) = ∫ d^4x δ(x^0) e^-i(p-k) · x , is a kind of form factor that reflects the finiteness of the spatial volume of the system. As was argued before, we assume that the correlation function G^<(X,x) significantly different from zero only when the differences of arguments, x_1- x_2, are close to zero. Therefore, the integrations in (<ref>) can be done with infinite limits, then, Δ( p - k) →δ^3( p- k). Further, as before, we assume that on the freeze-out hypersurface G^<(X;k) ≈ G_0^<(X;k). Taking into account (<ref>) and (<ref>) only for particles (as we have seen, antiparticles do not contribute) in a system with a slowly varying inhomogeneity, the Green's function has the form i G^<_0(X;k^0, k) = π/ω_k δ(k^0 - ω_k) f__ BE(X;k^0) , where ω_k = √(m^2 + k^2) . Then, by inserting (<ref>) into eq. (<ref>), one can obtain a formula for calculating the single-particle spectrum in the fireball rest frame when the radiating system has a weak inhomogeneity 2 E_p d N/d^3p = ∫d^4k/(2π)^4 d^4X δ(X^0-t_0) (2π)^3 δ^3( k - p) ( E_p + k^0 )^2 π/ω_k δ(k^0 - ω_k) f__ BE(X;k^0) = ∫ d^4X δ(X^0-t_0) 2 E_p f__ BE(X;E_p) . Obviously, the formula for spectrum (<ref>) in a homogeneous system (without dependence on X) reduces to (<ref>). The right-hand side of eq. (<ref>) can be rewritten in covariant notations d^4x δ(x^0-t_0) p^0 = (d^3x p^0 - dtdydz p^x - dtdxdz p^y - dtdxdy p^z) |_t = t_0 = const , where we keep in mind that for the equal-time initial conditions it is valid dt = dX^0 = 0. So we get d^4X δ(X^0-t_0) p^0 = dσ_μ(X) p^μ . By inserting this into eq. (<ref>), we rewrite it in covariant notations as E_p d N/d^3p = ∫ dσ_μ(X) p^μ f__ BE(X;p· u) , where the particles are on the mass shell p^0=E_p=√(m^2+ p^2), and u(X) is the four-velocity at the point X = (X^0, X) given on a space-like hypersurface, on which the initial conditions are now taken into account. (Remind, to be specific the boson system is considered.) So, for the particle spectrum we obtain covariant expression (<ref>) which is valid in any frame. This expression coincides with the Cooper-Frye formula <cit.>. To obtain it we assume the following: (1) The many-particle system possess a weak spatially inhomogeneity and a stationarity of the system is weakly broken. Due to that reason in the basic equation (<ref>) we have neglected the second derivative of the Green's function G^<(X;x) with respect to the “center of mass” coordinate X = (x_1 + x_2)/2. (2) The many-particle system is at least in the local thermodynamic equilibrium what is reflected in the dependencies T(X), μ(X) and u(X). (3) To obtain eq. (<ref>) and then eq. (<ref>), we assumed that the particles are free on the freeze-out hypersurface, which leads to the approximation G^<(X;k) ≈ G_0^<(X;k). (4) We have assumed that the correlation function G^<(x_1,x_2) differs significantly from zero only if the differences of the arguments x_1- x_2 are close to zero. Therefore, integrations in (<ref>) can be performed with infinite limits. In fact, this is not the case for a system close to a second-order phase transition, when the correlation length becomes large enough. Meanwhile, the covariant formula that takes into account all quantum effects is still (<ref>). Even if we take into account approximations (1), (2) and (3) and therefore use the Green's function in the form i G^<(X; k) ≈ i G_0^<(X;k) = θ(k_0) 2π δ(k^2-m^2) f(X;k) , we come to 2E_p d N/d^3p= ∫d^4k/(2π)^4 ∫_σ dσ^μ(x_1) dσ^ν(x_2) e^-i(p-k)· (x_1-x_2) × (p+k)_μ (p+k)_ν θ(k_0) 2π δ(k^2-m^2) f(X;k) . After some simplification, we obtain 2E_p d N/d^3p = ∫d^3k/(2π)^3 2ω_k ∫_σ dσ^μ(x_1) dσ^ν(x_2) e^-i(p-k)· (x_1-x_2) (p+k)_μ (p+k)_ν f(X;k) , where p^0 = √(m^2 + p^2) and k^0 = ω_k = √(m^2 + k^2). Reduction of (<ref>) to the Cooper-Frye formula (<ref>) is possible if we can integrate with respect to x = x_1 - x_2 on the right-hand side of eq. (<ref>). This integration will immediately result in delta function δ^3( p - k), which helps to convert the integrand to the same form as in eq. (<ref>). However, this cannot be done for an arbitrary freeze-out hypersurface. Thus, we can argue that eq. (<ref>) is a generalization of the Cooper-Frye formula (<ref>), which takes into account quantum effects. Indeed, one can rewrite eq. (<ref>) as 2E_p d N/d^3p = ∫_σ dσ^μ(x_1) dσ^ν(x_2) J_μν(x_1 - x_2, p) , were we define the tensor J_μν J_μν(x_1 - x_2, p) = e^-i p· (x_1-x_2)∫d^3k/(2π)^3 2ω_k e^i k· (x_1-x_2) (p + k)_μ (p + k)_ν f(X;k) . As one can see, the integral in (<ref>) includes interference of waves with different momenta k, which are projected onto the out-state with momentum p. There is no such interference in the Cooper-Frye formula (<ref>), where k = p is taken. §.§ Single-particle spectrum from spatially inhomogeneous but stationary system For the spatially inhomogeneous, but stationary system, the lesser Green's function can be represented as G^<(x_2,x_1) = G^<(x_2^0 - x_1^0; r_1, r_2). Then, after the Fourier transform with respect to the time variable x^0 = x_2^0 - x_1^0 G^<(x_2^0 - x_1^0; r_1, r_2) = ∫dω/2π e^- i ω (x_2^0 - x_1^0) G^<(ω; r_1, r_2) , we represent the Fourier transform of the Green's function in the form iG^<(ω; r_1, r_2) = A(ω; r_1, r_2) f__ BE(ω) , where A(ω; r_1, r_2) is the following spectral function A(ω; r_1, r_2) = ∑_k φ_k( r_1) φ_k^*( r_2) π/ϵ_kδ(ω - ϵ_k) . Here {φ_k( r)} is the orthogonal and complete set of functions describing the spatial distribution of particles in a fireball. Let us check the reduction to the homogeneous case. When particles on the freeze-out hypersurface are free, their wave functions will be plane waves φ_k( r) → (1/√(V))exp(i k · r) and hence ϵ_k → E_k = √(m^2 + k^2). By inserting this into eq. (<ref>) one gets A(ω; r_1, r_2) = ∫d^3k/(2π)^3 e^i k · ( r_1 - r_2) π/E_k δ(ω - E_k) . Making the Fourier transform with respect to the relative coordinate r = r_1 - r_2 we come to the spectral function A(ω, p) = ∫d^3k/(2π)^3 d^3 r e^-i ( p - k) · r π/E_k δ(ω - E_k) = π/E_p δ(ω - E_p) . That is, in the case of a homogeneous system in thermal equilibrium, we arrive at the same free spectral function as in (<ref>). To calculate the spectrum of particles we use the basic eq. (<ref>), where we introduced the Green's function in the form (<ref>) and using representation (<ref>) we obtain 2E_p d N/d^3p = ∫ d^4x_1 d^4x_2 δ(t_1-t_0) δ(t_2-t_0) ∫_-∞^∞ dω/2π A(ω; r_1, r_2) f__ BE(ω) × × [ f_ p(t_1, r_1) f^*_ p(t_2, r_2) ↔∂/∂ t_1↔∂/∂ t_2 e^-iω (t_2-t_1)] . We calculate two-side derivatives (remind, f_ p(x) = exp(- i E_p x^0 + i p · x)) [ e^-iE_p (t_1-t_2) ↔∂/∂ t_1↔∂/∂ t_2 e^-iω (t_2-t_1)] = (ω + E_p)^2 e^-i(E_p - ω) (t_1-t_2) . Then we put everything together and rewrite (<ref>) as 2E_p d N/d^3p = ∫_-∞^∞ dω/2π f__ BE(ω) (ω + E_p)^2 ∫ d^3r_1 d^3r_2 e^i p · ( r_1- r_2) A(ω; r_1, r_2) . Using the spectral function representation (<ref>), we can go further 2E_p d N/d^3p = ∫_-∞^∞ dω/2π f__ BE(ω) (ω + E_p)^2 ∑_k φ_k( p) φ_k^*( p) π/ϵ_kδ(ω -ϵ_k) = ∑_k | φ_k( p) |^2 1/2 ϵ_k (ϵ_k + E_p)^2 f__ BE(ϵ_k) , where φ_k( p) = ∫ d^3r e^i p · r φ_k( r) . If the quasi-momentum k is assumed to be continuous variable, then the single-particle spectrum has the form 2E_p d N/d^3p = V ∫d^3k/(2π)^3 | φ_k( p) |^2 1/2 ϵ_k (ϵ_k + E_p)^2 f__ BE(ϵ_k) . For example, for a system in a box V = L^3 with the Dirichlet boundary conditions, the functions φ_n( r) satisfy the stationary Klein-Gordon equation ( ϵ_ n^2 - m^2 + ∇^2 ) φ_ n( r) = 0 . The solutions of this equation normalized to unity have the form φ_ n( r) = √(8/V) sin(k_x x) sin(k_y y) sin(k_z z) , where n = (n_x,n_y,n_z) with n_i = 0, 1, 2, … and k = (π/L n_x, π/L n_y, π/L n_z). Each quantum state of the system, marked with the symbol n, has a self energy ϵ_ n = √(m^2 + (π/L)^2 n^2). Then, using the set of wave functions φ_ n( r) and the set of self-energies ϵ_ n, one can calculate the spectrum (<ref>) or for large volume of the box can use eq. (<ref>). For greater realism, one can consider a cylinder extended along the z axis, or a cylinder with an elliptical cross section to take into account the azimuthal dependence of particle radiation. §.§ Radiation of particles from a system with a finite lifetime To reflect the finite lifetime of the system, we can use the parameterization of the spectral function in the spirit of the Bright-Wigner distribution function since each particle of the system is characterized by the smearing of its energy in the same way as resonances. It can be done by smearing the delta function in eq. (<ref>) δ(k_0^2-ω_k^2) → A_γ(k) = 1/π mγ/(k_0^2-ω_k^2)^2 + (mγ)^2 , where γ=1/τ with τ as the lifetime of the donor many-particle system. Here we use the limit equality δ(x) = lim_γ→ 01/πγ/x^2 + γ^2. Then the spectral function of free fields (<ref>) is transformed into a new spectral function A(k), which reflects the finite life time τ of the system A_0(k) → A(k) = 2π A_γ(k) [θ(k^0) - θ(-k^0) ] . Let us check the sum rule (<ref>) for the resulting parametrization (<ref>) of the spectral function ∫_-∞^∞dk^0/2π k^0 A(k^0, k) = ∫_0^∞dk^0/π k_0 mγ/(k_0^2-ω_k^2 )^2+(mγ)^2 - ∫_-∞^0 dk^0/π k_0 mγ/(k_0^2-ω_k^2 )^2+(mγ)^2 = 2∫_0^∞dk^0/π k_0 mγ/(k_0^2-ω_k^2 )^2+(mγ)^2 = ∫_0^∞ds/π mγ/(s-ω_k^2 )^2+(mγ)^2 = 0.5 + 1/πarctan( m γ/ω_k^2) ≈ 1 , where the last approximation is valid if the inequality mγ ≪ ω_k^2 , → γ ≪ m+ k^2/m . Since the inverse lifetime of the system γ is an average value, i.e. we do not separate γ and ⟨γ⟩, the inequality (<ref>) can be considered as averaged for a thermal many-particle system at a temperature T: ⟨γ⟩ ≪ m + 2⟨ k^2/2m⟩ = m+3T , where the last equality uses the nonrelativistic relation ⟨ k^2/2m⟩=3/2 T. For example, for the thermal system of pions m_π=140 MeV, which is created in collisions of relativistic nuclei, the freeze-out temperature T≃ 150 MeV is known. Therefore, we can make the following estimate of the allowable width γ: 1/τ = γ ≪ 590 MeV. With good accuracy (∫dk^0/2π k^0 A(k) ≈ 0.95), the lower limit of the lifetime can be taken equal to τ_c≃ 2 fm/c (γ_c≃ 100 MeV). Then for the total lifetime of the multipion system τ greater than τ_c the spectral function (<ref>) satisfies the sum rule (<ref>). Following the spirit of the Breit-Wigner distribution function, we only use it for positive energies. With this in mind, we write the Green's function i G^<(k_0, k) = 2πθ(k_0) A_γ(k_0, k) f__ BE(k_0) . Then the single-particle spectrum (<ref>) can be expressed as (note, we introduce into (<ref>) the Green's function in the form G^<(k_0, p)) 2E_p d N/d^3p = V ∫_0^∞ dk^0 ( E_p+k_0 )^2 A_γ(k_0, p) f__ BE(k_0) . And, finally, we get the spectrum of particles emitted from the system with a finite lifetime, τ = 1/γ, 2E_p d N/d^3p = V ∫_0^∞dk^0/π ( E_p+k_0 )^2 mγ/(k_0^2-E_p^2)^2+(mγ )^2 f__ BE(k^0) . Let us check the convergence to the previous result. When γ→ 0, the integrand in (<ref>) is converted as 2E_p d N/d^3p = V ∫_0^∞ dk^0 ( E_p+k_0 )^2 δ(k_0^2-E_p^2) f__ BE(k_0) . That leads to d N/d^3p = V f__ BE(E_p) . This formula coincides with (<ref>), which gives the single-particle spectrum in the fireball rest frame in the case of global thermodynamic equilibrium. § APPLICATIONS The goal of this section is to compare on the basis of the specific examples, the Cooper-Frye formula (<ref>) and a quantum generalization of the kinetic approach given in eq. (<ref>). §.§ Constant time hypersurface: Rapidity distribution In case, of the constant-time space-like hypersurface, i.e., x_0 = t_0 = const on the hypersurface, we have dσ^μ(x) = d^4x δ(x_0 - t_0). To make the comparison as transparent as possible, we consider the pion system in the global thermodynamic equilibrium. In this case formula (<ref>) looks like 2E_p d N/d^3p = ∫d^3k/(2π)^3 2ω_k f__ BE(ω_k) | ∫_σ dσ^μ(x) (p+k)_μ e^-i(p-k)· x |^2 = ∫d^3k/(2π)^3 2ω_k f__ BE(ω_k) (E_p + ω_k)^2 | ∫ d^2x_T e^i( p_T - k_T)· x_T ∫_0^L_z dz e^i(p_z - k_z)z |^2 , where p^0 = E_p =√(m^2 + p^2) and k^0 = ω_k = √(m^2 + k^2). Our goal is to calculate rapidity distribution, then let us assume that in the transverse direction, a 2D volume is big enough that the integration over the transverse spatial coordinates in (<ref>) leads to the delta-function. In detail, it looks like |∫ d^2x_T e^i( p_T - k_T)· x_T |^2 = (2π)^2 δ^2( p_T - k_T) ∫_(S_T) d^2x_T e^i( p_T - k_T)· x_T = S_T (2π)^2 δ^2( p_T - k_T) , where S_T is the square of the transverse cross section. After inserting the obtained δ-function into eq. (<ref>) we get k_T = p_T and consequently m_T(k_T) = m_T(p_T). Integration over z-direction over the longitudinal size of the system L_z gives a one-dimensional form factor ∫_0^L_z dz e^i(p_z - k_z)z = e^i (p_z - k_z)L_z - 1/i(p_z - k_z) = e^i(p_z - k_z)L_z/22sin[ (p_z - k_z)L_z/2]/i(p_z - k_z) . In fact, this is a particular example of the relativistic form factor introduced in eq. (<ref>). We are going to consider the rapidity distributions and transverse momentum spectra. That is why it is reasonable to make transform of the momentum coordinates: (p_x,p_y,p_z) → (φ, p_T, y), where φ is the azimuthal angle, p_T = √(p_x^2 + p_y^2) is the transverse momentum and tanhy = p_z/E_p is the rapidity. For the differential, we get d^3p = 2π E_p p_T dp_T dy, where we integrate over the azimuthal angle assuming the azimuthal symmetry. Then, inserting (<ref>) and (<ref>) into eq. (<ref>) for dependence of the spectrum on variables (p_T,y) we get d N/2π p_T dp_T dy = S_T ∫dy_k/2π f__ BE(m_T(p_T) coshy_k) (coshy + coshy_k)^2 F_L(y_k;y,p_T) , where F_L(y_k;y,p_T) = [ sin[ L_z m_T(p_T) (sinhy - sinhy_k)/2]/(sinhy - sinhy_k)]^2 , is the longitudinal form factor and tanhy_k = k_z/ω_k is the rapidity of particle with the momentum k. To derive eq. (<ref>) we have used that m_T(k_T) = m_T(p_T), what results in k_z = m_T(p_T) sinhy_k, and then dk_z = m_T(p_T) coshy_k dy_k. On the other hand, the Cooper-Frye spectrum in the fireball rest frame in the case of global thermodynamic equilibrium has the form (<ref>). In the Cooper-Frye approach, the rapidity distribution for the fixed transverse momentum looks like d N/2π p_T dp_T dy = S_T L_z m_T(p_T) coshy f__ BE(m_T(p_T) coshy) . Here, we have factorized the volume of the system V into the transverse cross section S_T and the longitudinal size of the system L_z that is V = S_T L_z. To compare the spectrum (<ref>) with the spectrum (<ref>) we set S_T = 1. At the same time, to keep right dimensionality in the adopted system of units (c = ħ = 1) we take the numerical value of L_z as: N[L_z] fm → (N[L_z]/C_c) MeV^-1, where C_c = 197.3 (remind, C_c·MeV·fm = 1). The calculated rapidity distributions are depicted in Fig. <ref> in three panel in a correspondence with three values of the fixed transverse momentum of the π-meson, p_T = 100, 400, 800 MeV/c, respectively, and for a given longitudinal size of the system L_z = 10 fm. Parameters of the Bose-Einstein distribution function are T = 160 MeV, μ = 0. Black solid curves, which are marked as QG, reflect calculations with the help of eq. (<ref>), i.e., it is a quantum generalization of the kinetic approach. Red dashed curves, which are marked as CF, reflect calculations with the help of eq. (<ref>). It is seen that the difference between the two distributions goes up with an increase in the transverse momentum. §.§ Radiation of particles from a system with a finite lifetime We have calculated the spectrum of pions (<ref>), as a dependence on the | p| = p, using a representation of the element of the momentum space in the form d^3p = sinθ dθ dφ p^2 dp. To get the dependence of the spectrum only on a modulus of the particle momentum p, we assume the isotropic symmetry of the pion radiation and integrate over the angles. Then, formula (<ref>) can be written as d N/4π p^2dp = V ∫_0^∞dk^0/π ( E_p+k_0 )^2/2E_p mγ/(k_0^2-E_p^2)^2+(mγ )^2 f__ BE(k^0) . Our goal is to compare this spectrum with the Cooper-Frye formula (<ref>), which for the isotropic symmetry of radiation looks like d N/4π p^2 dp = V f__ BE(E_p) , where E_p = √(m^2 + p^2). In both formulae, we take the unit volume of the pion system, V = 1. To show the quantum generalization we have calculated three patterns of the life time τ = 1/γ of the pion system, i.e., γ = 50, 100, 150 MeV. The spectra are plotted in Fig. <ref>, left panel. One can see a significant difference in the dependencies generated by the two approaches. The Cooper-Frye kinetic approach is represented as the Bose-Einstein distribution function f__ BE, which on a logarithmic scale is just a straight line. Meanwhile, the quantum generalization of the kinetic approach, which takes into account the finite lifetime of the radiating system (eq. (<ref>)), is represented by the curves, resembling power dependence, rather than an exponential one. Our following example implies a comparison of the pion transverse spectra at midrapidity in the case of the global thermodynamic equilibrium. To calculate the spectrum based on the quantum generalization of the kinetic approach we use eq. (<ref>) and make the transform of the momentum coordinates as in Section <ref>, (p_x,p_y,p_z) → (φ, p_T, y). For these conditions the spectrum, which depends now on on the transverse momentum p__T = | p__T|, looks like d N/2π p_Tdp_T dy = V ∫_0^∞dk^0/π ( m_T + k_0 )^2 mγ/(k_0^2-m_T^2)^2+(mγ )^2 f__ BE(k^0) , where m_T = √(m^2_π + p_T^2) and y = 0. For the sake of simplicity, we consider the many-particle system as a gas at rest (no hydrodynamical flows). For instance, it is the pion system at midrapidity in the laboratory frame created in the central Pb+Pb collision in the collider experiment. These calculations aim to compare, on the most transparent basis, the spectrum of pions emitted by a system with a finite lifetime τ = 1/γ with the Cooper-Frye formula, which at midrapidity y = 0 looks like d N/2π p_T dp_T = V m_T(p_T) f__ BE(m_T(p_T)) . In both approaches, we assume the azimuthal symmetry. The spectra are plotted in Fig. <ref>, right panel. A straight black line marked as “CF” was obtained in the Cooper-Frye approach. Three upper curves, which represent the quantum generalization approach, are marked by the digits 1,2,3 following a value of the parameter γ = 5, 10, 50 MeV, respectively. Both spectra are normalized to unity at p_T = 0. Again, we can see a significant difference in the behavior of curves, which correspond to different approaches. The Cooper-Frye kinetic approach leads to a straight line (on a logarithmic scale). Meanwhile, the quantum generalization of the kinetic approach, which takes into account the finite lifetime of the radiating system (eq. (<ref>)), is represented by the curves, resembling power dependence at big p_T, rather than an exponential one. It is interesting to compare our results with pion spectrum versus transverse momentum at midrapidity in the transverse momentum range 0.6 GeV/c < p_T < 12 GeV/c measured in Pb-Pb collisions at √(s_NN) = 2.76 TeV <cit.>. We will see that dependencies obtained in the quantum generalization approach, which accounts for the finite lifetime of the system, and which are depicted in Fig. <ref> on the right panel, have the same tendencies as the experimental results, or can even fit the data at big p_T. At the same time, our calculations within the approach developed in Section <ref> show that the same behavior has the spectra of particles radiating from a spatially inhomogeneous system, for example from a finite-size system. § CONCLUSION In this work, we investigate the propagation of particles (quantum fields) from the fireball to the detector by solving the corresponding initial-value problem. With the help of the “thermal” Green's function, which describes a system of many particles created in collisions of relativistic nuclei and determines the initial values, we are able to express the detected single-particle spectrum. For the single-particle spectrum we obtain formula (<ref>), which coincide with the Cooper-Frye prescription <cit.> (as an example we follow the Bose-Einstein statistics) E_p d N/d^3p = ∫ dσ_μ(X) p^μ f__ BE(X;p· u) . We obtained formula (<ref>) in the framework of the following assumptions: (1) The many-particle system has a weak inhomogeneity; (2) The many-particle system is in local thermodynamic equilibrium; (3) Particles are in free states on the freeze-out hypersurface; (4) The correlation function G^<(x_1,x_2) differs significantly from zero only if the differences of the arguments x_1- x_2 are close to zero. The latter assumption (4) cannot be applied if the system is close to a second-order phase transition, when the correlation length becomes sufficiently large. At the same time, as we discussed in the Section <ref>, this approximation excludes quantum effects. Based on the same assumptions (1) - (3), taking into account, in addition to kinetic contributions, also quantum effects, we obtain the formula (<ref>) for the single-particle spectrum 2E_p d N/d^3p = ∫d^3k/(2π)^3 2ω_k ∫_σ dσ^μ(x_1) dσ^ν(x_2) e^-i(p-k)· (x_1-x_2) (p+k)_μ (p+k)_ν f(X;k) , where p^0 = E_p = √(m^2 + p^2), k^0 = ω_k = √(m^2 + k^2) and f(X;k) is the distribution function. In the case of global equilibrium, this equation reduces to 2 E_p d N/d^3p = ∫d^3k/(2π)^3 2ω_k f(k) | ∫_σ dσ^μ(x) (p+k)_μ e^-i(p-k)· x |^2 . where p^0 = E_p and k^0 = ω_k. When stationary many-particle system is in spatially inhomogeneous state, as discussed in the Section <ref>, we obtain the formula (<ref>) to calculate the single-particle spectrum in this case. To reflect finite lifetime of a spatially homogeneous system of many particles, we propose to use a parametrization of the spectral function similar to the relativistic Breit-Wigner function. The emission of particles from a system with finite lifetime was discussed in Section <ref>, where the formula (<ref>) was obtained for calculating the single-particle spectrum in this case. In order to clarify the differences in the results of the Cooper-Frye kinetic approach and a proposed quantum generalization, Section <ref> presents single-particle spectra obtained for several specific cases. The rapidity distribution, momentum, and transverse momentum spectra at midrapidity were calculated to compare the emitted spectra of pions on the most transparent basis. In conclusion, we note that the generalization of the Cooper-Frye formula (<ref>), obtained in this article, takes into account quantum effects arising for various reasons. First, there is a complete quantum treatment of the emission process that includes quantum interference, as in the formula (<ref>). Second, the radiation from a spatially inhomogeneous system, as in the formula (<ref>), which, for example, is applied to a system with a finite spatial volume. And, of course, taking into account the finite lifetime of a system of many particles was obtained in the formula (<ref>). In the next article, the author plans to consider the two-particle spectra arising from relativistic collisions of particles and nuclei. Meanwhile, the reader can gain basic knowledge in this area from Refs. <cit.>. For example, final-state interaction effects are very important when considering two-particle spectra (two-particle interferometry). An introduction to this topic can be found at Refs. <cit.>. § ACKNOWLEDGEMENTS The author is grateful to I. Mishustin, L. Csernai, L. Satarov, H. Stoecker for useful discussions and comments. The author also thanks the referees for their valuable comments and suggestions for improving the manuscript. The work is supported by the National Academy of Sciences of Ukraine by its priority project "Fundamental properties of matter in the microworld, astrophysics, and cosmology". § QUANTUM STATISTICS In quantum statistics, the mean value of the operator  is defined as: ⟨  ⟩ = 1/Z Tr( ρ̂ Â) = 1/Z ∑_n ⟨Ψ_n | ρ̂  | Ψ_n ⟩ , Z = ∑_n ⟨Ψ_n | ρ̂ | Ψ_n ⟩ , where {Ψ_n( r_1, r_2, … , r_N)} is the complete set of many-particle wave functions and ρ̂ is the density matrix. For the local thermal equilibrium the density matrix reduces to the diagonal form ρ_nn' = δ_nn' e^E_n/T . Then, the average of the product of two field operators in the grand canonical ensemble reads ⟨ ψ̂^+(t_2, r_2) ψ̂(t_1, r_1) ⟩ = 1/Z ∑_n ⟨Φ_n | e^-(H - μ N)/T ψ̂^+(t_2, r_2) ψ̂(t_1, r_1) | Φ_n ⟩ . The lesser Green's function is defined on the base of this averaging iħ G^<(x_1,x_2) = ± ⟨ ψ̂^+(x_2) ψ̂(x_1) ⟩ , where x = (t, r), the plus sign reads for bosons and the minus sign for fermions. In accordance with the quantum fluctuation-dissipation theorem for the system which in local (global) thermal equilibrium the lesser Green's function can be expressed as <cit.> iħ G^<(ω, k) = A(ω, k) f(ω) , where G^<(ω, k) is the Fourier transform of the Green's function G^<(x_1-x_2), A(ω, k) is the spectral function, f(ω) is the Bose-Einstein or Fermi-Dirac distribution function. 40 huovinen-2008 P. Huovinen, Chemical freeze-out temperature in hydrodynamical description, Eur. Phys. J. A 37, 121 (2008); [arXiv: 0710.4379 [nucl-th]]. adamova-2003 D.Adamova (CERES Collaboration), Universal Pion Freeze-out in Heavy-Ion Collisions, Phys. Rev. Lett. 90, 022301 (2003); [arXiv: nucl-ex/0207008]. russkikh-ivanov-2006 V.N. Russkikh and Y.B. Ivanov, Dynamical Freeze-out in 3-Fluid Hydrodynamics, Phys. Rev. C 76, 054907 (2007); [arXiv: nucl-th/0611094]. sollfrank-1999 J. Sollfrank, P. Huovinen, and P.V. Ruuskanen, Mass number scaling in ultrarelativistic nuclear collisions from a hydrodynamical approach, Eur. Phys. J. C 6, 525 (1999). gersdorff-1986 H. von Gersdorff, L. McLerran, M. Kataja, and P.V. Ruuskanen, Studies of the Hydrodynamic Evolution of Matter Produced in Fluctuations in anti-p p Collisions and in Ultrarelativistic Nuclear Collisions, Phys. Rev. D 34, 794 (1986). strickland-2015 M. Nopoush, M. Strickland, R. Ryblewski, D. Bazow, U. Heinz, and M. Martinez, Leading-order anisotropic hydrodynamics for central collisions, Phys. Rev. C 92, 044912 (2015); [arXiv:1506.05278 [nucl-th]]. strickland-2016 M. Alqahtani, M. Nopoush, and M. Strickland, “Quasiparticle anisotropic hydrodynamics for central collisions”, Phys. Rev. C 95, 034906 (2017); [arXiv:1605.02101 [nucl-th]]. groot-1980 S.R. de Groot, W.A. van Leeuwen, Ch.G. van Weert, Relativistic Kinetic Theory, Noth-Holland P.C., Amsterdam, 1980. anchishkin-2013 D. Anchishkin, V. Vovchenko, and L.P. Csernai, Pionic freeze-out hypersurfaces in relativistic nucleus-nucleus collisions, Phys. Rev. C 87, 014906 (2013). cooper-frye-PRD-v10-1974 F. Cooper and G. Frye, Single-particle distribution in the hydrodynamic and statistical thermodynamic models of multiparticle production, Phys. Rev. D 10, 186 (1974). vladimirov V.S. Vladimirov, Equations of the Mathematical Physics, Moscow: Mir Publishers, p. 464, 1983. anch2007 D. Anchishkin, U. Heinz, Two-particle correlations in the wave function and covariant current approaches, Phys. Atom. Nucl. 71, 1632-1646 (2008); [arXiv: 0712.1104 [hep-ph]]. schweber Silvan S. Schweber, An Introduction to Relativistic Quantum Field Theory, Row, Peterson and Co., N.Y., 1961. peskin Michael E. Peskin, Daniel V. Schroeder, An Introduction to Quantum Field Theory, Addison-Wesley Co., 1995. GKW M. Gyulassy, S.K. Kauffmann and L.W. Wilson, Pion Interferometry of Nuclear Collisions. 1. Theory, Phys. Rev. C 20, 2267-2292 (1979). boal D.H. Boal, C.-K. Gelbke and B.K. Jennings, Intensity interferometry in subatomic physics, Rev. Mod. Phys. 62, 553-602 (1990). heinz99 U. Heinz and B.V. Jacak, Two-particle correlations in relativistic heavy-ion collisions, [arXiv: nucl-th/9902020]. anch98 D. Anchishkin, U. Heinz, and P. Renk, Final state interactions in two-particle interferometry, Phys. Rev. C 57, 1428 (1998); [arXiv: nucl-th/9710051]. chapman94 S. Chapman, and U. Heinz, HBT correlators: Current formalism versus Wigner function formulation, Phys. Lett. B 340, 250 (1994). pratt90 S. Pratt, T. Csörgö, and J. Zimányi, Detailed predictions for two pion correlations in ultrarelativistic heavy ion collisions, Phys. Rev. C 42, 2646 (1990). kadanoff L.P.Kadanoff, G.Baym, Quantum statistical mechanics, W.A.Benjamin, Inc., N.Y. 1962. chou1985 K. Chou, Z. Su, B. Hao, and L. Yu, Equilibrium and Nonequilibrium Formalisms Made Unified, Phys. Rep. 118, 1 (1985). blaizot J.-P. Blaizot, Quantum fields at finite temperature and density, Saclay preprint SPhT/91/188. mrowczynski-1990 S. Mrówczyński, P. Danielewicz, Green function approach to transport theory of scalar fields, Nucl. Phys. B 342, 345-380 (1990). mrowczynski-1998 Stanislaw Mrówczyński, Topics in the Transport Theory of Quark-Gluon Plasma, [arXiv: hep-ph/9805435]. abelev-2014 B. Abelev, J. Adam, D. Adamová et al. (The ALICE Collaboration), Neutral pion production at midrapidity in pp and Pb-Pb collisions at √(s_NN) = 2.76 TeV, Eur. Phys. J. C 74, 3108 (2014); [arXiv: 1405.3794 [nucl-ex]]. anch-heinz-2008 D. Anchishkin, U. Heinz, Two-particle correlations in the wave function and covariant current approaches, Phys. Atom. Nucl. 71, 1632 (2008), [arXiv: 0712.1104 [hep-ph]]. anch-anch-heinz-2006 D. Anchishkin, Ye. Anchishkin, U. Heinz, Final State Distortions in Two-Particle Correlations, Proceedings of Science, CFRNC2006, 025 (2006), [arXiv: nucl-th/0611088]. anch-1996 D.V. Anchishkin, W.A. Zajc, G.M. Zinovjev, Coulomb corrections in two particle correlations for the processes of high multiplicity, Ukr. J. Phys. 41, 363 (1996).